Q.1
What term describes the physical layout of a network?
  • Topology
  • topping
  • topiology
  • toppology
Q.2
Encryption algorithm
  • the formula for encrypting (coding) the plaintext (normal message)
  • the encrypted (coded) message
  • the original message to be encrypted (coded)
  • Changing data so that it can no longer be understood without a decryption(decode) key
Q.3
Encryption
  • Changing data so that it can no longer be understood without a decryption(decode) key
  • someone at your own level
  • he "peers" are computer systems which are connected to each other via the Internet. Files can be shared directly between systems on the network without the need of a central server.
  • a powerful computer which provides services required by any of the clients (computers on the network)
Q.4
“Any number of current sources in parallel may be replaced by a single current source whose current is the algebraic sum of individual currents and source resistance is the parallel combination of individual source resistances”.The above statement is associated with
  • Thevenins theorem
  • Millmans
  • Maximum power transfer
  • None of these
Q.5
What is the secret key?
  • same key used for encryption (coding the secret message) and decryption (decoding the secret message)
  • the formula that's used to change the message back to normal
  • recovering plaintext (normal message) from ciphertext (secret message)
  • the formula for encrypting (coding) the plaintext (normal message)
Q.6
Efficiency of power transfer when maximum power transfer takes place is
  • 100
  • 80
  • 75
  • 50
Q.7
Peer (normal English use)
  • someone at your own level
  • he "peers" are computer systems which are connected to each other via the Internet. Files can be shared directly between systems on the network without the need of a central server.
  • a powerful computer which provides services required by any of the clients (computers on the network)
  • the computers which people log on to in order to use the network
Q.8
Peer-to-Peer (P2P) Networks
  • he "peers" are computer systems which are connected to each other via the Internet. Files can be shared directly between systems on the network without the need of a central server.
  • a powerful computer which provides services required by any of the clients (computers on the network)
  • the computers which people log on to in order to use the network
  • A computer network in which one centralized, powerful computer is the middle where many less powerful personal computers (called clients) are connected. The clients run programs and access data that are stored on the server
Q.9
Server
  • a powerful computer which provides services required by any of the clients (computers on the network)
  • the computers which people log on to in order to use the network
  • A computer network in which one centralized, powerful computer is the middle where many less powerful personal computers (called clients) are connected. The clients run programs and access data that are stored on the server
  • figuring out the secret code by clever guessing, maybe by trying to find patterns in the data, by using knowledge of the data.
Q.10
Client
  • the computers which people log on to in order to use the network
  • A computer network in which one centralized, powerful computer is the middle where many less powerful personal computers (called clients) are connected. The clients run programs and access data that are stored on the server
  • figuring out the secret code by clever guessing, maybe by trying to find patterns in the data, by using knowledge of the data.
  • figuring out the secret code by clever guessing, maybe by trying to find patterns in the data, by using knowledge of the data.
Q.11
Deciphering or decryption
  • recovering plaintext (normal message) from ciphertext (secret message)
  • the formula for encrypting (coding) the plaintext (normal message)
  • the encrypted (coded) message
  • the original message to be encrypted (coded)
Q.12
Decryption algorithm
  • the formula that's used to change the message back to normal
  • recovering plaintext (normal message) from ciphertext (secret message)
  • the formula for encrypting (coding) the plaintext (normal message)
  • the encrypted (coded) message
Q.13
Brute-force attack
  • Every possible key is tried to find the secret code
  • the way to decode the ciphertext (coded message) – typically by finding out the secret key
  • same key used for encryption (coding the secret message) and decryption (decoding the secret message)
  • the formula that's used to change the message back to normal
Q.14
Non-brute-force attack
  • figuring out the secret code by clever guessing, maybe by trying to find patterns in the data, by using knowledge of the data.
  • Every possible key is tried to find the secret code
  • the way to decode the ciphertext (coded message) – typically by finding out the secret key
  • same key used for encryption (coding the secret message) and decryption (decoding the secret message)
Q.15
Cryptanalytic attack
  • figuring out the secret code by clever guessing, maybe by trying to find patterns in the data, by using knowledge of the data.
  • figuring out the secret code by clever guessing, maybe by trying to find patterns in the data, by using knowledge of the data.
  • Every possible key is tried to find the secret code
  • the way to decode the ciphertext (coded message) – typically by finding out the secret key
Q.16
Client-server network
  • A computer network in which one centralized, powerful computer is the middle where many less powerful personal computers (called clients) are connected. The clients run programs and access data that are stored on the server
  • figuring out the secret code by clever guessing, maybe by trying to find patterns in the data, by using knowledge of the data.
  • figuring out the secret code by clever guessing, maybe by trying to find patterns in the data, by using knowledge of the data.
  • Every possible key is tried to find the secret code
  • s
Q.17
What network has the server placed in the centre and the devices around it?
  • Ring
  • Bus
  • Star
  • Mesh
Q.18
A router can
  • Forward data packets
  • Absorb signals
  • Repeat signals
  • absorb data packets
Q.19
A terminator
  • Makes the network quicker
  • Sends Data Packets
  • Stops data collisions
  • Connects devices to the internet
Q.20
Which network topology is the most common way of setting up a network?
  • Star
  • Ring
  • Bus
  • None of these
0 h : 0 m : 1 s