Computer Distributed Computing (CDC) MCQ's




Question 781 :
________enables users and application programs to complete their tasks despite the failure of hardware or software components


  1. Concurrency transparency
  2. Failure transparency
  3. Replication transparency
  4. Migration transparency
  

Question 782 :
In distributed file system,XDR stands for?


  1. external data request
  2. External device request
  3. external data recovery
  4. External data representation
  

Question 783 :
What is interprocess communication?


  1. communication within the process
  2. communication between two process
  3. communication between two threads of same process
  4. Comunication of process
  

Question 784 :
___________defined a relation called happens-before


  1. Berkeley
  2. Lamport
  3. Vector
  4. Cristian
  

Question 785 :
Inter Process Communication takes place via


  1. Shared memory and message passing
  2. Decentralized memory and message passing
  3. Shared memory and message replicating
  4. Decentralized memory and message replicating
  

Question 786 :
Migrating some resources, Suspending the execution, migrating the process and then resuming is known as ______.


  1. Total Freezing
  2. Pre Transferring
  3. On demand Exchange
  4. On demand migration
  

Question 787 :
What is common problem found in distributed system ?


  1. Process Synchronization
  2. Communication synchronization
  3. Deadlock problem
  4. Power failure
  

Question 788 :
The main problem with the reliable multicast scheme is that


  1. Support large number of receivers
  2. Support fixed number of receiver
  3. cannot support fixed numbers of receivers.
  4. cannot support large numbers of receivers.
  

Question 789 :
X.500 Directory Service is a standard way to develop an electronic directory of people in an organization so that it can be part of a available to anyone in the world with Internet access.


  1. social directory
  2. local directory
  3. global directory
  4. personal directory
  

Question 790 :
If a process is executing in its critical section, ________


  1. any other process can also execute in its critical section
  2. no other process can execute in its critical section
  3. one more process can execute in its critical section
  4. none of the mentioned
  

Question 791 :
Network operating system runs on ______


  1. Server of the network
  2. Every system in the network
  3. Both server and every system in the network
  4. Neigher on server nor on every sysyem in the network
  

Question 792 :
Which one of the following file system hides the location where in the network the file is stored?


  1. hidden distributed file system
  2. transparent distributed file system
  3. escaped distribution file system
  4. spy distributed file system
  

Question 793 :
Having a single CPU and being able to pretend that there are more can be extended to other resources as well and is known as ______________.


  1. Resource management
  2. Resource virtualization
  3. Resource sharing
  4. Resource distribution
  

Question 794 :
What are the advantages of token(with rings) passing approach ? I. One processor as coordinator which handles all requests II. No starvation if the ring is unidirectional III. There are many messages passed per section entered if few users want to get in section IV. One processor as coordinator which handles all requests V. Only one message/entry if everyone wants to get in


  1. I, II and V
  2. I, II and IV
  3. II, III and IV
  4. II, IV and V
  

Question 795 :
When the process issues an I/O request __________


  1. It is placed in an I/O queue
  2. It is placed in a waiting queue
  3. It is placed in the ready queue
  4. It is placed in the Job queue
  

Question 796 :
The transparency that enables multiple instances of resources to be used, is called


  1. Replication transparency
  2. Scaling transparency
  3. Concurrency transparency
  4. Performance transparency
  

Question 797 :
____________ is a runtime system that essentially provides an abstract instruction set used for executing applications.


  1. Consistent system
  2. Serialization
  3. Virtualization
  4. Parallelization
  

Question 798 :
Select the message which is not used in Centralized algorithm of Mutual Exclusion


  1. Release
  2. Request
  3. Hello
  4. Reply
  

Question 799 :
All methods in a remote interface must be declared to throw the ________to deal with unexpected network failure


  1. object
  2. exception
  3. method
  4. function
  

Question 800 :
Retransmitting a message can be done using...


  1. a single multicast message sent to all processes.
  2. a multiple multicast message sent to all processes.
  3. a single broadcast message sent to all processes.
  4. a unicast message sent to all processes.
  

Question 801 :
A resources can be termed as one of the following-


  1. Physical and database
  2. Physical and distributed
  3. Physical and logical
  4. Logical and virtual
  

Question 802 :
What are the different ways in which clients and servers are dispersed across machines ?


  1. Servers may not run on dedicated machines
  2. Servers and clients can be on same machines
  3. Distribution cannot be interposed between a OS and the file system
  4. OS cannot be distributed with the file system a part of that distribution
  

Question 803 :
_________ transparency hides failure and recovery of a resources.


  1. Location transparency
  2. Access transparency
  3. Failure transparency
  4. Migration transparency
  

Question 804 :
Two clocks are said to be synchronized at a particular instance of time if the difference in time values of the two clocks is less than some specified constant. The difference in time values of two clocks is called ___________


  1. Clock Frequency
  2. Clock drift
  3. Clock skew
  4. Clock Ticks
  

Question 805 :
State transition failures happens


  1. Server fails
  2. Server reacts unexpectedly
  3. Client fails
  4. Network fails
  

Question 806 :
__________ is a process that prevents multiple threads or processes from accessing shared resources at the same time


  1. Deadlock
  2. Critical section
  3. Mutual Exclusion
  4. Message passing
  

Question 807 :
In X.500, each local directory is called a _____________________.


  1. Directory System Agent
  2. Local System Agent
  3. Personal System Agent
  4. Secret System Agent
  

Question 808 :
The transparency that enables multiple instances of resources to be used, is called ____ transparency


  1. Concurrency
  2. Performance
  3. Scaling
  4. Replication
  

Question 809 :
Google was born out of a research project at Standford with the company launched in


  1. 1995
  2. 1992
  3. 1997
  4. 1998
  

Question 810 :
Which of the following algorithm is Token Based Algorithm for Mutual Exclusion


  1. Lamport Algorithm
  2. Ricart–Agrawala‘s Algorithm
  3. Suzuki-Kasami‘s Broadcast Algorithms
  4. Maekawa‘s Algorithm
  
Pages