Question 631 :
In wound-wait If a young process wants a resource held by an old process, the young process will _____
- Killed
- Wait
- Preempt
- Restarts and wait
Question 632 :
In which algorithm, One process is elected as the coordinator.
- Distributed mutual exclusion algorithm
- Centralized mutual exclusion algorithm
- Token ring algorithm
- Lamport algorithm
Question 633 :
The ___________________ fault describes the worst possible fault semantics where any type of error may occur.
- Timing
- Arbitrary
- Omission
- Non-timing
Question 634 :
File caching is done _____________.
- To made file available
- To make faster access
- For transparent access
- For Mobile access
Question 635 :
You are synchronizing your clock from a time server using NTP and observe the following times: [4 points] a. timestamp at client when the message leaves the client: 6:22:15.100 b. timestamp at which the server receives the message: 7:05:10.700 c. timestamp at which the server sends the reply: 7:05:10.710 d. timestamp at client when the message is received at client: 6:22:15.250 To what value do you set the client's clock?
- 0.295266204
- 0.33693287
- 0.378599537
- 0.420266204
Question 636 :
Which of the following is an transport layer protocol?
- DNS
- TCP
- RMI
- SONET
Question 637 :
Storing a separate copy of the database at multiple locations is which of the following?
- Data Replication
- Horizontal Partitioning
- Vertical Partitioning
- Horizontal and Vertical Partitioning
Question 638 :
Server checking whether file is updated in cache or not before using it is known as_____.
- Client Validation
- Server Validation
- Client updating
- Server Updating
Question 639 :
X.500 is implemented as part of the ______________ in its Global Directory Service
- Distributed Computing Environment
- User fraindly Environment
- Global Computing Environment
- World Computing Environment
Question 640 :
___algorithm for coordinator election assumes that no process can fail during the election procedure until the new coordinator has been selected.
- bully algorithm
- Ring algorithm
- Lamport algorithm
- Suzuki Kasami algorithm
Question 641 :
Writes by a single process are seen by all other processes in the order in which they were issued; however, writes from different processes may be seen in different orders by different processes.', above statement defines which consistency model?
- Causal Consistency Model
- FIFO consistency Model
- Sequential Consistency Model
- Strict consistency Model
Question 642 :
What are the advantages of file replication ?
- Improves availability -performance
- Decreases performance
- They are consistent
- Improves speed
Question 643 :
X.500 directory uses _______.
- User Information Tree
- Directory Information Tree
- Person Information Tree
- system Information Tree
Question 644 :
Time interval from a request send to its critical region execution completed is called ________.
- System throughput
- Message complexity
- Synchronization delay
- Response time
Question 645 :
Web-based office suite supporting shared editing of documents held on Google servers.
- Gmail
- Google Talk
- Google News
- Google Docs
Question 646 :
Which failures Response lies outside a specified time interval
- Timing Failure
- Omission failure
- Crash Failure
- Arbitrary Failure
Question 647 :
An RPC (remote procedure call) is initiated by the _____.
- server
- client
- client after the sever
- a third party
Question 648 :
RMI stands for?
- Remote Mail Invocation
- Remote Message Invocation
- Remaining Method Invocation
- Remote Method Invocation
Question 649 :
A shared-memory system is said to support the __________ model if the value returned by a read operation on a memory address is always the same as the value written by the most recent write operation to that address.
- causal consistency
- strict consistency
- sequential consistency
- FIFO consistency
Question 650 :
In Erasure correction approach a missing packet is constructed from
- other successfully delivered packets
- last delivered packet
- first packet
- retransmitting packets
Question 651 :
In which OSI layer encryption and decryption happens ?
- Application
- Presentation
- Transport
- Data Link
Question 652 :
A type of the fault which occurs once and only the replacement/repair of a faulty component will allow the Distributed System to function normally
- Transient Fault
- Intermittent Fault
- Permanent Fault
- Temporary fault
Question 653 :
In this type of process resilence group, the processes are equal and the decisions made are collective.
- Hierarchical Group
- flat group
- IETF group
- Collected process Group
Question 654 :
Scaling transparency hides
- System expansion
- System collaboration
- System failure
- System security
Question 655 :
Hide where a resource is located which type of transparency is this?
- Location
- Migration
- Relocation
- Access
Question 656 :
The ring election algorithm works by:
- Having all nodes in a ring of processors send a message to a coordinator who will elect the leader.
- Sending a token around a set of nodes. Whoever has the token is the coordinator.
- Sending a message around all available nodes and choosing the first one on the resultant list.
- Building a list of all live nodes and choosing the largest numbered node in the list.
Question 657 :
X.500 is a way to route e-mail as well as to provide name lookup, using the _________________.
- Lightweight Directory Access Protocol
- Directory Access Protocol
- Global Directory Access Protocol
- Local Directory Access Protocol
Question 658 :
In X.500, hierarchical organization of entries which are distributed across one or more servers is
- Directory System Agents (DSA)
- Relative Distinguished Name (RDN)
- HTTPS
- HTTP
Question 659 :
A redundancy technique used to mask failure where extra (duplicate) hardware and/or software is added to the system.
- Information Redundancy
- Time Redundancy
- Physical Redundancy
- Space Redundancy
Question 660 :
What is the drawback of non-interleaving technique compared to interleaving technique in stream-oreinted communication
- Non-interleaving techniques is not providing synchronization.
- Non-interleaving technique is more complex.
- Non-interleaving technique does not handle loss of packets.
- Non-interleaving techniques requires larger buffer space.