NTA-NET (Based on NTA-UGC) Computer Science (Paper-II): Questions 832 - 835 of 2012

Access detailed explanations (illustrated with images and videos) to 2012 questions. Access all new questions we will add tracking exam-pattern and syllabus changes. Subscription can be renewed yearly absolutely FREE! View Sample Explanation or View Features.

Rs. 550.00 or

How to register?

Question number: 832

» Linear Programming Problem » LPP Standard Form, LPP in Canonical Form

Edit

Appeared in Year: 2013

MCQ▾

Question

If the primal Linear Programming problem has unbounded solution, then its dual problem will have (December paper III)

Choices

Choice (4) Response

a.

Feasible solution

b.

Alternative solution

c.

No feasible solution at all

d.

No bounded solution at all

Question number: 833

» Theory of Computation » Formal Language » Properties

Edit

Appeared in Year: 2013

MCQ▾

Question

Given the following statements:

S1: Every context-sensitive language L is recursive.

S2: There exists a recursive language that is not context sensitive.

Which statement is correct? (December paper III)

Choices

Choice (4) Response

a.

is not correct and is not correct.

b.

is correct and is correct.

c.

is not correct and is correct.

d.

is correct and is not correct.

Question number: 834

» Models for Information Channel » Rate and Optimality of Information Transmission

Edit

Appeared in Year: 2013

MCQ▾

Question

A client-server system uses a satellite network, with the satellite at a height of . What is the best-case delay in response to a request? (Note that the speed of light in air is ). (December paper III)

Choices

Choice (4) Response

a.

b.

c.

d.

Question number: 835

» Networks, Virtualization, & Cloud Computing » Network Security » Cryptography-Public Key, Secret Key

Edit

Appeared in Year: 2013

MCQ▾

Question

Find the false statement: (December paper III)

Choices

Choice (4) Response

a.

In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption.

b.

The symmetric cipher DES (Data Encryption Standard) was widely used in the industry for security product.

c.

The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.

d.

Public key algorithms use two different keys for Encryption and Decryption.

Developed by: