1. A protocol which handles sending e-mail and routing e-mail between mail servers is:

(a) Internet Protocol
(b) Transport control Protocol
(c) Simple mail transfer Protocol
(d) Server control Protocol

Answer: (c)

2. A language which is used to model configuration and state data manipulated by the NETCONF protocol is:


(a) Data Manipulation Language
(b) YANG data modeling language
(c) Shell Script Language
(d) Data Definition Language

Answer: (b)

3. A networking architecture that separates the control plane from the data plane and centralizes the network controller is known as:


(a) Software-Defined Networking
(b) Network-Function Virtualization
(c) Machine-to-Network
(d) Centralized Network Controller

Answer: (a)

4. A template that allows separation of the presentation of data from the actual data by using placeholders and associated logic is:


(a) Django template
(b) URL template
(c) Xively cloud template
(d) Form template

Answer: (a)

5. Consider the following relational Schema for a library database:

Book (Title, Author, Catalog_no, Publisher, Year, Price)
Collection (Title, Author, Catalog_no)

With the following functional dependencies:
1. Title, Author → Catalog_no
2. Catalog_no →Title, Author, Publisher, Year
3. Publisher, Title, Year→ Price
Assume (Author, Title) is the key for both the schema which one of the following statements is correct?

(a) Both book and collection are in BCNF only
(b) Both book and collection are in 3NF only
(c) Book is in 2 NF and collection is in 3 NF
(d) Both book and collection are in 2 NF only

Answer: (c)

6. The time taken by the header of a message to travel between two directly-connected nodes in the network is called:


(a) Startup time
(b) Per-hop time
(c) Per-word transfer time
(d) Word-transfer time

Answer: (b)

7. Which one of the following decomposition techniques is used to decompose problems whose underlying computations correspond to a search of a space for solutions?


(a) Recursive decomposition
(b) Data decomposition
(c) Exploratory decomposition
(d) Speculative decomposition

Answer: (c)

8. In which parallel computer, the same instruction is executed synchronously by all processing units?

(a) SISD
(b) SIMD
(c) MISD
(d) MIMD

Answer: (b)

9. The ratio of time taken by single processor system and that taken by a parallel processing system is called:


(a) Efficiency
(b) Speed up
(c) Throughput
(d) Turnaround time

Answer: (b)

10. The hardware technique that detects and resolves hazards is called:


(a) Interlock
(b) Intralock
(c) Halt
(d) Inter unlock

Answer: (a)