Question
a.
N(N−1)
b.
N(N−1)/2
c.
2N
d.
(N−1)^2
Posted under UGC NET computer science question paper Networking
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Suppose that everyone in a group of N people wants to communicate secretly with (N−1) other people using symmetric key cryptographic system. The communication between any two...
Similar Questions
Discover Related MCQs
Q. A slotted ALOHA network transmits 200-bit frames using a shared channel with a 200 Kbps bandwidth. Find the throughput of the system, if the system (all stations put together) produces 250 frames per second:
View solution
Q. The period of a signal is 100 ms. Its frequency is .............
View solution
Q. The dotted-decimal notation of the following IPV4 address in binary notation is ...................
10000001 00001011 00001011 11101111
View solution
Q. Which of the following statements are true?
(a) Advanced Mobile Phone System (AMPS) is a second generation cellular phone system.
(b) IS - 95 is a second generation cellular phone system based on CDMA and DSSS.
(c) The Third generation cellular phone system will provide universal personnel communication.
View solution
Q. Match the following symmetric block ciphers with corresponding block and key sizes:
List - I
(a) DES
(b) IDEA
(c) BLOW FISH
(d) AES
List - II
(i) block size 64 and key size ranges between 32 and 448
(ii) block size 64 and key size 64
(iii) block size 128 and key sizes 128, 192, 256
(iv) block size 64 and key size 128
Code:
(a) (b) (c) (d)
View solution
Q. Which of the following statements are true?
(a) Three broad categories of Networks are
(i) Circuit Switched Networks
(ii) Packet Switched Networks
(iii) Message Switched Networks
(b) Circuit Switched Network resources need not be reserved during the set up phase.
(c) In packet switching there is no resource allocation for packets.
View solution
Q. In Challenge-Response authentication the claimant ...............
View solution
Q. Decrypt the message “WTAAD” using the Caesar Cipher with key=15.
View solution
Q. To guarantee correction of upto t errors, the minimum Hamming distance dmin in a block code must be ................
View solution
Q. Which of the following devices takes data sent from one network device and forwards it to the destination node based on MAC address?
View solution
Q. .................. do not take their decisions on measurements or estimates of the current traffic and topology.
View solution
Q. The number of bits used for addressing in Gigabit Ethernet is ...................
View solution
Q. Which of the following layer of OSI Reference model is also called end-to-end layer?
View solution
Q. The IP address ................... is used by hosts when they are being booted.
View solution
Q. Suppose we want to download text documents at the rate of 100 pages per second. Assume that a page consists of an average of 24 lines with 80 characters in each line. What is the required bit rate of the channel?
View solution
Q. Quadrature Amplitude Modulation means changing both:
View solution
Q. If a file consisting of 50,000 characters takes 40 seconds to send, then the data rate is ........................
View solution
Q. Match the following:
List - I
(a) Data link layer
(b) Network layer
(c) Transport layer
(d) Presentation layer
List - II
(i) Encryption
(ii) Connection control
(iii) Routing
(iv) Framing
Code :
(a) (b) (c) (d)
View solution
Q. The address of a class B host is to be split into subnets with a 6 - bit subnet number. What is the maximum number of subnets and maximum number of hosts in each subnet?
View solution
Q. Which of the following statements are true?
(a) The fragmentation fields in the base header section of IPv4 have moved to the fragmentation extension header in IPv6.
(b) The authentication extension header is new in IPv6.
(c) The record route option is not implemented in IPv6.
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Networking? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!