McqMate
101. |
Which one of the following hides the location where in the network the file is stored? |
A. | transparent distributed file system |
B. | hidden distributed file system |
C. | escaped distribution file system |
D. | spy distributed file system |
Answer» A. transparent distributed file system |
102. |
In a distributed file system, when a file’s physical storage location changes ___________ |
A. | file name need to be changed |
B. | file name need not to be changed |
C. | file’s host name need to be changed |
D. | file’s local name need to be changed |
Answer» B. file name need not to be changed |
103. |
In a distributed file system, _______ is mapping between logical and physical objects. |
A. | client interfacing |
B. | naming |
C. | migration |
D. | heterogeneity |
Answer» B. naming |
104. |
In a distributed file system, a file is uniquely identified by ___________ |
A. | host name |
B. | local name |
C. | the combination of host name and local name |
D. | none of the mentioned |
Answer» C. the combination of host name and local name |
105. |
There is no need to establish and terminate a connection through open and close operation in ___________ |
A. | stateless file service |
B. | stateful file service |
C. | both stateless and stateful file service |
D. | none of the mentioned |
Answer» A. stateless file service |
106. |
In distributed file system, file name does not reveal the file’s ___________ |
A. | local name |
B. | physical storage location |
C. | both local name and physical storage location |
D. | none of the mentioned |
Answer» B. physical storage location |
107. |
Which one of the following is a distributed file system? |
A. | andrew file system |
B. | network file system |
C. | novel network |
D. | all of the mentioned |
Answer» D. all of the mentioned |
108. |
What are the characteristics of mutual exclusion using centralized approach? |
A. | one processor as coordinator which handles all requests |
B. | it requires request,reply and release per critical section entry |
C. | the method is free from starvation |
D. | all of the mentioned |
Answer» D. all of the mentioned |
109. |
What are the advantages of token(with rings) passing approach?
|
A. | i |
B. | ii and iii |
C. | i, ii and iii |
D. | i, ii and iv |
Answer» D. i, ii and iv |
110. |
What are the characteristics of atomicity? |
A. | all operations associated are executed to completion or none are performed |
B. | one processor as coordinator which handles all requests |
C. | when responses are received from all processes, then the process can enter its critical section |
D. | use communication links |
Answer» A. all operations associated are executed to completion or none are performed |
111. |
What things are the transaction coordinator is responsible for? |
A. | starting the execution of the transaction |
B. | breaking transaction into a number of subtransactions |
C. | coordinating the termination of the transaction |
D. | all of the mentioned |
Answer» D. all of the mentioned |
112. |
Which of the following advantages follows the single coordinator approach? |
A. | simple implementation |
B. | simple deadlock handling |
C. | bottleneck |
D. | all of the mentioned |
Answer» D. all of the mentioned |
113. |
Which of the following disadvantages follows the single coordinator approach? |
A. | bottleneck |
B. | slow response |
C. | deadlock |
D. | one request per second |
Answer» A. bottleneck |
114. |
What are the parts of a global unique identifier? |
A. | local unique timestamp |
B. | remote timestamp |
C. | clock number |
D. | all of the mentioned |
Answer» A. local unique timestamp |
115. |
In distributed systems, a logical clock is associated with ______________ |
A. | each instruction |
B. | each process |
C. | each register |
D. | none of the mentioned |
Answer» B. each process |
116. |
If timestamps of two events are same, then the events are ____________ |
A. | concurrent |
B. | non-concurrent |
C. | monotonic |
D. | non-monotonic |
Answer» A. concurrent |
117. |
If a process is executing in its critical section ____________ |
A. | any other process can also execute in its critical section |
B. | no other process can execute in its critical section |
C. | one more process can execute in its critical section |
D. | none of the mentioned |
Answer» B. no other process can execute in its critical section |
118. |
A process can enter into its critical section ____________ |
A. | anytime |
B. | when it receives a reply message from its parent process |
C. | when it receives a reply message from all other processes in the system |
D. | none of the mentioned |
Answer» C. when it receives a reply message from all other processes in the system |
119. |
For proper synchronization in distributed systems ____________ |
A. | prevention from the deadlock is must |
B. | prevention from the starvation is must |
C. | prevention from the deadlock & starvation is must |
D. | none of the mentioned |
Answer» C. prevention from the deadlock & starvation is must |
120. |
In the token passing approach of distributed systems, processes are organized in a ring structure ____________ |
A. | logically |
B. | physically |
C. | both logically and physically |
D. | none of the mentioned |
Answer» A. logically |
121. |
In distributed systems, what will the transaction coordinator do? |
A. | starts the execution of transaction |
B. | breaks the transaction into number of sub transactions |
C. | coordinates the termination of the transaction |
D. | all of the mentioned |
Answer» D. all of the mentioned |
122. |
In case of failure, a new transaction coordinator can be elected by ____________ |
A. | bully algorithm |
B. | ring algorithm |
C. | both bully and ring algorithm |
D. | none of the mentioned |
Answer» C. both bully and ring algorithm |
123. |
In distributed systems, election algorithms assumes that ____________ |
A. | a unique priority number is associated with each active process in system |
B. | there is no priority number associated with any process |
C. | priority of the processes is not required |
D. | none of the mentioned |
Answer» A. a unique priority number is associated with each active process in system |
124. |
According to the ring algorithm, links between processes are ____________ |
A. | bidirectional |
B. | unidirectional |
C. | both bidirectional and unidirectional |
D. | none of the mentioned |
Answer» B. unidirectional |
125. |
What are the different ways distributed may suffer? |
A. | failure of a link |
B. | failure of a site |
C. | loss of message |
D. | all of the mentioned |
Answer» D. all of the mentioned |
126. |
What are design issues in distributed system structure? |
A. | scalability |
B. | fault-tolerance |
C. | clustering |
D. | all of the mentioned |
Answer» D. all of the mentioned |
127. |
What is not true about a distributed system? |
A. | it is a collection of processor |
B. | all processors are synchronized |
C. | they do not share memory |
D. | none of the mentioned |
Answer» B. all processors are synchronized |
128. |
What are the characteristics of processor in distributed system? |
A. | they vary in size and function |
B. | they are same in size and function |
C. | they are manufactured with single purpose |
D. | they are real-time devices |
Answer» A. they vary in size and function |
129. |
______ is a unique tag, usually a number identifies the file within the file system. |
A. | file identifier |
B. | file name |
C. | file type |
D. | none of the mentioned |
Answer» A. file identifier |
130. |
To create a file ____________ |
A. | allocate the space in file system |
B. | make an entry for new file in directory |
C. | allocate the space in file system & make an entry for new file in directory |
D. | none of the mentioned |
Answer» C. allocate the space in file system & make an entry for new file in directory |
131. |
By using the specific system call, we can ____________ |
A. | open the file |
B. | read the file |
C. | write into the file |
D. | all of the mentioned |
Answer» D. all of the mentioned |
132. |
What is the mounting of file system? |
A. | crating of a filesystem |
B. | deleting a filesystem |
C. | attaching portion of the file system into a directory structure |
D. | removing the portion of the file system into a directory structure |
Answer» C. attaching portion of the file system into a directory structure |
133. |
Mapping of file is managed by ____________ |
A. | file metadata |
B. | page table |
C. | virtual memory |
D. | file system |
Answer» A. file metadata |
134. |
Mapping of network file system protocol to local file system is done by ____________ |
A. | network file system |
B. | local file system |
C. | volume manager |
D. | remote mirror |
Answer» A. network file system |
135. |
Which one of the following explains the sequential file access method? |
A. | random access according to the given byte number |
B. | read bytes one at a time, in order |
C. | read/write sequentially by record |
D. | read/write randomly by record |
Answer» B. read bytes one at a time, in order |
136. |
Which of the following are the two parts of the file name? |
A. | name & identifier |
B. | identifier & type |
C. | extension & name |
D. | type & extension |
Answer» C. extension & name |
137. |
What is the mount point? |
A. | an empty directory at which the mounted file system will be attached |
B. | a location where every time file systems are mounted |
C. | is the time when the mounting is done |
D. | none of the mentioned |
Answer» A. an empty directory at which the mounted file system will be attached |
138. |
When a file system is mounted over a directory that is not empty then _____________ |
A. | the system may not allow the mount |
B. | the system must allow the mount |
C. | the system may allow the mount and the directory’s existing files will then be made obscure |
D. | all of the mentioned |
Answer» C. the system may allow the mount and the directory’s existing files will then be made obscure |
139. |
In distributed file system ________________ directories are visible from the local machine. |
A. | protected |
B. | local |
C. | private |
D. | remote |
Answer» D. remote |
140. |
In the world wide web, a ____ is needed to gain access to the remote files, and separate operations are used to transfer files. |
A. | laptop |
B. | plugin |
C. | browser |
D. | player |
Answer» C. browser |
141. |
Distributed naming services/Distributed information systems have been devised to _____________ |
A. | provide information about all the systems |
B. | provide unified access to the information needed for remote computing |
C. | provide unique names to all systems in a network |
D. | all of the mentioned |
Answer» B. provide unified access to the information needed for remote computing |
142. |
Domain name system provides _____________ |
A. | host-name-to-network-address translations for the entire internet |
B. | network-address-to-host-name translations for the entire internet |
C. | binary to hex translations for the entire internet |
D. | all of the mentioned |
Answer» A. host-name-to-network-address translations for the entire internet |
143. |
What is multimedia file? |
A. | is same as any other regular file |
B. | must be accessed at specific rate |
C. | stored on remote server can not be delivered to its client |
D. | none of the mentioned |
Answer» B. must be accessed at specific rate |
144. |
In which type of streaming multimedia file is delivered to the client, but not shared? |
A. | real-time streaming |
B. | progressive download |
C. | compression |
D. | none of the mentioned |
Answer» A. real-time streaming |
145. |
Which one of the following is the characteristic of a multimedia system? |
A. | high storage |
B. | high data rates |
C. | both high storage and high data rates |
D. | none of the mentioned |
Answer» C. both high storage and high data rates |
146. |
The delay that occur during the playback of a stream is called ___________ |
A. | stream delay |
B. | playback delay |
C. | jitter |
D. | event delay |
Answer» C. jitter |
147. |
Multimedia system require hard real time scheduling ___________ |
A. | to ensure critical tasks will be serviced within timing deadlines |
B. | to deliver the media file to the client |
C. | to minimize the delay |
D. | for security |
Answer» A. to ensure critical tasks will be serviced within timing deadlines |
148. |
The three general methods for delivering content from a server to a client across a network are ___________ |
A. | unicasting |
B. | multicasting |
C. | broadcasting |
D. | all of the mentioned |
Answer» D. all of the mentioned |
149. |
Unicasting delivers the content to ___________ |
A. | a single client |
B. | all clients, regardless whether they want the content or not |
C. | a group of receivers who indicate they wish to receive the content |
D. | none of the mentioned |
Answer» A. a single client |
150. |
Broadcasting delivers the content to ___________ |
A. | a single client |
B. | all clients, regardless whether they want the content or not |
C. | a group of receivers who indicate they wish to receive the content |
D. | none of the mentioned |
Answer» B. all clients, regardless whether they want the content or not |
151. |
Multicasting delivers the content to ___________ |
A. | a single client |
B. | all clients, regardless whether they want the content or not |
C. | a group of receivers who indicate they wish to receive the content |
D. | none of the mentioned |
Answer» C. a group of receivers who indicate they wish to receive the content |
152. |
HTTP is __________ |
A. | a stateful protocol |
B. | a stateless protocol |
C. | a protocol that maintains the status of its connection with the client |
D. | a stateless protocol that does not maintain the status of its connection with the client |
Answer» D. a stateless protocol that does not maintain the status of its connection with the client |
153. |
The problem with unicast delivery is that the ___________ |
A. | memory allocation is difficult |
B. | server must establish a separate unicast session for each client |
C. | the routers must support unicasting |
D. | the clients must be close to the server |
Answer» B. server must establish a separate unicast session for each client |
154. |
The difficulty with multicasting from a practical point of view is ___________ |
A. | memory allocation is difficult |
B. | server must establish a separate unicast session for each client |
C. | the routers must support multicasting |
D. | none of the mentioned |
Answer» C. the routers must support multicasting |
155. |
To let a client have random access to a media stream with ___________ |
A. | the protocol used must not be stateless |
B. | the server must support download |
C. | the stream should give access rights to the client |
D. | all of the mentioned |
Answer» A. the protocol used must not be stateless |
156. |
An RPC (remote procedure call) is initiated by the: |
A. | server |
B. | client |
C. | both (a) and (b) |
D. | neither (a) nor (b)( |
Answer» B. client |
157. |
RPC works between two processes. These processes may be: |
A. | on the same computer |
B. | on different computers connected with a network |
C. | both (a) and (b) |
D. | neither (a) nor (b)( |
Answer» C. both (a) and (b) |
158. |
_____is a framework for distributed objects on the Microsoft platform. |
A. | CORBA |
B. | DCOM |
C. | DDObjects |
D. | none |
Answer» B. DCOM |
159. |
___ is a framework for distributed components using a messaging paradigm. |
A. | CORBA |
B. | DCOM |
C. | DDObjects |
D. | Jt |
Answer» D. Jt |
Done Reading?