Question 301 :
Absolute time synchronization can be achieved using
- Vector time stamping method
- Christian’s method
- Lamport’s method
- Ricart-Agrawala algorithm
Question 302 :
Resource Record in DNS has_____.
- Mapping of domain Name to IP address
- Resources consumption records
- Key Performance Indicator for Domain
- Backup nodes IP Address
Question 303 :
Which of the following is a disadvantage of replication?
- Reduced network traffic
- If the database fails at one site, a copy can be located at another site.
- Each site must have the same storage capacity.
- Each transaction may proceed without coordination across the network.
Question 304 :
NTP is __________ layer protocol.
- Application
- session
- transport
- physical
Question 305 :
In the distributed system, the goal of the task assignment approach is toassign the tasks of a process to the nodes. Consider there are two nodes n1and n2 and four tasks {T1, T2, T3, T4}. Tasks T1 are assigned to node n1and tasks T2,T3,T4 are assigned to node n2.Comunication cost is as given in table below. Considering serial task assignment, the communication incur will be T1, T2, T3, T4T1-> 0, 6, 4, 0T2-> 6, 0, 8, 10T3-> 4, 8, 0, 0T4=> 0, 10, 0, 0
- 18
- 22
- 15
- 10
Question 306 :
A group server is responsible for_______ - ________ groups
- clean and deduct
- program and make funtional
- create and destroy
- advance and fail
Question 307 :
The security of a distributed system can be achieved by ______ used for their interactions .
- securing the processes and the channels
- securing the channels not process
- not securing the processes and the channels
- securing the processes not the channels
Question 308 :
All the resources are shared and integrated within one OS, in the computing paradigm named _________
- Distributed computing
- Centralized computing
- Cloud computing
- Parallel computing
Question 309 :
Which type of parallelism makes use of multiple processing elements simultaneously for solving any problem.
- Parallel Computing
- Cloud computing
- Grid computing
- Network computing
Question 310 :
In case of failure, a new transaction coordinator can be elected by _____
- Cristian's Algorithm
- Bully algorithm
- Both bully and Cristian's algorithm
- Lamport Algorithm
Question 311 :
which of the service offered by middleware is used to provide security to the various shared resources provided by the stystem?
- Persistance service
- Querying service
- Naming service
- Security service
Question 312 :
Non-token based algorithms uses ______________to order requests for the critical section
- token
- Timestamp
- sequence number
- token ID
Question 313 :
A global system of Interconnected Computer networks is called as
- Ethernet
- Intranet
- Internet
- Ultranet
Question 314 :
A process can enter into its critical section _______
- anytime
- when it receives a reply message from its parent process
- when it receives a reply message from all other processes in the system
- when it receives a reply message from its child process
Question 315 :
When a user refers to a particular file?
- system MFD is searched
- his own UFD is not searched
- both MFD and UFD are searched
- every directory is searched
Question 316 :
In mutual exclusion, processes requests to enter in
- Network
- Critical region
- Storage space
- Main memeory
Question 317 :
_____is unit of allocation and _____is unit of execution
- Process,Thread
- Thread,Process
- Procedure,process
- Method,Thread
Question 318 :
What are the two steps of a process execution?
- I/O - OS Burst
- CPU - I/O Burst
- Memory - I/O Burst
- OS - Memory Burst
Question 319 :
Message‐queuing (MQ) systems supports
- Transient Synchronous communication
- Transient asynchronous communication
- Persistent synchronous communication
- Persistent asynchronous communication
Question 320 :
In ________________________ each node periodically sends a message to the time server.
- Passive Time Server Centralized Algorithm
- Active Time Server Centralized Algorithm
- Global Averaging Distributed Algorithms
- Localized Averaging Distributed Algorithms
Question 321 :
Which is not an examples of state information ?
- Mounting information
- Description of HDD space
- Session keys
- Lock status
Question 322 :
___algorithm for coordinator election assumes that no process can fail during the election procedure until the new coordinator has been selected.
- bully algorithm
- Ring algorithm
- Lamport algorithm
- Suzuki Kasami algorithm
Question 323 :
Staleness deviations relate to the ______________
- first time a replica was updated
- first time a replica was not updated
- last time a replica was updated
- last time a replica was not updated
Question 324 :
What is process?
- program in main memory
- Program in cache memory
- program in execution
- Program in secondary memory
Question 325 :
Which of the following is not a protocol defined by X.500?
- DAP (Directory Access Protocol)
- DSP (Directory System Protocol)
- DISP (Directory Information Shadowing Protocol)
- DGP (Directory Gateway Protocol)
Question 326 :
Which address is used to identify a process on a host by the transport layer?
- physical address
- logical address
- port address
- specific address
Question 327 :
A bully election algorithm:
- picks the first process to respond to an election request.
- relies on majority vote to pick the winning process.
- assigns the role of coordinator to the processs holding the token at the time of election.
- picks the process with the largest ID.
Question 328 :
The server does not handle the request itself but passes it to a seprate thread is called ____.
- iterative server
- multi-threaded server
- concurrent server
- distributed server
Question 329 :
Suppose that two processes detect the demise of the coordinator simultaneously and both decide to hold an election using the bully algorithm. What happens?
- Each of the higher-numbered processes will get two ELECTION messages, but will ignore the first one. The election will proceed as usual
- Each of the lower-numbered processes will get two ELECTION messages, but will ignore the first one. The election will proceed as usual
- Each of the lower-numbered processes will get two ELECTION messages, but will ignore the second one. The election will proceed as usual
- Each of the higher-numbered processes will get two ELECTION messages, but will ignore the second one. The election will proceed as usual
Question 330 :
What is WPA?
- wi-fi protected access
- wired protected access
- wired process access
- wi-fi process access