Question 601 :
What are the characteristics of transaction semantics ?
- Suitable for applications that are concerned about coherence of data
- The users of this model are interested in the atomicity property for their transaction
- Easy to implement in a single processor system
- Write-back enhances access performance
Question 602 :
Hide that a resource may move to another location which type of transparency is this?
- Location
- Migration
- Relocation
- Access
Question 603 :
What are the characteristics of a distributed file system?
- Its users, servers and storage devices are dispersed
- Service activity is not carried out across the network
- They have single centralized data repository
- There are multiple dependent storage devices
Question 604 :
Which of the following allocates/deallocates buffers
- RRL
- Stub/skeleton layer
- Transport layer
- Networking layer
Question 605 :
The process which blocks pipeline stage from accepting and processing new data is called
- Pipeline pre-processing
- Pipeline Flush
- Pipeline Interlock
- Pipeline lag
Question 606 :
In the instruction ADD A, B, the answer gets stored in ___________
- B
- A
- Buffer
- C
Question 607 :
In which the access takes place when different processes try to access the same data concurrently and the outcome of the execution depends on the specific order, is called
- dynamic condition
- race condition
- essential condition
- critical condition
Question 608 :
_____________ enables the migration of the virtual image from one physical machine to another.
- Visualization
- Virtualization
- Migration
- Virtual transfer
Question 609 :
The NFS client and server modules communicate using ...................................
- remote procedure call
- Function
- Interrupt
- RMI
Question 610 :
Traditional election algorithms fail in wireless networks because____
- They assume that message passing is transient
- They assume that topology of network changes
- they assume that message passing is reliable and that the topology of the network does not change
- They assume that message passing is unreliable and topology of network changes
Question 611 :
stream oriented communication is suitable for applications like
- All the mentioned
- audio
- video
- movie
Question 612 :
A distributed database is which of the following?
- A single logical database that is spread to multiple locations and is interconnected by a network
- A loose collection of file that is spread to multiple locations and is interconnected by a network
- A single logical database that is limited to one location.
- A loose collection of file that is limited to one location.
Question 613 :
which command is used to create a directory
- rmdir
- symlink
- mkdir
- open
Question 614 :
In distributed systems, ______ offers services according to standard rules that describe the syntax and semantics of those services.
- openness
- scalability
- Reliability
- fault tolerance
Question 615 :
In Casual consistency model all processes shared accesses in
- random order
- same order
- sequential order
- specific order
Question 616 :
Remote login is a best example of ____.
- Distributed OS
- Disk OS
- Network OS
- MAC OS
Question 617 :
Which algorithms are used for selecting a process to act as coordinator or sequencer? I. Centralized algorithm II. Election algorithm III. Ring algorithm IV. Chandy-Misra-Haas algorithm
- II and IV
- II, III, IV
- II and III
- II
Question 618 :
Utilization rate of resources in an execution model is known to be its -
- Adaptation
- Efficiency
- Flexibility
- Dependability
Question 619 :
What are the parts of global unique identifier ?
- Local unique time stamp
- Remote time stamp
- Clock number
- sequence number
Question 620 :
which is not type of Distributed computing system?
- Grid Computing
- Cluster Computing
- Health Care System
- Cloud Computing
Question 621 :
Which technique is not used for scheduling processes of a distributed system?
- Task assignment approach
- Load balancing approach
- Load dividing approach
- Load sharing approach
Question 622 :
Process synchronization can be done on which of the following levels
- hardware
- software
- both hardware and software
- BIOS
Question 623 :
_____ model consist of multiple work stations coupled with powerful servers with extra hardware to store the file system s and other software like databases
- Workstation model
- Workstation -server model
- Processor-pool model
- Client-server model
Question 624 :
Which of the following technique is not used for scheduling processes in Distributed System?
- Load balancing approach
- Task assignment approach
- Load sharing approach
- FCFS approach
Question 625 :
Message passing system allows processes to __________
- communicate with one another without resorting to shared data
- communicate with one another by resorting to shared data
- share data
- name the recipient or sender of the message
Question 626 :
Which of the following is not Message Ordering Multicast
- Unordered multicasts
- FIFO-ordered multicasts
- Causally-ordered multicasts
- LIFO-ordered multicasts
Question 627 :
What are the advantages of token(with rings) passing approach ?i) One processor as coordinator which handles all requestsii) No starvation if the ring is unidirectionaliii) There are many messages passed per section entered if few users want to get in sectioniv) One processor as coordinator which handles all requestsv) Only one message/entry if everyone wants to get in
- i
- ii and iii
- i, ii and iii
- i, ii and iv
Question 628 :
RPC is used to ___________.
- establish a server on remote machine that can respond to queries
- retrieve information by calling a query
- establish a connection to server on remote machine that can respond to queries and retrieve information by calling a query
- invoke the method on remote object
Question 629 :
In distributed systems, a logical clock is associated with ______________
- each instruction
- each process
- each register
- Many registers
Question 630 :
Transient communication done by_____ layer
- Network
- Transport
- Physical
- Session