Question 661 :
________________ provides programmers a familiar programming model by extending the local procedure call to a distributed environment
- Distributed environment
- Permanent procedure call
- Process and file
- Remote procedure call
Question 662 :
The type of communication where a sender continues its execution immediately after it has submitted its message for transmission
- Transient communication
- Persistent communication
- Synchronous communication
- Asynchronous communication
Question 663 :
Rebooting as a practical recovery technique requires that components are largely
- coupled in the sense that there are dependencies between different components.
- coupled in the sense that there are no dependencies between different components.
- decoupled in the sense that there are few or no dependencies between different components
- decoupled in the sense that there are dependencies between different components.
Question 664 :
What are the advantages of file replication?
- Improves availability -performance
- Decreases performance
- Improves consistency
- Improves speed
Question 665 :
In NFS,all client-server communication is done through _____________
- RPC
- RMI
- LPC
- MPI
Question 666 :
Which is NOT the characteristic of a DFS?
- reliability
- Scalability
- Transperency
- Upgradation
Question 667 :
A technique that allows more than one program to be ready for execution and provides the ability to switch from one process to another.
- multitasking
- multiprocessing
- multitasking
- multiprogramming
Question 668 :
When a client has a cascading mount _______ server(s) is/are involved in a path name traversal.
- at least one
- more than one
- more than two
- more than three
Question 669 :
To enforce ………………….. two functions are provided enter-critical and exit-critical, where each function takes as an argument the name of the resource that is the subject of competition.
- Deadlock
- Starvation
- Mutual exclusion
- Synchronization
Question 670 :
An RPC (remote procedure call) is initiated by the _________
- Server
- Client
- Client after server
- A third party
Question 671 :
Which of the following is not example of Information redundancy
- parity
- checksum
- Hamming codes
- Rollback if transaction aborts
Question 672 :
Raymond’s Tree-Based Algorithm exchanges only ______- messages under light load .
- O(Nlog2 N)
- O(log N)
- O(NlogN)
- O(logN)
Question 673 :
UTC stands for
- Unique Cordinated Time
- Unique Time Coordination
- Universal Total Coordination
- Universal Coordinated Time
Question 674 :
In which approach of distributed computing, workload is divided from heavily loaded nodes to lightly loaded nodes in an attempt to ensure good overall performance ?
- Load Balancing approach
- Task assignment Approach
- Load Sharing Approach
- Process migration
Question 675 :
Which multicast delivers messages so that potential causality between different messages is preserved
- Unordered multicasts
- FIFO-ordered multicasts
- Causally-ordered multicasts
- Totally-ordered multicasts
Question 676 :
The data sequence of information that is time-dependent is called ___________
- Stream of data
- traditional data
- transactional data
- spatial data
Question 677 :
Process Fail - Stop in process omission faults
- Can be detected in synchronous system.
- Can be detected in asynchronous system.
- Can be detected in synchronous and asynchronous system.
- Can be detected in standalone system.
Question 678 :
Which of the following is disadvantage of active replication
- Consistent replicas
- Minimal bandwidth costs
- Size of the parameters is small
- Processing power
Question 679 :
When high priority task is indirectly preempted by medium priority the scenario is called
- priority inversion
- priority removal
- priority exchange
- priority modification
Question 680 :
_____ is defined as that feeling something when it is not actually present
- method
- Thread
- virtualization
- client server
Question 681 :
In the Bully algorithm, process which is elected as the coordinator is the one having –
- Highest process ID
- Lowest process ID
- Highest timestamp value
- Lowest Timestamp value
Question 682 :
The ring election algorithm works by:
- Having all nodes in a ring of processors send a message to a coordinator who will elect the leader.
- Sending a token around a set of nodes. Whoever has the token is the coordinator.
- Sending a message around all available nodes and choosing the first one on the resultant list.
- Building a list of all live nodes and choosing the largest numbered node in the list.
Question 683 :
Hide that a resource may be moved to another location while in use
- Relocation transparency
- migration transparency
- location transparency
- Replication transparency
Question 684 :
map and reduce are____
- libraries
- functions
- file system
- OS
Question 685 :
In distributed file system, when a file’s physical storage location changes
- file name need to be changed
- file name need not to be changed
- file’s host name need to be changed
- file’s local name need to be changed
Question 686 :
What are the characteristics of mutual exclusion using centralized approach ? i. One processor as coordinator which handles all requests ii. It requires request,reply and release per critical section entry iii.The method is free from starvation.
- i
- ii
- iii
- i,ii and iii
Question 687 :
Which of the following variable wait within the to enable a process
- a condition is defined by a condition variable
- objects Boolean objects can be used by condition variables
- semaphore must be used
- all of the mentioned
Question 688 :
Among the following option which is not main focus of Distributed System
- Availability
- Reliability
- Scientific Performance
- Resource sharing
Question 689 :
A centralized mutual exclusion algorithm requires ___ messages per entry/exit
- 1
- 2
- 3
- 4
Question 690 :
The data consistency models in the descending order of their strictness in consistency are _____.
- Linearizability, Sequential, Casual, FIFO
- FIFO,Casual,Sequential,Linearizability
- Casual,Sequential,Linearizability,FIFO
- Sequential,Casual,FIFO,Linearizability