Question
a.
Layering
b.
Cryptography
c.
Grade of service
d.
None of the above
Posted under UGC NET computer science question paper Networking
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Usually information security in a network is achieved by:
Similar Questions
Discover Related MCQs
Q. When compared with analog cellular systems, an advantage of digital TDMA cellular system is that:
View solution
Q. After sending a message, the sender should not be able to, at a later date, deny having sent the message, is referred to as:
View solution
Q. The device which connects dissimilar LANs of different topologies using different sets of communication protocols so that information can flow from one to another is called:
View solution
Q. The channel capacity of a band-limited Gaussian channel is given by:
View solution
Q. Transmission of N signals, each band limited to fm Hz by TDM, requires a minimum band-width of:
View solution
Q. If a code is âtâ error detecting, the minimum hamming distance should be equal to:
View solution
Q. The throughput of slotted ALOHA is given by:
View solution
Q. Congestion control is done by:
View solution
Q. Assertion (A): Twisted pairs are widely used as transmission medium.
Reasoning (R): Twisted pairs have adequate performance and low cost.
View solution
Q. An example of a non-adaptive routing algorithm is:
View solution
Q. IP address in B class is given by:
View solution
Q. A high performance switching and multiplexing technology that utilizes fixed length packets to carry different types of traffic is:
View solution
Q. A conventional LAN bridge specifies only the functions of OSI:
View solution
Q. If a code is t-error correcting, the minimum Hamming distance is equal to:
View solution
Q. The ATM cells are ................ bytes long.
View solution
Q. For slotted ALOHA, the maximum channel utilization is :
View solution
Q. For a channel of 3 KHz bandwidth and signal to noise ratio of 30 dB, the maximum data rate is:
View solution
Q. An example of a public key encryption algorithm is:
View solution
Q. With reference to hierarchical routing, the optimum number of levels for an m router subnet is:
View solution
Q. Identify the incorrect statement:
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Networking? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!