GATE Computer Science: Questions 585 - 591 of 913

Get 1 year subscription: Access detailed explanations (illustrated with images and videos) to 913 questions. Access all new questions we will add tracking exam-pattern and syllabus changes. View Sample Explanation or View Features.

Rs. 450.00 or

Question number: 585

» Computer Networks » Congestion Control

MCQ▾

Question

Global System for Mobile Communication CGSM) is which generation cellular Phone system?

Choices

Choice (4) Response
a.

Third

b.

first

c.

second

d. None of the above

Question number: 586

» Databases » Relational Model

MCQ▾

Question

what is a components of the entity-relationship (E-R) data model?

Choices

Choice (4) Response
a.

Retangle

b.

Lines

c.

Diamonds

d. All a. , b. and c. are correct

Question number: 587

» Databases » Transactions and Concurrency Control

MCQ▾

Question

A ________ is a unit of program execution that accesses and possibly updates various data items

Choices

Choice (4) Response
a.

transformation

b.

transaction

c.

transfer

d. Question does not provide sufficient data or is vague

Question number: 588

» Computer Networks » Flow and Error Control Techniques

MCQ▾

Question

If the bit string 0101101101101111110 is subjected to bit stuffing for the flag string 01111110, the output string is?

Choices

Choice (4) Response
a.

01111011111011111100

b.

10000100010000011

c.

001110110110011111010

d. None of the above

Question number: 589

» Computer Networks » Application Layer Protocols

MCQ▾

Question

Telnet is a general-purpose ________ application program.

Choices

Choice (4) Response
a.

Server –server

b.

Client –client

c.

Client –server

d. None of the above

Question number: 590

» Computer Networks » Congestion Control

MCQ▾

Question

CSMA/CA stands for

Choices

Choice (4) Response
a.

Multiple association with collision Avoidance

b.

Carrier Sense Multiple Access with collision Avoidance

c.

Carrier Sense Access with collection Avoidance

d. None of the above

Question number: 591

» Computer Networks » Network Security - Public Key and Private Key Cryptography

MCQ▾

Question

Which cryptography, the same key is used by both parties?

Choices

Choice (4) Response
a.

symmetric-key

b.

Primary Key

c.

Asymmetric-key

d. Both a. and c. are correct

Sign In