McqMate
1. |
A distributed system is defined as a collection of autonomous computers linked by a network with software designed to produce an integrated computing facility. |
A. | true |
B. | false |
Answer» A. true |
2. |
A “glue” between client and server parts of application |
A. | middleware |
B. | firmware |
C. | package |
D. | system software |
Answer» A. middleware |
3. |
The hardware of DS has two types |
A. | multiprocessor system,multicomputer system |
B. | multiprocessor system,unicomputer system |
C. | uniprocessor system,multicomputer system |
D. | uniprocessor system,unicomputer system |
Answer» A. multiprocessor system,multicomputer system |
4. |
Process Fail - Stop in process omission faults |
A. | can be detected in synchronous system. |
B. | can be detected in asynchronous system. |
C. | can be detected in synchronous and asynchronous system. |
D. | can be detected in standalone system. |
Answer» A. can be detected in synchronous system. |
5. |
Distributed pervasive system is also known as |
A. | ubiquitous computing |
B. | user interface design |
C. | graphical user interface |
D. | peer to peer system |
Answer» A. ubiquitous computing |
6. |
Type of cluster computing is |
A. | load sharing cluster |
B. | load holding cluster |
C. | load replication cluster |
D. | load balancing cluster |
Answer» D. load balancing cluster |
7. |
Type of grid computing is |
A. | collaborative grid |
B. | system grid |
C. | process grid |
D. | channel grid |
Answer» A. collaborative grid |
8. |
Scaling transparency hides |
A. | system expansion |
B. | system collaboration |
C. | system failure |
D. | system security |
Answer» A. system expansion |
9. |
Internet provides for remote login. |
A. | telnet |
B. | http |
C. | ftp |
D. | rpc |
Answer» A. telnet |
10. |
The header usually consists of the following elements in IPC I. Sequence number II. Structural information III. Address IV. File mode(Read/ Write) |
A. | i,iii, iv |
B. | i,ii, iii |
C. | i, ii, iv |
D. | i,iv |
Answer» B. i,ii, iii |
11. |
In RMI, the objects are passed by . |
A. | value |
B. | reference |
C. | value and reference |
D. | object |
Answer» A. value |
12. |
What are the exceptions which have to be handled in a RMI client program? |
A. | malformedurlexception |
B. | notfoundexception |
C. | arithmeticexception |
D. | class•not•found•excepti on |
Answer» A. malformedurlexception |
13. |
Transient communication done by layer |
A. | network |
B. | transport |
C. | physical |
D. | session |
Answer» B. transport |
14. |
The local operating system on the server machine passes the incoming packets to the |
A. | server stub |
B. | client stub |
C. | client operating system |
D. | binding agent |
Answer» A. server stub |
15. |
Machine that places the request to access the data is generally called as . |
A. | server machine |
B. | client machine |
C. | request machine |
D. | database server |
Answer» B. client machine |
16. |
provides programmers a familiar programming model by extending the local procedure call to a distributed environment |
A. | distributed environment |
B. | permanent procedure call |
C. | process and file |
D. | remote procedure call |
Answer» D. remote procedure call |
17. |
An architecture where clients first communicate the server for data then format and display it to the users, is known as |
A. | client/server architecture |
B. | three-tier architecture |
C. | two-tier architecture |
D. | peer-to-peer architecture |
Answer» A. client/server architecture |
18. |
is an object acting as a gateway for the client side. |
A. | skeleton |
B. | stub |
C. | remote |
D. | server |
Answer» B. stub |
19. |
Message passing provides a mechanism to allow processes to communicate and to synchronize their actions |
A. | by sharing the same address space |
B. | without sharing the same address space |
C. | by sharing the same process number and process identifier |
D. | by sharing port number |
Answer» A. by sharing the same address space |
20. |
Which of the following allocates/deallocates buffers |
A. | rrl |
B. | stub/skeleton layer |
C. | transport layer |
D. | networking layer |
Answer» A. rrl |
21. |
OSI stands for |
A. | open system interconnection |
B. | operating system interface |
C. | optical serviceimplementation |
D. | open service internet |
Answer» A. open system interconnection |
22. |
Which address is used to identify a process on a host by the transport layer? |
A. | physical address |
B. | logical address |
C. | port address |
D. | specific address |
Answer» C. port address |
23. |
In all reliable multicast group communication |
A. | n\ response expected from the receiver |
B. | response from any of the receiver required |
C. | response from \m\(1<m<n) of the \n\ receiver required |
D. | response needed from all the receivers |
Answer» D. response needed from all the receivers |
24. |
If processes p and q both receive messages m and m', then p receives m before m' if and only if q receives m before m'.The order delivery is called |
A. | absolute ordering |
B. | consistent ordering |
C. | causal ordering |
D. | fifo ordering |
Answer» B. consistent ordering |
25. |
What is close group in group communication? |
A. | only members can send messages to the group as a whole |
B. | processes that are not members (clients) can send message to the group. |
C. | the idea of groups is to support replicated servers |
D. | processes that are not members (clients) but close to the group can send message to the group. |
Answer» A. only members can send messages to the group as a whole |
26. |
all related objects moved and left to a server upon the first RPC |
A. | call by value |
B. | call by move |
C. | call by visit |
D. | call by reference |
Answer» B. call by move |
27. |
What is the feature of stateful server? |
A. | longer server recovery time |
B. | quick recovery after reboot |
C. | file operations must be idempotent |
D. | simple server design |
Answer» A. longer server recovery time |
28. |
is a process that prevents multiple threads or processes from accessing shared resources at the same time. |
A. | critical section |
B. | deadlock |
C. | message passing |
D. | mutual exclusion |
Answer» D. mutual exclusion |
29. |
Absolute time synchronization can be achieved using |
A. | vector time stamping method |
B. | christian’s method |
C. | lamport’s method |
D. | ricart-agrawala algorithm |
Answer» B. christian’s method |
30. |
Which mutual exclusion algorithm is useful when the membership of the group is unknown? |
A. | centralized |
B. | lamport’s. |
C. | token ring |
D. | decentralized algorithm |
Answer» A. centralized |
31. |
Which event is concurrent with the vector clock (2, 8, 4)? |
A. | (3,9,5) |
B. | (3,8,4) |
C. | (1,7,3) |
D. | (4,8,2) |
Answer» D. (4,8,2) |
32. |
A client gets a timestamp of 4:12:30.500 from a
|
A. | 1970-01-01 04:12:30 |
B. | 1970-01-01 04:12:30 |
C. | 1970-01-01 04:12:32 |
D. | 1970-01-01 04:12:32 |
Answer» C. 1970-01-01 04:12:32 |
33. |
NTP is layer protocol. |
A. | application |
B. | session |
C. | transport |
D. | physical |
Answer» A. application |
34. |
Which of the following is an example of election algorithm. |
A. | berkley algorithm: |
B. | bully algorithm. |
C. | cristian’s algorithm |
D. | lamport’s |
Answer» B. bully algorithm. |
35. |
For each critical section (CS) execution, Ricart-Agrawala algorithm requires
|
A. | 3(n − 1), t |
B. | 2(n − 1), t |
C. | (n − 1), 2t |
D. | (n − 1), t |
Answer» B. 2(n − 1), t |
36. |
For each critical section (CS) execution, maekawa’s algorithm requires
|
A. | √n , t |
B. | 2√n , t |
C. | 3√n , t |
D. | 3√n , 2t |
Answer» D. 3√n , 2t |
37. |
RAYMOND'S TREE BASED ALGORITHM is an |
A. | non- token based algorithm. |
B. | token based algorithm. |
C. | centralized based algorithm |
D. | physical clock synchronization algorithm. |
Answer» B. token based algorithm. |
38. |
Suzuki-Kasami's Broadcast Algorithm is an |
A. | non- token based algorithm. |
B. | token based algorithm. |
C. | centralized based algorithm |
D. | physical clock synchronization algorithm. |
Answer» B. token based algorithm. |
39. |
Full form of NTP is: |
A. | network time protocol |
B. | new time protocol |
C. | new timestamp protocol |
D. | network timestamp protocol |
Answer» A. network time protocol |
40. |
Which algorithm requires "1 to ∞" messages to enter and leave a critical region? |
A. | token ring algorithm |
B. | centralized algorithm |
C. | decentralized algorithm |
D. | distributed algorithm |
Answer» A. token ring algorithm |
41. |
Pretransfering also known as |
A. | premigrating |
B. | precopying |
C. | prefiltering |
D. | postcopying |
Answer» B. precopying |
42. |
change the state of thread from suspe |
A. | run() |
B. | yield() |
C. | destroy() |
D. | start() |
Answer» D. start() |
43. |
Distributed syatem consists of set of resour |
A. | printer |
B. | processor |
C. | cd |
D. | processes |
Answer» B. processor |
44. |
This is not feature of cooperative algorithm |
A. | complex |
B. | larger overhead |
C. | worst stability |
D. | better stability |
Answer» C. worst stability |
45. |
How is access to resources of various machines is done? |
A. | remote logging using ssh or telnet |
B. | zone are configured for automatic access |
C. | ftp is not used |
D. | ftp is used |
Answer» A. remote logging using ssh or telnet |
46. |
What are the characteristics of data migration? |
A. | transfer data by entire file or immediate portion required |
B. | transfer the computation rather than the data |
C. | execute an entire process or parts of it at different sites |
D. | execute an entire process or parts of it at same site |
Answer» A. transfer data by entire file or immediate portion required |
47. |
What are the characteristics of computation migration? |
A. | transfer data by entire file or immediate portion required |
B. | transfer the computation rather than the data |
C. | execute an entire process or parts of it at different sites |
D. | execute an entire process or parts of it at same site |
Answer» B. transfer the computation rather than the data |
48. |
What are the characteristics of process migr |
A. | transfer data by entire file or immediate portion required |
B. | transfer the computation rather than the data |
C. | execute an entire process or parts of it at different sites |
D. | execute an entire process or parts of it at same site |
Answer» C. execute an entire process or parts of it at different sites |
49. |
When the process issues an I/O request |
A. | it is placed in an i/o queue |
B. | it is placed in a waiting queue |
C. | it is placed in the ready queue |
D. | it is placed in the job queue |
Answer» A. it is placed in an i/o queue |
50. |
Absolute time ordering of all shared accesses matters in |
A. | sequential consistency |
B. | casual consistency |
C. | strict consistency |
D. | weak consistency |
Answer» C. strict consistency |
51. |
In Casual consistency model all processes shared accesses in |
A. | random order |
B. | same order |
C. | sequential order |
D. | specific order |
Answer» B. same order |
52. |
In which of the following consistency model all writes become perceptible to all processes |
A. | strict |
B. | weak |
C. | casual |
D. | sequential |
Answer» A. strict |
53. |
consistency is that write operations by the same process are performed in the correct order everywhere. |
A. | weak |
B. | strict |
C. | eventual |
D. | fifo |
Answer» D. fifo |
54. |
Any successive write operation by a process on a data item x will be performed on a copy of x that is up to date with the value most recently read by that process. |
A. | monotonic-write |
B. | writes follows reads |
C. | read your writes |
D. | monotonic-read |
Answer» B. writes follows reads |
55. |
replicas are used only to improve access time on data |
A. | client initiated |
B. | server initiated |
C. | permanent |
D. | dynamic |
Answer» A. client initiated |
56. |
In receivers never acknowledge the successful delivery of multicast message but instead report only when missing the message. |
A. | basic reliable multicasting |
B. | non-hierarchical feedback control |
C. | hierarchical feedback control |
D. | atomic multicast |
Answer» B. non-hierarchical feedback control |
57. |
A problem with the protocol is that when the coordinator has crashed, participants may not be able to reach a final decision. |
A. | one-phase commit |
B. | three-phase commit |
C. | two-phase commit |
D. | virtual synchrony |
Answer» C. two-phase commit |
58. |
Optimistic logging protocols need to keep track of |
A. | independencies |
B. | checking points |
C. | dependencies |
D. | erroneous state |
Answer» C. dependencies |
59. |
Processor Consistency model guarantees and conforms that |
A. | all write accomplished on identical memory location in identical sequence. |
B. | all write accomplished on random memory location in random sequence |
C. | all write accomplished on random memory location in identical sequence |
D. | all write accomplished on identical memory location in random order |
Answer» A. all write accomplished on identical memory location in identical sequence. |
60. |
Staleness deviations relate to the a replica was updated. |
A. | first time |
B. | most recent time |
C. | last time |
D. | previous time |
Answer» C. last time |
61. |
The dynamic replication algorithm takes into account |
A. | to reduce load on server |
B. | files on server can be migrated anywhere |
C. | schedule process migration |
D. | resource sharing |
Answer» A. to reduce load on server |
62. |
To improve performance, many distributed systems |
A. | combine check pointing with recovery oriented computing |
B. | combine check pointing with message logging |
C. | combine check pointing with distributed commit |
D. | combine distributed commit with message logging. |
Answer» B. combine check pointing with message logging |
63. |
File Replication is done to |
A. | increase complexity |
B. | increase cost |
C. | increase reliability |
D. | increase data |
Answer» C. increase reliability |
64. |
in NFS which funtion is used for creating new file? |
A. | open() |
B. | create() |
C. | develope() |
D. | null() |
Answer» B. create() |
65. |
which command is used to create a directory |
A. | rmdir |
B. | symlink |
C. | mkdir |
D. | open |
Answer» C. mkdir |
66. |
datanodes and namenode are two elements of which file system? |
A. | afs |
B. | hdfs |
C. | nfs |
D. | none of the above |
Answer» B. hdfs |
67. |
In which file system mapreduce function is used? |
A. | afs |
B. | nfs |
C. | hdfs |
D. | none of the above |
Answer» C. hdfs |
68. |
In distributed file system, DNS stands for? |
A. | domain name system |
B. | domain name server |
C. | directory name service |
D. | disk name system |
Answer» A. domain name system |
69. |
NFS file System uses Mechanism |
A. | rpc |
B. | corba |
C. | rmi |
D. | none of the above |
Answer» A. rpc |
70. |
map and reduce are |
A. | libraries |
B. | functions |
C. | file system |
D. | os |
Answer» B. functions |
71. |
In HDFS file System, A serves as the master and there is only one NameNode per cluster |
A. | data node |
B. | namenode |
C. | replication |
D. | data block |
Answer» B. namenode |
72. |
HDFS works in a fashion. |
A. | master-master |
B. | master-slave |
C. | slave-slave |
D. | none of the above |
Answer» B. master-slave |
73. |
In HDFS file System, NameNode is used when the Primary NameNode goes down. |
A. | rack |
B. | data |
C. | secondary |
D. | primary |
Answer» C. secondary |
74. |
In context of HDFS file system, Point out the wrong statement. |
A. | replication factor can be configured at a cluster level (default is set to 3) and also at a file level |
B. | block report from each datanode contains a list of all the blocks that are stored on that datanode |
C. | user data is stored on the local file system of datanodes |
D. | datanode is aware of the files to which the blocks stored on it belong to |
Answer» D. datanode is aware of the files to which the blocks stored on it belong to |
75. |
In HDFS, . is the slave/worker node and holds the user data in the form of Data Blocks. |
A. | datanode |
B. | namenode |
C. | data block |
D. | replication |
Answer» A. datanode |
76. |
In distributed file system,XDR stands for? |
A. | external data request |
B. | external device request |
C. | external data recovery |
D. | external data representation |
Answer» D. external data representation |
77. |
If file system is growing without affecting performance of the system then this feature is called as? |
A. | union |
B. | portable |
C. | robust |
D. | scalability |
Answer» D. scalability |
78. |
Storing file in makes it permanently available |
A. | secondary memory |
B. | ram |
C. | register |
D. | dram |
Answer» A. secondary memory |
79. |
Session file sharing semantics are suitable for caching |
A. | complete folder |
B. | complete file |
C. | one byte |
D. | one block |
Answer» B. complete file |
80. |
Network file system(NFS) is developed by? |
A. | sun microsystem |
B. | oracle |
C. | apple |
D. | honeywell |
Answer» A. sun microsystem |
81. |
The file once created can not be changed is called |
A. | rigid file |
B. | rex file |
C. | immutable file |
D. | robust file |
Answer» C. immutable file |
82. |
Remote Procedure Calls are used ____________ |
A. | for communication between two processes remotely different from each other on the same system |
B. | for communication between two processes on the same system |
C. | for communication between two processes on separate systems |
D. | none of the mentioned |
Answer» C. for communication between two processes on separate systems |
83. |
To differentiate the many network services a system supports ______ are used. |
A. | variables |
B. | sockets |
C. | ports |
D. | service names |
Answer» C. ports |
84. |
RPC provides a(an) _____ on the client side, a separate one for each remote procedure. |
A. | stub |
B. | identifier |
C. | name |
D. | process identifier |
Answer» A. stub |
85. |
What is stub? |
A. | transmits the message to the server where the server side stub receives the message and invokes procedure on the server side |
B. | packs the parameters into a form transmittable over the network |
C. | locates the port on the server |
D. | all of the mentioned |
Answer» D. all of the mentioned |
86. |
To resolve the problem of data representation on different systems RPCs define _____________ |
A. | machine dependent representation of data |
B. | machine representation of data |
C. | machine-independent representation of data |
D. | none of the mentioned |
Answer» C. machine-independent representation of data |
87. |
What is the full form of RMI? |
A. | remote memory installation |
B. | remote memory invocation |
C. | remote method installation |
D. | remote method invocation |
Answer» D. remote method invocation |
88. |
The remote method invocation __________ |
A. | allows a process to invoke memory on a remote object |
B. | allows a thread to invoke a method on a remote object |
C. | allows a thread to invoke memory on a remote object |
D. | allows a process to invoke a method on a remote object |
Answer» B. allows a thread to invoke a method on a remote object |
89. |
A process that is based on IPC mechanism which executes on different systems and can communicate with other processes using message based communication, is called ________ |
A. | local procedure call |
B. | inter process communication |
C. | remote procedure call |
D. | remote machine invocation |
Answer» C. remote procedure call |
90. |
What is not true about a distributed system? |
A. | it is a collection of processor |
B. | all processors are synchronized |
C. | they do not share memory |
D. | none of the mentioned |
Answer» B. all processors are synchronized |
91. |
What are the characteristics of a distributed file system? |
A. | its users, servers and storage devices are dispersed |
B. | service activity is not carried out across the network |
C. | they have single centralized data repository |
D. | there are multiple dependent storage devices |
Answer» A. its users, servers and storage devices are dispersed |
92. |
What is not a major reason for building distributed systems? |
A. | resource sharing |
B. | computation speedup |
C. | reliability |
D. | simplicity |
Answer» D. simplicity |
93. |
What is a stateless file server? |
A. | it keeps tracks of states of different objects |
B. | it maintains internally no state information at all |
C. | it maintains some information in them |
D. | none of the mentioned |
Answer» B. it maintains internally no state information at all |
94. |
What are the characteristics of the stateless server? |
A. | easier to implement |
B. | they are not fault-tolerant upon client or server failures |
C. | they store all information file server |
D. | they are redundant to keep data safe |
Answer» A. easier to implement |
95. |
What are the advantages of file replication? |
A. | improves availability & performance |
B. | decreases performance |
C. | they are consistent |
D. | improves speed |
Answer» A. improves availability & performance |
96. |
What are characteristic of NFS protocol? |
A. | search for file within directory |
B. | read a set of directory entries |
C. | manipulate links and directories |
D. | all of the mentioned |
Answer» D. all of the mentioned |
97. |
What is the coherency of replicated data? |
A. | all replicas are identical at all times |
B. | replicas are perceived as identical only at some points in time |
C. | users always read the most recent data in the replicas |
D. | all of the mentioned |
Answer» D. all of the mentioned |
98. |
The file once created can not be changed is called ___________ |
A. | immutable file |
B. | mutex file |
C. | mutable file |
D. | none of the mentioned |
Answer» A. immutable file |
99. |
______ of the distributed file system are dispersed among various machines of distributed system. |
A. | clients |
B. | servers |
C. | storage devices |
D. | all of the mentioned |
Answer» D. all of the mentioned |
100. |
_______ is not possible in distributed file system. |
A. | file replication |
B. | migration |
C. | client interface |
D. | remote access |
Answer» B. migration |
Done Reading?