Question
a.
Monoalphabetic
b.
Polyalphabetic
c.
Transpositional
d.
None of the above
Posted under UGC NET computer science question paper Networking
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Which of the following substitution technique have the relationship between a character in the plaintext and a character in the ciphertext as one-to-many?
Similar Questions
Discover Related MCQs
Q. What is the maximum length of CAT-5 UTP cable in Fast Ethernet network?
View solution
Q. The ................ is a set of standards that defines how a dynamic web document should be written, how input data should be supplied to the program, and how the output result should be used.
View solution
Q. The count-to-infinity problem is associated with
View solution
Q. Suppose a file of 10,000 characters is to be sent over a line at 2400 bps. Assume that the data is sent in frames. Each frame consists of 1000 characters and an overhead of 48 bits per frame. Using synchronous transmission, the total overhead time is ..............
View solution
Q. Which of the following is the size of Network bits and Host bits of Class A of IP address?
View solution
Q. Which of the following field of the TCP header tells how many bytes may be sent starting at the byte acknowledged ?
View solution
Q. Which of the following is a bit rate of an 8-PSK signal having 2500 Hz bandwidth ?
View solution
Q. Match the following :
(a) UDP (i) Message Transfer Protocol
(b) OSPF (ii) Bit-oriented Protocol
(c) SMTP (iii) Interior Gateway Routing Protocol
(d) HDLC (iv) Connectionless Transport Protocol
Codes :
(a) (b) (c) (d)
View solution
Q. Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224. What is the subnet address ?
View solution
Q. If the data unit is 111111 and the divisor is 1010. In CRC method, what is the dividend at the transmission before division ?
View solution
Q. If user A wants to send an encrypted message to user B. The plain text of A is encrypted with the .................
View solution
Q. A ............... can forward or block packets based on the information in the network layer and transport layer header.
View solution
Q. Which of the following addresses is used to deliver a message to the correct application program running on a host?
View solution
Q. In substitution, a character in the plaintext is always changed to the same character in the ciphertext, regardless of its position in the text.
View solution
Q. In classful addressing, the IP address 190.255.254.254 belongs to
View solution
Q. In hierarchical routing with 4800 routers, what region and cluster sizes should be chosen to minimize the size of the routing table for a three layer hierarchy?
View solution
Q. In IPv4 header, the field is needed to allow the destination host to determine which datagram a newly arrived fragment belongs to.
View solution
Q. Using data p=3, q=11, n=pq, d=7 in RSA algorithm find the cipher text of the given plain text SUZANNE
View solution
Q. A data file of 1,00,000 characters contains only the characters g-l, with the frequencies as indicated in table. Using the variable-length code by Huffman codes, the file can be encoded with
View solution
Q. In a fully connected mesh network with n devices, there are ................ physical channels to link all devices.
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Networking? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!