Question 61 :
The local operating system on the server machine passes the incoming packets to the ________.
- server stub
- client stub
- client operating system
- client process
Question 62 :
Electronic Health Care Systems are examples of _________ Systems.
- Distributed Computing
- Distributed Information
- Distributed pervasive
- Distributed Database
Question 63 :
A receiver generally has its own local buffer where messages can be stored when the receiver is not executing in____
- Persistent synchronous communication
- Persistent asynchronous communication
- Transient asynchronous communication
- Transient synchronous communication
Question 64 :
An architecture where clients first communicate the server for data then format and display it to the users, is known as ___________
- Client/Server architecture
- Three-tier architecture
- Two-tier architecture
- Peer-to-Peer architecture
Question 65 :
Client Initiated Replicas are used
- to improve load balancing
- to improve resource sharing
- to improve access time to data
- to improve the performance
Question 66 :
In which transmission mode data transfer is subject to maximum and minimum end to end delay
- Synchronous transmission mode
- Asynchronous transmission mode
- Isochronous transmission mode
- None of the above
Question 67 :
In______computing, underlying hardware consists of a collection of similar workstations or PCs closely connected by means of a high-speed local-area network and each node runs the same operating system.
- mobile computing
- cloud computing
- cluster computing
- Peer-to-peer computing
Question 68 :
What are the advantages of token(with rings) passing approach ? I. One processor as coordinator which handles all requests II. No starvation if the ring is unidirectional III. There are many messages passed per section entered if few users want to get in section IV. One processor as coordinator which handles all requests V. Only one message/entry if everyone wants to get in
- I, II and V
- I, II and IV
- II, III and IV
- II, IV and V
Question 69 :
Load estimation policy is to be considered in designing ______.
- Co-operative algorithm
- Load balancing algorithm
- Probabilistic algorithm
- Static scheduling algorithm
Question 70 :
A socket uses ____________ to transmit data between the sender and the reciever.
- IPC
- IMC
- IBC
- API
Question 71 :
Communication channels may suffer through
- protocol
- transport
- arbitrary failures
- reliable communication
Question 72 :
This is not the mechanism of recovery in distributed system.
- Rollback Recovery
- Checkpoint
- Message Logging
- Multicasting
Question 73 :
The method(s) that is/are used for backward recovery in distributed computing is ______.
- Checkpoint
- Message Logging
- Checkpoint and message logging
- Recovery Point
Question 74 :
The characteristic of distributed system that cares reliability of system so that in case of any failure, system continues to operate properly-
- Scalability
- Concurrency
- Fault tolerance
- Openness
Question 75 :
____ is software architecture used to build a distributed system from a network connected by high speed network.
- DOS
- NOS
- Middleware
- Operating system
Question 76 :
In Distributed system, _____ can be hidden
- Replication
- Fault tolerance
- concurrency
- Consistency
Question 77 :
_________ is an object acting as a gateway for the client side.
- skeleton
- stub
- remote
- server
Question 78 :
With ................ only one process can execute at a time; meanwhile all other process are waiting for the processer. With .............. more than one process can be running simultaneously each on a different processer.
- Multiprocessing, Multiprogramming
- Multiprogramming, Uniprocessing
- CMultiprogramming, Multiprocessing
- Uniprogramming, Multiprocessing
Question 79 :
Grid computing is type of -
- Distributed embedded system
- Distributed information system
- Distributed Computing system
- Cluster computing
Question 80 :
Which is not the ways mounting of the file system?
- Boot mounting
- Auto mounting
- Explicit mounting
- Copy mounting
Question 81 :
A process can enter into its critical section _______
- anytime
- when it receives a reply message from its parent process
- when it receives a reply message from all other processes in the system
- none of the mentioned
Question 82 :
A client's clock reads 3:20:00. The server's clock reads 3:10:00 when they synchronize using Cristian's algorithm. Assume messagedelays are negligible. What is the time at the client after synchronization?
- 0.138888889
- 0.128472222
- 0.135416667
- 0.131944444
Question 83 :
Cristian’s Algorithm is _____
- Passive Time Server Algorithm
- Active Time Server Algorithm
- both (a) and (b)
- None of the mentioned
Question 84 :
Characteristics of distributed system that allows variety of devices to be part of it is also called
- Heterogeneity
- Openness
- Scalability
- Security
Question 85 :
What is ‘Aging’?
- keeping track of cache contents
- keeping track of what pages are currently residing in memory
- keeping track of how many times a given page is referenced
- increasing the priority of jobs to ensure termination in a finite ti
Question 86 :
Cloud computing is type of
- Distributed embedded system
- Distributed information system
- Distributed Computing system
- Cluster computing
Question 87 :
The value in the counter register is ____________ by 1 for each oscillation of the quartz crystal.
- Decremented
- Incremented
- Doubled
- None of the mentioned
Question 88 :
Various Components of distributed systems are__________.
- client
- server
- server network links
- client,server, network links
Question 89 :
What will happen when a process terminates?
- It is removed from all queues
- It is removed from all, but the job queue
- Its process control block is de-allocated
- Its process control block is never de-allocated
Question 90 :
GNS allows you to locate services via an _________ wherever the service is located, whether on the local system or on a remote node.
- user name
- arbitrary name
- system name
- address name