Question 391 :
In RPC system, which of the following failure may not occur
- The client cannot locate server
- The client crashes after sending a request
- The server crashs after receiving a request
- The request message from the client to the server is obtained
Question 392 :
Which event is concurrent with the vector clock (2, 8, 4)?
- (3, 9, 5)
- (3, 8, 4)
- (1, 7, 3) à
- (4, 8, 2)
Question 393 :
The protocols defined by X.500 include
- DISP,DOP
- TCP,IP
- ISO,OSI
- IP
Question 394 :
which of the service offered by middleware is used to do query on the distributed objects?
- Messaging service
- Persistance service
- Concurrency service
- Querying service
Question 395 :
In RPC, array is passed from client to server using
- Call by value
- call by reference
- call-by-copy/restore
- None of the above
Question 396 :
The security of distributed system can be achieved in terms of various security goals,which one is not the goal
- Authentication
- Authorization
- Confidentiality
- Denial Service
Question 397 :
Processes on the remote systems are identified by ___________
- host ID
- host name and identifier
- identifier
- process ID
Question 398 :
In distributed systems, a logical clock is associated with ______________.
- each instruction
- each process
- each register
- each ALU
Question 399 :
datanodes and namenode are two elements of which file system?
- AFS
- HDFS
- NFS
- None of the above
Question 400 :
A process can enter into its critical section ____________
- anytime
- when it receives a reply message from its parent process
- when it receives a reply message from all other processes in the system
- all the time
Question 401 :
Hide the failure and recovery of a resource is known as which transparency
- Failure
- Location
- Migration
- Relocation
Question 402 :
From the following which is not a type of Communication
- Persistent and transient communication
- Synchronous and asynchronous communication
- Persistent synchronous and persistent asynchronous communication
- Non persistent communication
Question 403 :
Message passing provides a mechanism to allow processes to communicate and to synchronize their actions ________
- By sharing the same address space
- without sharing the same address space
- by sharing the same Process Identifier
- by sharing the same process number
Question 404 :
A relative name defines a path from the _________ context to the specified object.
- root
- current
- absolute
- relative
Question 405 :
Message queuing systems is design for __________
- transient communication
- synchronous communication
- tightly coupled communication
- loosely coupled communication
Question 406 :
What are the characteristics of mutual exclusion using centralized approach ?
- One processor as coordinator which handles all requests
- It requires request,reply and release per critical section entry
- The method is free from starvation
- All of the mentioned
Question 407 :
A bully election algorithm:
- picks the first process to respond to an election request.
- relies on majority vote to pick the winning process.
- assigns the role of coordinator to the processs holding the token at the time of election.
- picks the process with the largest ID.
Question 408 :
Which one is not a primitive of message passing primitive.
- MPI_RECV ()
- MPI_SEND ()
- WRITE ()
- MPI_BSEND ()
Question 409 :
In ______ System any communication between the processors takes place through the shared memory.
- Tightly Coupled system
- Loosely Coupled System
- Middleware System
- Scientific System
Question 410 :
The degree at which the conflicting read/write access is tolerated is defined as_________.
- Concurrency
- Consistency
- Availability
- Isolation
Question 411 :
In _____ distributed system the client and server both should be actively participated in the communication process
- Parvasive
- Asynchronous
- Synchronous
- Middleware
Question 412 :
A typical __________ program obtains a remote reference to one or more remote objects on a server and then invokes methods on them
- Client
- server
- thread
- concurrent
Question 413 :
Which of the following is not a distributed computing model?
- Processor-pool model
- Workstation server model
- Failure model
- peer-to-peer
Question 414 :
A process is _________________
- program in main memory
- Program in cache memory
- program in secondary storage
- program in execution
Question 415 :
The ______________ is always a controller in the client-server Scenario.
- Client
- Slave
- Server
- User
Question 416 :
DNS stands for?
- Direct Network System
- Direct Name System
- Domain Name System
- Domain Network System
Question 417 :
A request, at the risk of server never execution is _________.
- Never Reissue
- Always Reissue
- Reissue a request on acknoledgment
- Reissue a request on no acknoledgment
Question 418 :
Which of the following is not the major component of a distributed file system : ______________.
- Storage Service
- True file service
- Name service
- Authorization service
Question 419 :
Which one of the following explains the sequential file access method?
- random access according to the given byte number
- read bytes one at a time, in order
- read/write sequentially by record
- read/write randomly by record
Question 420 :
The use of more information gives rise to_________.
- Information redundancy
- Time redundancy
- Physical redundancy
- Data Redundancy