NTA-NET (Based on NTA-UGC) Computer Science (Paper-II): Questions 832 - 834 of 2104

Access detailed explanations (illustrated with images and videos) to 2104 questions. Access all new questions we will add tracking exam-pattern and syllabus changes. Unlimited Access for Unlimited Time!

View Sample Explanation or View Features.

Rs. 550.00 or

How to register?

Question number: 832

» Theory of Computation » Formal Language » Properties

Edit

Appeared in Year: 2013

MCQ▾

Question

Given the following statements:

S1: Every context-sensitive language L is recursive.

S2: There exists a recursive language that is not context sensitive.

Which statement is correct? (December paper III)

Choices

Choice (4)Response

a.

is not correct and is not correct.

b.

is correct and is correct.

c.

is not correct and is correct.

d.

is correct and is not correct.

Question number: 833

» Models for Information Channel » Rate and Optimality of Information Transmission

Edit

Appeared in Year: 2013

MCQ▾

Question

A client-server system uses a satellite network, with the satellite at a height of . What is the best-case delay in response to a request? (Note that the speed of light in air is ). (December paper III)

Choices

Choice (4)Response

a.

b.

c.

d.

Question number: 834

» Networks, Virtualization, & Cloud Computing » Network Security » Cryptography-Public Key, Secret Key

Edit

Appeared in Year: 2013

MCQ▾

Question

Find the false statement: (December paper III)

Choices

Choice (4)Response

a.

In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption.

b.

The symmetric cipher DES (Data Encryption Standard) was widely used in the industry for security product.

c.

The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.

d.

Public key algorithms use two different keys for Encryption and Decryption.

Developed by: