NTANET (Based on NTAUGC) Computer Science (PaperII): Questions 832  835 of 2012
Access detailed explanations (illustrated with images and videos) to 2012 questions. Access all new questions we will add tracking exampattern and syllabus changes. Subscription can be renewed yearly absolutely FREE! View Sample Explanation or View Features.
Rs. 550.00 or
How to register?
Question number: 832
» Linear Programming Problem » LPP Standard Form, LPP in Canonical Form
Appeared in Year: 2013
Question
If the primal Linear Programming problem has unbounded solution, then its dual problem will have (December paper III)
Choices
Choice (4)  Response  

a.  Feasible solution 

b.  Alternative solution 

c.  No feasible solution at all 

d.  No bounded solution at all 

Question number: 833
» Theory of Computation » Formal Language » Properties
Appeared in Year: 2013
Question
Given the following statements:
S1: Every contextsensitive language L is recursive.
S2: There exists a recursive language that is not context sensitive.
Which statement is correct? (December paper III)
Choices
Choice (4)  Response  

a.  is not correct and is not correct. 

b.  is correct and is correct. 

c.  is not correct and is correct. 

d.  is correct and is not correct. 

Question number: 834
» Models for Information Channel » Rate and Optimality of Information Transmission
Appeared in Year: 2013
Question
A clientserver system uses a satellite network, with the satellite at a height of . What is the bestcase delay in response to a request? (Note that the speed of light in air is ). (December paper III)
Choices
Choice (4)  Response  

a. 


b. 


c. 


d. 


Question number: 835
» Networks, Virtualization, & Cloud Computing » Network Security » CryptographyPublic Key, Secret Key
Appeared in Year: 2013
Question
Find the false statement: (December paper III)
Choices
Choice (4)  Response  

a.  In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. 

b.  The symmetric cipher DES (Data Encryption Standard) was widely used in the industry for security product. 

c.  The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits. 

d.  Public key algorithms use two different keys for Encryption and Decryption. 
