1. A protocol which handles sending e-mail and routing e-mail between mail servers is:
(a) Internet Protocol
(b) Transport control Protocol
(c) Simple mail transfer Protocol
(d) Server control Protocol
Answer: (c)
2. A language which is used to model configuration and state data manipulated by the NETCONF protocol is:
(a) Data Manipulation Language
(b) YANG data modeling language
(c) Shell Script Language
(d) Data Definition Language
Answer: (b)
3. A networking architecture that separates the control plane from the data plane and centralizes the network controller is known as:
(a) Software-Defined Networking
(b) Network-Function Virtualization
(c) Machine-to-Network
(d) Centralized Network Controller
Answer: (a)
4. A template that allows separation of the presentation of data from the actual data by using placeholders and associated logic is:
(a) Django template
(b) URL template
(c) Xively cloud template
(d) Form template
Answer: (a)
(b) Transport control Protocol
(c) Simple mail transfer Protocol
(d) Server control Protocol
Answer: (c)
2. A language which is used to model configuration and state data manipulated by the NETCONF protocol is:
(a) Data Manipulation Language
(b) YANG data modeling language
(c) Shell Script Language
(d) Data Definition Language
Answer: (b)
3. A networking architecture that separates the control plane from the data plane and centralizes the network controller is known as:
(a) Software-Defined Networking
(b) Network-Function Virtualization
(c) Machine-to-Network
(d) Centralized Network Controller
Answer: (a)
4. A template that allows separation of the presentation of data from the actual data by using placeholders and associated logic is:
(a) Django template
(b) URL template
(c) Xively cloud template
(d) Form template
Answer: (a)
5. Consider the following relational Schema for a library database:
Book (Title, Author, Catalog_no, Publisher, Year, Price)
Collection (Title, Author, Catalog_no)
Collection (Title, Author, Catalog_no)
With the following functional dependencies:
1. Title, Author → Catalog_no
2. Catalog_no →Title, Author, Publisher, Year
3. Publisher, Title, Year→ Price
Assume (Author, Title) is the key for both the schema which one of the following statements is correct?
1. Title, Author → Catalog_no
2. Catalog_no →Title, Author, Publisher, Year
3. Publisher, Title, Year→ Price
Assume (Author, Title) is the key for both the schema which one of the following statements is correct?
(a) Both book and collection are in BCNF only
(b) Both book and collection are in 3NF only
(c) Book is in 2 NF and collection is in 3 NF
(d) Both book and collection are in 2 NF only
(b) Both book and collection are in 3NF only
(c) Book is in 2 NF and collection is in 3 NF
(d) Both book and collection are in 2 NF only
Answer: (c)
(a) Startup time
(b) Per-hop time
(c) Per-word transfer time
(d) Word-transfer time
Answer: (b)
7. Which one of the following decomposition techniques is used to decompose problems whose underlying computations correspond to a search of a space for solutions?
(a) Recursive decomposition
(b) Data decomposition
(c) Exploratory decomposition
(d) Speculative decomposition
Answer: (c)
8. In which parallel computer, the same instruction is executed synchronously by all processing units?
(a) SISD
(b) SIMD
(c) MISD
(d) MIMD
Answer: (b)
9. The ratio of time taken by single processor system and that taken by a parallel processing system is called:
(a) Efficiency
(b) Speed up
(a) SISD
(b) SIMD
(c) MISD
(d) MIMD
Answer: (b)
9. The ratio of time taken by single processor system and that taken by a parallel processing system is called:
(a) Efficiency
(b) Speed up
(c) Throughput
(d) Turnaround time
Answer: (b)
10. The hardware technique that detects and resolves hazards is called:
(a) Interlock
(b) Intralock
(c) Halt
(d) Inter unlock
Answer: (a)
0 Comments
Post a Comment