91. A NETCONF client that provides a command line interface for interacting with the Netopeer-server is:

(a) Netopeer-manager

(b) Netopeer-configurator

(c) Netopeer-cli

(d) Netopeer-server

Answer: (c)

92. A protocol which handles sending e-mail and routing e-mail between mail servers is:


(a) Internet Protocol

(b) Transport control Protocol

(c) Simple mail transfer Protocol

(d) Server control Protocol

Answer: (c)

93. A language which is used to model configuration and state data manipulated by the NETCONF protocol is:


(a) Data Manipulation Language

(b) YANG data modeling language

(c) Shell Script Language

(d) Data Definition Language

Answer: (b)

94. A networking architecture that separates the control plane from the data plane and centralizes the network controller is known as:


(a) Software-Defined Networking

(b) Network-Function Virtualization

(c) Machine-to-Network

(d) Centralized Network Controller

Answer: (a)

95. A template that allows separation of the presentation of data from the actual data by using placeholders and associated logic is:


(a) Django template

(b) URL template

(c) Xively cloud template

(d) Form template

Answer: (a)

96. The time taken by the header of a message to travel between two directly-connected nodes in the network is called:


(a) Startup time

(b) Per-hop time

(c) Per-word transfer time

(d) Word-transfer time

Answer: (b)

97. Which one of the following decomposition techniques is used to decompose problems whose underlying computations correspond to a search of a space for solutions?


(a) Recursive decomposition

(b) Data decomposition

(c) Exploratory decomposition

(d) Speculative decomposition

Answer: (c)

98. In which parallel computer, the same instruction is executed synchronously by all processing units?


(a) SISD

(b) SIMD

(c) MISD

(d) MIMD

Answer: (b)

99. The ratio of time taken by single processor system and that taken by a parallel processing system is called:


(a) Efficiency

(b) Speed up

(c) Throughput

(d) Turnaround time

Answer: (b)

100. The hardware technique that detects and resolves hazards is called:


(a) Interlock

(b) Intralock

(c) Halt

(d) Inter unlock

Answer: (a)