Computer Distributed Computing (CDC) MCQ's




Question 991 :
Distributed multimedia system uses which type of transmission mode?


  1. Synchronous transmission mode
  2. Asynchronous transmission mode
  3. Isochronous transmission mode
  4. None of the above
  

Question 992 :
In a multi-processor configuration two coprocessors are connected to host 8086 processor. The instruction sets of the two coprocessors


  1. must be same
  2. may overlap
  3. must be disjoint
  4. must be the same as that of host
  

Question 993 :
If a process is executing in its critical section ____________


  1. any other process can also execute in its critical section
  2. no other process can execute in its critical section
  3. one more process can execute in its critical section
  4. every process can execute in its critical section
  

Question 994 :
What is RMI ?


  1. Remote Message Invocation
  2. Remote Method Invocation
  3. Remote Method Information
  4. Remote Message Initialization
  

Question 995 :
Method invocations between objects in the same process are


  1. Static method invocations
  2. Dynamic method invocations
  3. Local method invocations
  4. Temporal method invocations
  

Question 996 :
Middleware is an application that logically lives (mostly) in the


  1. application layer
  2. Transport layer
  3. IP packet
  4. Presentation packet
  

Question 997 :
IP packet is encapsulated in a


  1. data link layer
  2. physical layer
  3. network layer
  4. transport layer
  

Question 998 :
RMI uses stub and skeleton for communication with the ________


  1. client
  2. remote
  3. server
  4. any
  

Question 999 :
In Raymond’s Algorithm, TOKEN is held by which node of the tree?


  1. Left most Leaf node
  2. Right most Leaf node
  3. Root node
  4. Intermediate node
  

Question 1000 :
State which of the following holds true in File Service Interface i)It enables users to access files in distributed systen ii)File accessing models decide how the users request for file access is serviced iii)It creates and manages directories ,adding and deleting files from directories


  1. i only
  2. i and iii only
  3. ii and iii only
  4. i and ii only
  

Question 1001 :
UDP is an example of


  1. Persistent asynchronous communication
  2. Persistent synchronous communication
  3. Transient asynchronous communication
  4. Transient synchronous communication
  

Question 1002 :
In ________________________ each node periodically sends a message to the time server.


  1. Passive Time Server Centralized Algorithm
  2. Active Time Server Centralized Algorithm
  3. Global Averaging Distributed Algorithms
  4. Localized Averaging Distributed Algorithms
  

Question 1003 :
The difference between logical and physical clocks ?


  1. Logical clocks measure the time of day and Physical clocks are used to mark relationships among events in a distributed system.
  2. Both are the same
  3. Physical clocks measure the time of day and Logical clocks are used to mark relationships among events in a distributed system.
  4. Physical clock and logical clock do not work in distributed system
  

Question 1004 :
Google Distributed System is


  1. arbitrary system
  2. search engine is now a major player in cloud computing.
  3. GNS server
  4. computer networking standards
  

Question 1005 :
The ____accesses to synchronization variables associated with a data store are sequentially consistent


  1. Weak Consistency
  2. Casual consistency
  3. FIFO consistency
  4. Optimal consistency
  

Question 1006 :
Which of the following process can be affected by other processes during execution in the system?


  1. init process
  2. child process
  3. parent process
  4. cooperating process
  

Question 1007 :
A Parallel computer is the computer system capable of


  1. Parallel Computing
  2. Centralized Computing
  3. Decentralized Computing
  4. Distributed Computing
  

Question 1008 :
In which algorithm, One process is elected as the coordinator.


  1. Distributed mutual exclusion algorithm
  2. Centralized mutual exclusion algorithm
  3. Vector Algorithm
  4. Lamport algorithm
  

Question 1009 :
Hide where a resource is located which type of transparency is this?


  1. Location
  2. Migration
  3. Relocation
  4. Access
  

Question 1010 :
Replication model in which no master replica or slave replica is_________.


  1. Master-Slave
  2. Client -Server
  3. Peer-to-peer
  4. Permanent
  

Question 1011 :
Which policy determines when it will benecessary to transfer the process from one node to another?


  1. Selection policy
  2. Transfer policy
  3. Location policy
  4. Information policy
  

Question 1012 :
____are useful for the enforcement of mutual exclusion and also provide an effective means of inter-process communication.


  1. Semaphores
  2. Messages
  3. Monitors
  4. Addressing
  

Question 1013 :
Which is not an examples of state information ?


  1. Mounting information
  2. Description of HDD space
  3. Session keys
  4. Lock status
  

Question 1014 :
In a distributed system, information is exchanged through __________.


  1. Memory sharing
  2. Message passing
  3. Email sending
  4. Network sharing
  

Question 1015 :
In distributed file system, a file is uniquely identified by _________________


  1. host name
  2. local name
  3. the combination of host name and local name
  4. Priority number
  

Question 1016 :
Lamport algorithm requires ____messages per Critical Section invocation and the synchronization delay in the algorithm is ___


  1. 3(N-1), T
  2. 3(N-1), 2T
  3. 3(N), T-1
  4. 3(N), 2(T-1)
  

Question 1017 :
Uni processor computing is known as


  1. Centralized Computing
  2. Parallel Computing
  3. Distributed Computing
  4. Grid Computing
  
Pages