Computer Networks
Concepts of Layering
Marks 1Marks 2
Data Link Layer and Switching
Marks 1Marks 2
Network Layer
Marks 1Marks 2
Application Layer Protocol
Marks 1Marks 2
Routing Algorithm
Marks 1Marks 2
TCP UDP Sockets and Congestion Control
Marks 1Marks 2
Lan Technologies and Wi-Fi
Marks 1Marks 2
Network Security
Marks 1Marks 2
1
GATE CSE 2007
MCQ (Single Correct Answer)
+1
-0.3
Consider the following two statements:

i. A hash function (these are often used for computing digital signatures) is an injective function.
ii. encryption technique such as DES performs a permutation on the elements of its input alphabet.

Which one of the following options is valid for the above two statements?
A
Both are false
B
Statement (i) is true and the other is false
C
Statement (ii) is true and the other is false
D
Both are true
2
GATE CSE 2007
MCQ (Single Correct Answer)
+1
-0.3
The minimum positive integer p such that (3p modulo 17) = 1 is
A
5
B
8
C
12
D
16
3
GATE CSE 2007
MCQ (Single Correct Answer)
+1
-0.3
Exponentiation is a heavily used operation in public key cryptography. Which of the following options is the tightest upper bound on the number of multiplications required to compute (bn mod m),$$0 \le b,n \le m$$?
A
$${\rm O}\left( {\log n} \right)$$
B
$${\rm O}\left( {\sqrt n } \right)$$
C
$${\rm O}\left( {{n \over {\log n}}} \right)$$
D
$${\rm O}\left( n \right)$$
4
GATE CSE 2004
MCQ (Single Correct Answer)
+1
-0.3
A sender is employing public key Cryptography to send a secret message to a receiver. Which one of the following statement is true?
A
Sender encrypts using receiver's public key.
B
Sender encrypts using his own public key.
C
Receiver decrypts using sender's public key.
D
Receiver decrypts using his own public key.
GATE CSE Subjects
Theory of Computation
Operating Systems
Algorithms
Digital Logic
Database Management System
Data Structures
Computer Networks
Software Engineering
Compiler Design
Web Technologies
General Aptitude
Discrete Mathematics
Programming Languages
Computer Organization