Question 781 :
________enables users and application programs to complete their tasks despite the failure of hardware or software components
- Concurrency transparency
- Failure transparency
- Replication transparency
- Migration transparency
Question 782 :
In distributed file system,XDR stands for?
- external data request
- External device request
- external data recovery
- External data representation
Question 783 :
What is interprocess communication?
- communication within the process
- communication between two process
- communication between two threads of same process
- Comunication of process
Question 784 :
___________defined a relation called happens-before
- Berkeley
- Lamport
- Vector
- Cristian
Question 785 :
Inter Process Communication takes place via
- Shared memory and message passing
- Decentralized memory and message passing
- Shared memory and message replicating
- Decentralized memory and message replicating
Question 786 :
Migrating some resources, Suspending the execution, migrating the process and then resuming is known as ______.
- Total Freezing
- Pre Transferring
- On demand Exchange
- On demand migration
Question 787 :
What is common problem found in distributed system ?
- Process Synchronization
- Communication synchronization
- Deadlock problem
- Power failure
Question 788 :
The main problem with the reliable multicast scheme is that
- Support large number of receivers
- Support fixed number of receiver
- cannot support fixed numbers of receivers.
- cannot support large numbers of receivers.
Question 789 :
X.500 Directory Service is a standard way to develop an electronic directory of people in an organization so that it can be part of a available to anyone in the world with Internet access.
- social directory
- local directory
- global directory
- personal directory
Question 790 :
If a process is executing in its critical section, ________
- any other process can also execute in its critical section
- no other process can execute in its critical section
- one more process can execute in its critical section
- none of the mentioned
Question 791 :
Network operating system runs on ______
- Server of the network
- Every system in the network
- Both server and every system in the network
- Neigher on server nor on every sysyem in the network
Question 792 :
Which one of the following file system hides the location where in the network the file is stored?
- hidden distributed file system
- transparent distributed file system
- escaped distribution file system
- spy distributed file system
Question 793 :
Having a single CPU and being able to pretend that there are more can be extended to other resources as well and is known as ______________.
- Resource management
- Resource virtualization
- Resource sharing
- Resource distribution
Question 794 :
What are the advantages of token(with rings) passing approach ? I. One processor as coordinator which handles all requests II. No starvation if the ring is unidirectional III. There are many messages passed per section entered if few users want to get in section IV. One processor as coordinator which handles all requests V. Only one message/entry if everyone wants to get in
- I, II and V
- I, II and IV
- II, III and IV
- II, IV and V
Question 795 :
When the process issues an I/O request __________
- It is placed in an I/O queue
- It is placed in a waiting queue
- It is placed in the ready queue
- It is placed in the Job queue
Question 796 :
The transparency that enables multiple instances of resources to be used, is called
- Replication transparency
- Scaling transparency
- Concurrency transparency
- Performance transparency
Question 797 :
____________ is a runtime system that essentially provides an abstract instruction set used for executing applications.
- Consistent system
- Serialization
- Virtualization
- Parallelization
Question 798 :
Select the message which is not used in Centralized algorithm of Mutual Exclusion
- Release
- Request
- Hello
- Reply
Question 799 :
All methods in a remote interface must be declared to throw the ________to deal with unexpected network failure
- object
- exception
- method
- function
Question 800 :
Retransmitting a message can be done using...
- a single multicast message sent to all processes.
- a multiple multicast message sent to all processes.
- a single broadcast message sent to all processes.
- a unicast message sent to all processes.
Question 801 :
A resources can be termed as one of the following-
- Physical and database
- Physical and distributed
- Physical and logical
- Logical and virtual
Question 802 :
What are the different ways in which clients and servers are dispersed across machines ?
- Servers may not run on dedicated machines
- Servers and clients can be on same machines
- Distribution cannot be interposed between a OS and the file system
- OS cannot be distributed with the file system a part of that distribution
Question 803 :
_________ transparency hides failure and recovery of a resources.
- Location transparency
- Access transparency
- Failure transparency
- Migration transparency
Question 804 :
Two clocks are said to be synchronized at a particular instance of time if the difference in time values of the two clocks is less than some specified constant. The difference in time values of two clocks is called ___________
- Clock Frequency
- Clock drift
- Clock skew
- Clock Ticks
Question 805 :
State transition failures happens
- Server fails
- Server reacts unexpectedly
- Client fails
- Network fails
Question 806 :
__________ is a process that prevents multiple threads or processes from accessing shared resources at the same time
- Deadlock
- Critical section
- Mutual Exclusion
- Message passing
Question 807 :
In X.500, each local directory is called a _____________________.
- Directory System Agent
- Local System Agent
- Personal System Agent
- Secret System Agent
Question 808 :
The transparency that enables multiple instances of resources to be used, is called ____ transparency
- Concurrency
- Performance
- Scaling
- Replication
Question 809 :
Google was born out of a research project at Standford with the company launched in
- 1995
- 1992
- 1997
- 1998
Question 810 :
Which of the following algorithm is Token Based Algorithm for Mutual Exclusion
- Lamport Algorithm
- Ricart–Agrawala‘s Algorithm
- Suzuki-Kasami‘s Broadcast Algorithms
- Maekawa‘s Algorithm