150+ Distributed Computing System (DCS) Solved MCQs

101.

Which one of the following hides the location where in the network the file is stored?

A. transparent distributed file system
B. hidden distributed file system
C. escaped distribution file system
D. spy distributed file system
Answer» A. transparent distributed file system
102.

In a distributed file system, when a file’s physical storage location changes ___________

A. file name need to be changed
B. file name need not to be changed
C. file’s host name need to be changed
D. file’s local name need to be changed
Answer» B. file name need not to be changed
103.

In a distributed file system, _______ is mapping between logical and physical objects.

A. client interfacing
B. naming
C. migration
D. heterogeneity
Answer» B. naming
104.

In a distributed file system, a file is uniquely identified by ___________

A. host name
B. local name
C. the combination of host name and local name
D. none of the mentioned
Answer» C. the combination of host name and local name
105.

There is no need to establish and terminate a connection through open and close operation in ___________

A. stateless file service
B. stateful file service
C. both stateless and stateful file service
D. none of the mentioned
Answer» A. stateless file service
106.

In distributed file system, file name does not reveal the file’s ___________

A. local name
B. physical storage location
C. both local name and physical storage location
D. none of the mentioned
Answer» B. physical storage location
107.

Which one of the following is a distributed file system?

A. andrew file system
B. network file system
C. novel network
D. all of the mentioned
Answer» D. all of the mentioned
108.

What are the characteristics of mutual exclusion using centralized approach?

A. one processor as coordinator which handles all requests
B. it requires request,reply and release per critical section entry
C. the method is free from starvation
D. all of the mentioned
Answer» D. all of the mentioned
109.

What are the advantages of token(with rings) passing approach?
i) One processor as coordinator which handles all requests
ii) No starvation if the ring is unidirectional
iii) There are many messages passed per section entered if few users want to get in section
iv) One processor as coordinator which handles all requests
v) Only one message/entry if everyone wants to get in

A. i
B. ii and iii
C. i, ii and iii
D. i, ii and iv
Answer» D. i, ii and iv
110.

What are the characteristics of atomicity?

A. all operations associated are executed to completion or none are performed
B. one processor as coordinator which handles all requests
C. when responses are received from all processes, then the process can enter its critical section
D. use communication links
Answer» A. all operations associated are executed to completion or none are performed
111.

What things are the transaction coordinator is responsible for?

A. starting the execution of the transaction
B. breaking transaction into a number of subtransactions
C. coordinating the termination of the transaction
D. all of the mentioned
Answer» D. all of the mentioned
112.

Which of the following advantages follows the single coordinator approach?

A. simple implementation
B. simple deadlock handling
C. bottleneck
D. all of the mentioned
Answer» D. all of the mentioned
113.

Which of the following disadvantages follows the single coordinator approach?

A. bottleneck
B. slow response
C. deadlock
D. one request per second
Answer» A. bottleneck
114.

What are the parts of a global unique identifier?

A. local unique timestamp
B. remote timestamp
C. clock number
D. all of the mentioned
Answer» A. local unique timestamp
115.

In distributed systems, a logical clock is associated with ______________

A. each instruction
B. each process
C. each register
D. none of the mentioned
Answer» B. each process
116.

If timestamps of two events are same, then the events are ____________

A. concurrent
B. non-concurrent
C. monotonic
D. non-monotonic
Answer» A. concurrent
117.

If a process is executing in its critical section ____________

A. any other process can also execute in its critical section
B. no other process can execute in its critical section
C. one more process can execute in its critical section
D. none of the mentioned
Answer» B. no other process can execute in its critical section
118.

A process can enter into its critical section ____________

A. anytime
B. when it receives a reply message from its parent process
C. when it receives a reply message from all other processes in the system
D. none of the mentioned
Answer» C. when it receives a reply message from all other processes in the system
119.

For proper synchronization in distributed systems ____________

A. prevention from the deadlock is must
B. prevention from the starvation is must
C. prevention from the deadlock & starvation is must
D. none of the mentioned
Answer» C. prevention from the deadlock & starvation is must
120.

In the token passing approach of distributed systems, processes are organized in a ring structure ____________

A. logically
B. physically
C. both logically and physically
D. none of the mentioned
Answer» A. logically
121.

In distributed systems, what will the transaction coordinator do?

A. starts the execution of transaction
B. breaks the transaction into number of sub transactions
C. coordinates the termination of the transaction
D. all of the mentioned
Answer» D. all of the mentioned
122.

In case of failure, a new transaction coordinator can be elected by ____________

A. bully algorithm
B. ring algorithm
C. both bully and ring algorithm
D. none of the mentioned
Answer» C. both bully and ring algorithm
123.

In distributed systems, election algorithms assumes that ____________

A. a unique priority number is associated with each active process in system
B. there is no priority number associated with any process
C. priority of the processes is not required
D. none of the mentioned
Answer» A. a unique priority number is associated with each active process in system
124.

According to the ring algorithm, links between processes are ____________

A. bidirectional
B. unidirectional
C. both bidirectional and unidirectional
D. none of the mentioned
Answer» B. unidirectional
125.

What are the different ways distributed may suffer?

A. failure of a link
B. failure of a site
C. loss of message
D. all of the mentioned
Answer» D. all of the mentioned
126.

What are design issues in distributed system structure?

A. scalability
B. fault-tolerance
C. clustering
D. all of the mentioned
Answer» D. all of the mentioned
127.

What is not true about a distributed system?

A. it is a collection of processor
B. all processors are synchronized
C. they do not share memory
D. none of the mentioned
Answer» B. all processors are synchronized
128.

What are the characteristics of processor in distributed system?

A. they vary in size and function
B. they are same in size and function
C. they are manufactured with single purpose
D. they are real-time devices
Answer» A. they vary in size and function
129.

______ is a unique tag, usually a number identifies the file within the file system.

A. file identifier
B. file name
C. file type
D. none of the mentioned
Answer» A. file identifier
130.

To create a file ____________

A. allocate the space in file system
B. make an entry for new file in directory
C. allocate the space in file system & make an entry for new file in directory
D. none of the mentioned
Answer» C. allocate the space in file system & make an entry for new file in directory
131.

By using the specific system call, we can ____________

A. open the file
B. read the file
C. write into the file
D. all of the mentioned
Answer» D. all of the mentioned
132.

What is the mounting of file system?

A. crating of a filesystem
B. deleting a filesystem
C. attaching portion of the file system into a directory structure
D. removing the portion of the file system into a directory structure
Answer» C. attaching portion of the file system into a directory structure
133.

Mapping of file is managed by ____________

A. file metadata
B. page table
C. virtual memory
D. file system
Answer» A. file metadata
134.

Mapping of network file system protocol to local file system is done by ____________

A. network file system
B. local file system
C. volume manager
D. remote mirror
Answer» A. network file system
135.

Which one of the following explains the sequential file access method?

A. random access according to the given byte number
B. read bytes one at a time, in order
C. read/write sequentially by record
D. read/write randomly by record
Answer» B. read bytes one at a time, in order
136.

Which of the following are the two parts of the file name?

A. name & identifier
B. identifier & type
C. extension & name
D. type & extension
Answer» C. extension & name
137.

What is the mount point?

A. an empty directory at which the mounted file system will be attached
B. a location where every time file systems are mounted
C. is the time when the mounting is done
D. none of the mentioned
Answer» A. an empty directory at which the mounted file system will be attached
138.

When a file system is mounted over a directory that is not empty then _____________

A. the system may not allow the mount
B. the system must allow the mount
C. the system may allow the mount and the directory’s existing files will then be made obscure
D. all of the mentioned
Answer» C. the system may allow the mount and the directory’s existing files will then be made obscure
139.

In distributed file system ________________ directories are visible from the local machine.

A. protected
B. local
C. private
D. remote
Answer» D. remote
140.

In the world wide web, a ____ is needed to gain access to the remote files, and separate operations are used to transfer files.

A. laptop
B. plugin
C. browser
D. player
Answer» C. browser
141.

Distributed naming services/Distributed information systems have been devised to _____________

A. provide information about all the systems
B. provide unified access to the information needed for remote computing
C. provide unique names to all systems in a network
D. all of the mentioned
Answer» B. provide unified access to the information needed for remote computing
142.

Domain name system provides _____________

A. host-name-to-network-address translations for the entire internet
B. network-address-to-host-name translations for the entire internet
C. binary to hex translations for the entire internet
D. all of the mentioned
Answer» A. host-name-to-network-address translations for the entire internet
143.

What is multimedia file?

A. is same as any other regular file
B. must be accessed at specific rate
C. stored on remote server can not be delivered to its client
D. none of the mentioned
Answer» B. must be accessed at specific rate
144.

In which type of streaming multimedia file is delivered to the client, but not shared?

A. real-time streaming
B. progressive download
C. compression
D. none of the mentioned
Answer» A. real-time streaming
145.

Which one of the following is the characteristic of a multimedia system?

A. high storage
B. high data rates
C. both high storage and high data rates
D. none of the mentioned
Answer» C. both high storage and high data rates
146.

The delay that occur during the playback of a stream is called ___________

A. stream delay
B. playback delay
C. jitter
D. event delay
Answer» C. jitter
147.

Multimedia system require hard real time scheduling ___________

A. to ensure critical tasks will be serviced within timing deadlines
B. to deliver the media file to the client
C. to minimize the delay
D. for security
Answer» A. to ensure critical tasks will be serviced within timing deadlines
148.

The three general methods for delivering content from a server to a client across a network are ___________

A. unicasting
B. multicasting
C. broadcasting
D. all of the mentioned
Answer» D. all of the mentioned
149.

Unicasting delivers the content to ___________

A. a single client
B. all clients, regardless whether they want the content or not
C. a group of receivers who indicate they wish to receive the content
D. none of the mentioned
Answer» A. a single client
150.

Broadcasting delivers the content to ___________

A. a single client
B. all clients, regardless whether they want the content or not
C. a group of receivers who indicate they wish to receive the content
D. none of the mentioned
Answer» B. all clients, regardless whether they want the content or not
151.

Multicasting delivers the content to ___________

A. a single client
B. all clients, regardless whether they want the content or not
C. a group of receivers who indicate they wish to receive the content
D. none of the mentioned
Answer» C. a group of receivers who indicate they wish to receive the content
152.

HTTP is __________

A. a stateful protocol
B. a stateless protocol
C. a protocol that maintains the status of its connection with the client
D. a stateless protocol that does not maintain the status of its connection with the client
Answer» D. a stateless protocol that does not maintain the status of its connection with the client
153.

The problem with unicast delivery is that the ___________

A. memory allocation is difficult
B. server must establish a separate unicast session for each client
C. the routers must support unicasting
D. the clients must be close to the server
Answer» B. server must establish a separate unicast session for each client
154.

The difficulty with multicasting from a practical point of view is ___________

A. memory allocation is difficult
B. server must establish a separate unicast session for each client
C. the routers must support multicasting
D. none of the mentioned
Answer» C. the routers must support multicasting
155.

To let a client have random access to a media stream with ___________

A. the protocol used must not be stateless
B. the server must support download
C. the stream should give access rights to the client
D. all of the mentioned
Answer» A. the protocol used must not be stateless
156.

An RPC (remote procedure call) is initiated by the:

A. server
B. client
C. both (a) and (b)
D. neither (a) nor (b)(
Answer» B. client
157.

RPC works between two processes. These processes may be:

A. on the same computer
B. on different computers connected with a network
C. both (a) and (b)
D. neither (a) nor (b)(
Answer» C. both (a) and (b)
158.

_____is a framework for distributed objects on the Microsoft platform.

A. CORBA
B. DCOM
C. DDObjects
D. none
Answer» B. DCOM
159.

___ is a framework for distributed components using a messaging paradigm.

A. CORBA
B. DCOM
C. DDObjects
D. Jt
Answer» D. Jt
Tags
Question and answers in Distributed Computing System (DCS), Distributed Computing System (DCS) multiple choice questions and answers, Distributed Computing System (DCS) Important MCQs, Solved MCQs for Distributed Computing System (DCS), Distributed Computing System (DCS) MCQs with answers PDF download