MCQGeeks
0 : 0 : 1
CBSE
JEE
NTSE
NEET
English
UK Quiz
Quiz
Driving Test
Practice
Games
Quiz
Electrical Engineering
Network Theorems
Quiz 1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Q.1
What term describes the physical layout of a network?
Topology
topping
topiology
toppology
Q.2
Encryption algorithm
the formula for encrypting (coding) the plaintext (normal message)
the encrypted (coded) message
the original message to be encrypted (coded)
Changing data so that it can no longer be understood without a decryption(decode) key
Q.3
Encryption
Changing data so that it can no longer be understood without a decryption(decode) key
someone at your own level
he "peers" are computer systems which are connected to each other via the Internet. Files can be shared directly between systems on the network without the need of a central server.
a powerful computer which provides services required by any of the clients (computers on the network)
Q.4
“Any number of current sources in parallel may be replaced by a single current source whose current is the algebraic sum of individual currents and source resistance is the parallel combination of individual source resistances”.The above statement is associated with
Thevenins theorem
Millmans
Maximum power transfer
None of these
Q.5
What is the secret key?
same key used for encryption (coding the secret message) and decryption (decoding the secret message)
the formula that's used to change the message back to normal
recovering plaintext (normal message) from ciphertext (secret message)
the formula for encrypting (coding) the plaintext (normal message)
Q.6
Efficiency of power transfer when maximum power transfer takes place is
100
80
75
50
Q.7
Peer (normal English use)
someone at your own level
he "peers" are computer systems which are connected to each other via the Internet. Files can be shared directly between systems on the network without the need of a central server.
a powerful computer which provides services required by any of the clients (computers on the network)
the computers which people log on to in order to use the network
Q.8
Peer-to-Peer (P2P) Networks
he "peers" are computer systems which are connected to each other via the Internet. Files can be shared directly between systems on the network without the need of a central server.
a powerful computer which provides services required by any of the clients (computers on the network)
the computers which people log on to in order to use the network
A computer network in which one centralized, powerful computer is the middle where many less powerful personal computers (called clients) are connected. The clients run programs and access data that are stored on the server
Q.9
Server
a powerful computer which provides services required by any of the clients (computers on the network)
the computers which people log on to in order to use the network
A computer network in which one centralized, powerful computer is the middle where many less powerful personal computers (called clients) are connected. The clients run programs and access data that are stored on the server
figuring out the secret code by clever guessing, maybe by trying to find patterns in the data, by using knowledge of the data.
Q.10
Client
the computers which people log on to in order to use the network
A computer network in which one centralized, powerful computer is the middle where many less powerful personal computers (called clients) are connected. The clients run programs and access data that are stored on the server
figuring out the secret code by clever guessing, maybe by trying to find patterns in the data, by using knowledge of the data.
figuring out the secret code by clever guessing, maybe by trying to find patterns in the data, by using knowledge of the data.
Q.11
Deciphering or decryption
recovering plaintext (normal message) from ciphertext (secret message)
the formula for encrypting (coding) the plaintext (normal message)
the encrypted (coded) message
the original message to be encrypted (coded)
Q.12
Decryption algorithm
the formula that's used to change the message back to normal
recovering plaintext (normal message) from ciphertext (secret message)
the formula for encrypting (coding) the plaintext (normal message)
the encrypted (coded) message
Q.13
Brute-force attack
Every possible key is tried to find the secret code
the way to decode the ciphertext (coded message) – typically by finding out the secret key
same key used for encryption (coding the secret message) and decryption (decoding the secret message)
the formula that's used to change the message back to normal
Q.14
Non-brute-force attack
figuring out the secret code by clever guessing, maybe by trying to find patterns in the data, by using knowledge of the data.
Every possible key is tried to find the secret code
the way to decode the ciphertext (coded message) – typically by finding out the secret key
same key used for encryption (coding the secret message) and decryption (decoding the secret message)
Q.15
Cryptanalytic attack
figuring out the secret code by clever guessing, maybe by trying to find patterns in the data, by using knowledge of the data.
figuring out the secret code by clever guessing, maybe by trying to find patterns in the data, by using knowledge of the data.
Every possible key is tried to find the secret code
the way to decode the ciphertext (coded message) – typically by finding out the secret key
Q.16
Client-server network
A computer network in which one centralized, powerful computer is the middle where many less powerful personal computers (called clients) are connected. The clients run programs and access data that are stored on the server
figuring out the secret code by clever guessing, maybe by trying to find patterns in the data, by using knowledge of the data.
figuring out the secret code by clever guessing, maybe by trying to find patterns in the data, by using knowledge of the data.
Every possible key is tried to find the secret code
s
Q.17
What network has the server placed in the centre and the devices around it?
Ring
Bus
Star
Mesh
Q.18
A router can
Forward data packets
Absorb signals
Repeat signals
absorb data packets
Q.19
A terminator
Makes the network quicker
Sends Data Packets
Stops data collisions
Connects devices to the internet
Q.20
Which network topology is the most common way of setting up a network?
Star
Ring
Bus
None of these
0 h : 0 m : 1 s
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Report Question
×
What's an issue?
Question is wrong
Answer is wrong
Other Reason
Want to elaborate a bit more? (optional)
Support mcqgeeks.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page