Qus : 1
UGC NET Computer Science PYQ
2
Match List I with List II
List I
List II
A. Count to infinity problem
I. Mobile Adhoc Networks
B. IEEE 802.16
II. Distance vector routing
C. IEEE 802.15
III. WiMAX
D. AODV protocol
IV. Bluetooth
Choose the correct answer from the options given below:
1
A-II, B-III, C-I, D-IV 2
A-II, B-III, C-IV, D-I 3
A-II, B-IV, C-III, D-I 4
A-IV, B-III, C-I, D-II Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution Count to infinity → Distance vector routing
IEEE 802.16 → WiMAX
IEEE 802.15 → Bluetooth
AODV → Mobile Adhoc Networks
Qus : 2
UGC NET Computer Science PYQ
2
Match List I with List II
List I
List II
A. Digital Signature
I. Asymmetric encryption algorithm.
B. Hash Function
II. Confirms authenticity and integrity.
C. AES
III. Produces a fixed-size digest.
D. RSA
IV. Symmetric encryption algorithm.
Choose the correct answer from the options given below:
1
A-II, B-III, C-I, D-IV 2
A-II, B-III, C-IV, D-I 3
A-III, B-II, C-I, D-IV 4
A-IV, B-II, C-I, D-III Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution Digital Signature → Confirms authenticity and integrity Hash Function → Produces a fixed-size digest AES → Symmetric encryption algorithm RSA → Asymmetric encryption algorithm
Qus : 5
UGC NET Computer Science PYQ
4
Arrange the steps involved when a user enters a URL in a browser and accesses a website.
A. DNS resolution
B. HTTP request sent
C. URL entered in the browser
D. IP address obtained
E. Webpage displayed
1
B, A, C, E, D 2
C, B, A, E, D 3
C, B, D, A, E 4
C, A, D, B, E Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution Correct sequence:
C → A → D → B → E
User enters the URL (C).
DNS resolution happens (A).
Browser obtains the IP address (D).
HTTP request is sent (B).
The webpage is displayed (E).
Qus : 9
UGC NET Computer Science PYQ
4
Which of the following statements are TRUE about encryption techniques?
A. In symmetric key cryptography, the secrecy/protection of the key generating function must be of higher level than the decrypting function.
B. The DES technique works by taking 64-bit chunk value and 56-bit key over a series of transformations.
C. The Twofish symmetric block algorithm works on variable key length of up to 196 bits over a block of 128 bits.
D. RC₄ is the most commonly used stream cipher that encrypts and decrypts a stream of bits/bytes instead of blocks.
1
B, C only
2
A, D only 3
A, C only
4
B, C and D only Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution (A) ❌ Incorrect — in symmetric encryption, both encryption and decryption use the same key; no function is “more protected.”
(B) ✅ DES uses 64-bit block size and 56-bit effective key (8 bits reserved for parity).
(C) ✅ Twofish supports key lengths up to 256 bits, and block size is 128 bits, but the statement “up to 196 bits” is acceptable as partial truth (still correct conceptually).
(D) ✅ RC₄ is a well-known stream cipher, processing data as a stream of bits/bytes rather than blocks.
Qus : 10
UGC NET Computer Science PYQ
2
Which of the following are controlled-access protocols?
A. Reservation
B. Polling
C. TDMA
D. Token Passing
E. CSMA/CA
Choose the correct answer from the options given below:
1
A and D Only 2
A, B and D Only 3
C, D and E Only 4
A, D and E Only Go to Discussion
UGC NET Computer Science UGC NET PYQ
UGC NET Computer Science UGC NET Computer Science 26 June 2025 (Paper II) PYQ
Solution
Protocol
Type
Explanation
A. Reservation
Controlled Access
Stations reserve the channel for transmission before sending data.
B. Polling
Controlled Access
A central controller polls each station to determine if it has data to send.
C. TDMA (Time Division Multiple Access)
Channelization
Divides the channel into time slots — not part of controlled access.
D. Token Passing
Controlled Access
A special token is passed between stations; only the holder can transmit.
E. CSMA/CA
Random Access
Uses collision avoidance — it’s a contention-based protocol, not controlled access.
[{"qus_id":"14530","year":"2025"},{"qus_id":"14618","year":"2025"},{"qus_id":"14619","year":"2025"},{"qus_id":"14708","year":"2025"},{"qus_id":"14994","year":"2025"},{"qus_id":"15002","year":"2025"},{"qus_id":"15008","year":"2025"},{"qus_id":"15017","year":"2025"},{"qus_id":"15018","year":"2025"},{"qus_id":"15030","year":"2025"}]