Question 121 :
ISO OSI Model is invented by
- Zimmerman
- Dennis Richie
- Lamport
- Zippy
Question 122 :
The result of any execution is the same as if the read and the write Operations by all processes on the data store were executed in some Sequential order and the operations of each individual process appear in this sequence in the order specified by its program.
- Strict consistency
- Linear consistency
- Sequential consistency
- parallel consistency
Question 123 :
Multiprogramming is mainly accomplished by:
- os
- software
- hardware
- program
Question 124 :
In wound-wait If a young process wants a resource held by an old process, the young process will _____
- Killed
- Wait
- Preempt
- Restarts and wait
Question 125 :
What is the advantage of caching in remote file access?
- Reduced network traffic by retaining recently accessed disk blocks
- Faster network access
- Copies of data creates backup automatically
- Copies of data resolves inconsistencies
Question 126 :
The calls, whose caller has expired due to node crash, is known as _____.
- orphan
- dead
- alive
- request
Question 127 :
________determines when it will be necessary to transfer the process from one node to another.
- Selection policy
- Transfer policy
- Location policy
- Security policy
Question 128 :
_______provide gurantee that all members in a process group receive a message
- Replication
- Reliable group communication
- Passive Communiccation
- Active communication
Question 129 :
In which of the following consistency model all writes become perceptible to all processes
- Strict
- Weak
- Casual
- Sequential
Question 130 :
What are the characteristics of fully distributed approach ? I. When responses are received from all processes, then process can enter its Critical Section II. When process exits its critical section, the process sends reply messages to all its deferred requests. III. It requires request, reply and release per critical section entry IV. One processor as coordinator which handles all requests
- I
- I and III
- III and IV
- I and II
Question 131 :
Cambridge file server is belongs to which unit data transfer model used for file accessing in DFS
- File Level Transfer Mode
- Byte Level Transfer Model
- Record Level Transfer Model
- Block Level Transfer Model
Question 132 :
Which type of service is not provided by Distributed File System
- Storage Service
- True File Service
- Name Service
- False File Service
Question 133 :
Which layer is the layer closest to the transmission medium ?
- Physical
- Data link
- Network
- Transport
Question 134 :
E-mail system is an example of
- Persistent asynchronous communication
- Persistent synchronous communication
- Transient asynchronous communication
- Transient synchronous communication
Question 135 :
_________these policies are used in GFS to be highly available
- Fast Recovery , Chunk Replication
- Fast Recovery , Garbage Collection
- Master Replication , Data Integrity
- Master Replication , Garbage collection
Question 136 :
In the case of____________ , changes to an open file are only locally visible.
- session semantics
- immutable files
- atomic transactions
- Client Interfacing
Question 137 :
Processor Consistency model guarantees and conforms that
- All write accomplished on identical memory location in identical sequence.
- All write accomplished on random memory location in random sequence
- All write accomplished on random memory location in identical sequence
- All write accomplished on identical memory location in random order
Question 138 :
The V-system in distributed computing system is based on ______.
- Workstation model
- Workstation -server model
- Processor-pool model
- Client-server model
Question 139 :
A system with m CPUs and n processes has the following case m>n in case of task assignment approch how scheduling will takes place ?
- There is a need to schedule the processes on CPUs and several processes may be assigned to each CPU
- Some CPUs may remain idle or work on processes allocated earlier
- Each process is allocated to one CPU
- This kind of senario does not exist
Question 140 :
Other organizations are able to run their ______________on the Google platform.
- own web applications
- own services
- own queries
- own network programs
Question 141 :
The ring election algorithm works by:
- Having all nodes in a ring of processors send a message to a coordinator who will elect the leader.
- Sending a token around a set of nodes. Whoever has the token is the coordinator.
- Sending a message around all available nodes and choosing the first one on the resultant list.
- Building a list of all live nodes and choosing the largest numbered node in the list.
Question 142 :
How is access to resources of various machines is done?
- Remote logging using ssh or telnet
- Zone are configured for automatic access
- FTP is not used
- FTP is used
Question 143 :
According to the ring algorithm, links between processes are _____
- Bidirectional
- Unidirectional
- Both bidirectional and unidirectional
- None of the mentioned
Question 144 :
The header usually consists of the following elements in IPC I. Sequence number II. Structural information III. Address IV. File mode(Read/ Write)
- I,III, IV
- I,II, III
- I, II, IV
- I,IV
Question 145 :
DUAs include whois, finger, and programs that offer a_____________.
- graphical user interface.
- system interface.
- Local user interface.
- global user interface.
Question 146 :
Which of the following statements is true?
- happens before is a transitive relation
- happens before is a symmetric relation
- happens before is a reflexive relation
- happens before is a complex relation
Question 147 :
Choosing the best path from sender to receiver is primary task of ___ layer of OSI.
- Physical
- Transport
- Network
- Application
Question 148 :
Write the event of following notations:M ~C (~P)
- A crash occurs after sending the completion message and printing the text.
- A crash happens after sending the completion message, but before the text could be printed.
- A crash happens before the server could do anything.
- The text printed, after which a crash occurs before the completion message could be sent.
Question 149 :
Mapping of network file system protocol to local file system is done by ____________
- network file system
- local file system
- volume manager
- remote mirror
Question 150 :
Which is not possible in distributed file system?
- File replication
- Migration
- Client interface
- Remote access