Computer Distributed Computing (CDC) MCQ's




Question 391 :
In RPC system, which of the following failure may not occur


  1. The client cannot locate server
  2. The client crashes after sending a request
  3. The server crashs after receiving a request
  4. The request message from the client to the server is obtained
  

Question 392 :
Which event is concurrent with the vector clock (2, 8, 4)?


  1. (3, 9, 5)
  2. (3, 8, 4)
  3. (1, 7, 3) à
  4. (4, 8, 2)
  

Question 393 :
The protocols defined by X.500 include


  1. DISP,DOP
  2. TCP,IP
  3. ISO,OSI
  4. IP
  

Question 394 :
which of the service offered by middleware is used to do query on the distributed objects?


  1. Messaging service
  2. Persistance service
  3. Concurrency service
  4. Querying service
  

Question 395 :
In RPC, array is passed from client to server using


  1. Call by value
  2. call by reference
  3. call-by-copy/restore
  4. None of the above
  

Question 396 :
The security of distributed system can be achieved in terms of various security goals,which one is not the goal


  1. Authentication
  2. Authorization
  3. Confidentiality
  4. Denial Service
  

Question 397 :
Processes on the remote systems are identified by ___________


  1. host ID
  2. host name and identifier
  3. identifier
  4. process ID
  

Question 398 :
In distributed systems, a logical clock is associated with ______________.


  1. each instruction
  2. each process
  3. each register
  4. each ALU
  

Question 399 :
datanodes and namenode are two elements of which file system?


  1. AFS
  2. HDFS
  3. NFS
  4. None of the above
  

Question 400 :
A process can enter into its critical section ____________


  1. anytime
  2. when it receives a reply message from its parent process
  3. when it receives a reply message from all other processes in the system
  4. all the time
  

Question 401 :
Hide the failure and recovery of a resource is known as which transparency


  1. Failure
  2. Location
  3. Migration
  4. Relocation
  

Question 402 :
From the following which is not a type of Communication


  1. Persistent and transient communication
  2. Synchronous and asynchronous communication
  3. Persistent synchronous and persistent asynchronous communication
  4. Non persistent communication
  

Question 403 :
Message passing provides a mechanism to allow processes to communicate and to synchronize their actions ________


  1. By sharing the same address space
  2. without sharing the same address space
  3. by sharing the same Process Identifier
  4. by sharing the same process number
  

Question 404 :
A relative name defines a path from the _________ context to the specified object.


  1. root
  2. current
  3. absolute
  4. relative
  

Question 405 :
Message queuing systems is design for __________


  1. transient communication
  2. synchronous communication
  3. tightly coupled communication
  4. loosely coupled communication
  

Question 406 :
What are the characteristics of mutual exclusion using centralized approach ?


  1. One processor as coordinator which handles all requests
  2. It requires request,reply and release per critical section entry
  3. The method is free from starvation
  4. All of the mentioned
  

Question 407 :
A bully election algorithm:


  1. picks the first process to respond to an election request.
  2. relies on majority vote to pick the winning process.
  3. assigns the role of coordinator to the processs holding the token at the time of election.
  4. picks the process with the largest ID.
  

Question 408 :
Which one is not a primitive of message passing primitive.


  1. MPI_RECV ()
  2. MPI_SEND ()
  3. WRITE ()
  4. MPI_BSEND ()
  

Question 409 :
In ______ System any communication between the processors takes place through the shared memory.


  1. Tightly Coupled system
  2. Loosely Coupled System
  3. Middleware System
  4. Scientific System
  

Question 410 :
The degree at which the conflicting read/write access is tolerated is defined as_________.


  1. Concurrency
  2. Consistency
  3. Availability
  4. Isolation
  

Question 411 :
In _____ distributed system the client and server both should be actively participated in the communication process


  1. Parvasive
  2. Asynchronous
  3. Synchronous
  4. Middleware
  

Question 412 :
A typical __________ program obtains a remote reference to one or more remote objects on a server and then invokes methods on them


  1. Client
  2. server
  3. thread
  4. concurrent
  

Question 413 :
Which of the following is not a distributed computing model?


  1. Processor-pool model
  2. Workstation server model
  3. Failure model
  4. peer-to-peer
  

Question 414 :
A process is _________________


  1. program in main memory
  2. Program in cache memory
  3. program in secondary storage
  4. program in execution
  

Question 415 :
The ______________ is always a controller in the client-server Scenario.


  1. Client
  2. Slave
  3. Server
  4. User
  

Question 416 :
DNS stands for?


  1. Direct Network System
  2. Direct Name System
  3. Domain Name System
  4. Domain Network System
  

Question 417 :
A request, at the risk of server never execution is _________.


  1. Never Reissue
  2. Always Reissue
  3. Reissue a request on acknoledgment
  4. Reissue a request on no acknoledgment
  

Question 418 :
Which of the following is not the major component of a distributed file system : ______________.


  1. Storage Service
  2. True file service
  3. Name service
  4. Authorization service
  

Question 419 :
Which one of the following explains the sequential file access method?


  1. random access according to the given byte number
  2. read bytes one at a time, in order
  3. read/write sequentially by record
  4. read/write randomly by record
  

Question 420 :
The use of more information gives rise to_________.


  1. Information redundancy
  2. Time redundancy
  3. Physical redundancy
  4. Data Redundancy
  
Pages