Question 1 :
In which technique, processes are reassigned at the runtime depending upon the situation that is the load will be transferred from heavily loaded nodes to the lightly loaded nodes.
- Task assignmnet
- Static load balancing
- Dynamic load balancing
- Hybrid technique.
Question 2 :
Multithreading is also called as ____________
- Concurrency
- Simultaneity
- Crosscurrent
- Recurrent
Question 3 :
Which of the service is not offered by middleware ?
- Persistance service
- Translation service
- Querying service
- Concurrency service
Question 4 :
A typical _________ program creates some remote objects, makes references to these objects accessible, and waits for clients to invoke methods on these objects.
- Server
- Client
- Thread
- Concurrent
Question 5 :
Isosynchronous is a type of which communication _____.
- MOM
- IPC
- Stream Oriented Communication
- Group Communication
Question 6 :
The ______________ is used to store a constant value that is decided based on the frequency of oscillation of the quartz crystal
- Counter register
- Quartz crystal
- Constant register
- ALU
Question 7 :
A system can easily add more users and resources to the system without any noticeable loss of performance is called ______
- Geographical scalability
- Size scalability
- Administative scalability
- Financial scalability
Question 8 :
In ____ Any read on a data item x returns a value corresponding to the results of the most recent write on x
- Strict consistency
- Linear consistency
- Sequential consistency
- parallel consistency
Question 9 :
Network operating system runs on ___________
- Server
- Client
- Every system in the network
- Network Agent
Question 10 :
In ____________ all processes see only those memory reference operations in the correct order that are potentially causally related
- Continuous Consistency
- Causal Consistency
- Sequential Consistency
- Eventual Consistency
Question 11 :
An RMI Server is responsible for _______
- All mentioned above
- Creating an instance of the remote object
- Exporting the remote object
- Binding the instance of the remote object to the RMI registry
Question 12 :
Which of the following is not a pipeline stage
- Operand fetch
- Execute
- Pipeline Flush
- Memory access
Question 13 :
Absolute time synchronization can be achieved using
- Vector time stamping method
- Christian’s method
- Lamport’s method
- Ricart-Agrawala algorithm
Question 14 :
A process can enter into its critical section ____________
- anytime
- when it receives a reply message from its parent process
- when it receives a reply message from all other processes in the system
- when it receives a reply message from its child process
Question 15 :
A ___ is a software module consisting of one or more procedures, an initialization sequence, and local data.
- monitor
- message passing
- strong semaphore
- binary semaphore
Question 16 :
The principal transparency issue related to naming is ______________ transparency.
- Replication
- Location
- Migration
- Access
Question 17 :
The Stub - Skeleton is used in__________________ Middleware.
- RMI
- RPC
- MOM
- web service
Question 18 :
What are the characteristics of mutual exclusion using centralized approach ? i. One processor as coordinator which handles all requests ii. It requires request,reply and release per critical section entry iii.The method is free from starvation.
- i
- ii
- iii
- i,ii and iii
Question 19 :
The high availability - load balancing are the key features of _________________________.
- Cluster computing
- Grid computing
- Centralized computing
- Single Computing
Question 20 :
Google was born out of a research project at Standford with the company launched in
- 1995
- 1992
- 1997
- 1998
Question 21 :
The type of communication where a message that has been submitted for transmission is stored by the communication system as long as it takes to deliver it to the receiver
- Transient communication
- Persistent communication
- Synchronous communication
- Asynchronous communication
Question 22 :
Which of the following disadvantages follows the single coordinator approach?
- Bottleneck
- Slow response
- Deadlock
- One request per second
Question 23 :
State which of the following holds true for Load Sharing approach in distributed system Statement 1: It use Double threshold as process transfer policy Statement 2: It calculate CPU utilization to estimate the load of a node under load estimation policy
- Statement 1 is correct but statement 2 is false
- Statement 1 is false but statement 2 is correct
- Both the statements are incorrect
- Both the statements are correct
Question 24 :
Following is not Task Assignment Approach algorithms
- Graph Theoretic Deterministic Algorithm
- Centrilized Heuristic Algorithm
- Raymond's Algorithm
- Hierarchical Algorithm
Question 25 :
In distributed system, each processor has its own ___________
- local memory and clock
- Battery
- Remote Memory
- Display
Question 26 :
The ___________ layer, which provides the interface that client and server application objects use to interact with each other.
- Increasing
- Count
- Bit
- Stub/skeleton
Question 27 :
In RPC, _________________ handles transmission of messages across the network between client and the server machine
- Rpc transmission
- Rpc runtime
- Rpc communication
- Rpc interface
Question 28 :
OSI has ___ layers.
- 4
- 5
- 6
- 7
Question 29 :
Which of the following algorithm is Token Based Algorithm for Mutual Exclusion
- Lamport Algorithm
- Ricart–Agrawala‘s Algorithm
- Suzuki-Kasami‘s Broadcast Algorithms
- Maekawa‘s Algorithm
Question 30 :
In ____- algorithms collect state information and react to system state if it changed
- Static load balancing
- Dynamic load balancing
- constant load balancing
- single load balancing