Computer Distributed Computing (CDC) MCQ's




Question 421 :
In socket programming, client sends request to the server using which primitive?


  1. Socket
  2. Connect
  3. Send
  4. Receive
  

Question 422 :
_____________ is a physical clock synchronization Algorithm


  1. Cristian
  2. vector
  3. Lamport
  4. Ring
  

Question 423 :
________ Property of Distributed System offers services according to standard rules that describe the syntax and semantics of those services


  1. Openness
  2. Transparency
  3. Reliabilty
  4. Scalability
  

Question 424 :
Whatapp service uses which type of communication-


  1. Transient Synchronous communication
  2. Transient asynchronous communication
  3. Persistent synchronous communication
  4. Persistent asynchronous communication
  

Question 425 :
For each critical section (CS) execution, maekawa’s algorithm requires ___________ messages per CS execution and the Synchronization delay in the algorithm is ____________.


  1. √N , T
  2. 2√N , T
  3. 3√N , T
  4. 3√N , 2T
  

Question 426 :
Replication should be used when which of the following exist?


  1. When transmission speeds and capacity in a network prohibit frequent refreshing of large tables.
  2. When using many nodes with different operating systems and DBMSs and database designs.
  3. The application's data can be somewhat out-of-date.
  4. When using some nodes with selected operating system.
  

Question 427 :
Transparency that allows movement of resources and clients within a system is called ______.


  1. Concurrency
  2. Performance
  3. Replication
  4. Mobility
  

Question 428 :
X.500 is a


  1. directory services
  2. naming services
  3. Replication services
  4. Consistency services
  

Question 429 :
In global google sysytem The user can expect query result in


  1. 0.7 seconds
  2. 0.4 seconds
  3. 0.2 seconds
  4. 0.8 seconds
  

Question 430 :
A request, at the risk of server duplicating execution is _________.


  1. Never Reissue
  2. Always Reissue
  3. Reissue a request on acknoledgment
  4. Reissue a request on no acknoledgment
  

Question 431 :
In distributed systems, a logical clock is associated with


  1. each instruction
  2. each process
  3. each register
  4. none of the mentioned
  

Question 432 :
In Suzuki Kasami algorithm, __________ is guaranteed because there is only one token in the system and a site holds the token during the CS execution.


  1. Mutual Exclusion
  2. Performance
  3. Stability
  4. Scalability
  

Question 433 :
Which are the two complementary deadlock-prevention schemes using timestamps?


  1. The wait-die - wound-wait scheme
  2. The wait-n-watch scheme
  3. The wound-wait scheme
  4. The wait-wound - wound-wait scheme
  

Question 434 :
To manage replicated data, Front end provides transperancy


  1. by hiding fact that data is replicated.
  2. by issuing requests.
  3. by ensuring about data consistency.
  4. by contacting managers.
  

Question 435 :
A distributed locking protocol by which a resource can be protected against simultaneous access by a collection of processes that are distributed across-


  1. Multiple Processors
  2. Multiple Machines
  3. Shared memory
  4. Remote Procedure Call
  

Question 436 :
The file once created can not be changed is called ________


  1. immutable file
  2. mutex file
  3. mutable file
  4. Mutual exclusive file
  

Question 437 :
If processes p and q both receive messages m and m', then p receives m before m' if and only if q receives m before m'.The order delivery is called______________


  1. Absolute ordering
  2. Consistent ordering
  3. Causal ordering
  4. FIFO ordering
  

Question 438 :
A minimum of _____ variable(s) is/are required to be shared between processes to solve the critical section problem.


  1. 1
  2. 2
  3. 3
  4. 4
  

Question 439 :
A typical _________ program creates some remote objects, makes references to these objects accessible, and waits for clients to invoke methods on these objects.


  1. Server
  2. Client
  3. Thread
  4. Concurrent
  

Question 440 :
Hide the failure and recovery of a resource is known as which transparency


  1. Failure
  2. Location
  3. Migration
  4. Relocation
  

Question 441 :
In NFS, all client-server communication is done through


  1. RPC
  2. RMI
  3. Message Oriented Communication
  4. Streams
  

Question 442 :
________consistency is fine if clients always access the same replica.


  1. Data-centric
  2. Client centric
  3. Eventual
  4. Entry
  

Question 443 :
Which transparency deals with providing efficient access to the system by hiding the implementation details.


  1. Location Tranparency
  2. Access Tranparency
  3. Network Tranparency
  4. Failure Tarnsparency
  

Question 444 :
What are the characteristics of transaction semantics?


  1. The users of this model are interested in the atomicity property for their transaction
  2. Suitable for applications that are concerned about coherence of data
  3. Easy to implement in a single processor system
  4. Write-back enhances access performance
  

Question 445 :
TCP is reliable _______ protocol which supports reliable point to point communication in distributed system.


  1. network
  2. transport
  3. communication
  4. system
  

Question 446 :
To organise file systems on disk _______________


  1. they are split into one or more partitions
  2. information about files is added to each partition
  3. they are made on different storage spaces
  4. they are made on same storage spaces
  

Question 447 :
What is not true about Persistent Communication


  1. Message submitted for transmission is stored by communication system for as long as it takes to deliver it to receiver
  2. Not necessary for receiver to be executing at the time message submission
  3. Not necessary for sender to continue execution after submitting a message
  4. Sender and receiver has to be active simultaneously
  

Question 448 :
The following statement 'Please give me load' is an example of which policy?


  1. Receiver initiated
  2. Sender Initiated
  3. Load estimation
  4. Load predication
  

Question 449 :
Which cache location gives Maximum performance gain for file systems


  1. Server’s main memory
  2. Client’s main memory
  3. Server’s Disk
  4. Client’s disk
  

Question 450 :
State whether the following statements are correct for the characteristics of monitor i) The local data variables are accessible not only by the monitors’ procedures but also by the external procedure. ii) A process enters the monitor by invoking one of its procedures. iii) Only one process may be excluded in the monitor at a time.


  1. i and ii only
  2. ii and iii only
  3. i and iii only
  4. All i, ii and iii
  
Pages