Question
a.
privacy invasion
b.
hardware failure
c.
fraudulent manipulation of data
d.
encryption and decryption
Posted under UGC NET computer science question paper Networking
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Data security threats include
Similar Questions
Discover Related MCQs
Q. The cellular frequency reuse factor for the cluster size N is
View solution
Q. Handoff is the mechanism that
View solution
Q. All of the following are examples of real security and privacy risks except
View solution
Q. Identify the incorrect statement:
View solution
Q. The number of bits required for an IPV6 address is
View solution
Q. A comparison of frequency division and time division multiplexing system shows that
View solution
Q. If carrier modulated by a digital bit stream, has one one of the possible phase of 0, 90, 180 and 270 degrees, then modulation called
View solution
Q. Consider the following statement :
(i) The bandwidth of the A.M., wave depends on the band width of the modulating signal.
(ii) The bandwidth of the A.M., wave depends on the modulation index.
(iii) The bandwidth of the F.M, wave for all practical purpose depends on the amplitude of the carrier.
Of these statements the correct statements are
View solution
Q. A smart modem can dial, hangup and answer incoming calls automatically. Can you tell who provides the appropriate instructions to the modem for this purpose ?
View solution
Q. Which of the following switching techniques is most suitable for interactive traffic ?
View solution
Q. Frequency shift keying is used mostly in
View solution
Q. The baud rate is
View solution
Q. How much bandwidth is there in 1 micron of spectrum at a wavelength of 1 micron?
View solution
Q. Which of the following file transfer protocols use TCP and establishes two virtual circuits between the local and remote server?
View solution
Q. The threshold effect in demodulator is
View solution
Q. The …………… field is the SNMP PDV reports an error in a response message.
View solution
Q. End-to-End connectivity is provided from Last-to-Last in
View solution
Q. What services does the internet layer provide?
1. Quality of service
2. Routing
3. Addressing
4. Connection oriented delivery
5. Framing bits
View solution
Q. What is the maximum operating rate of a wireless LAN using infrared communication?
View solution
Q. The cost of the network is usually determined by
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Networking? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!