Distributed Computing MCQ's




Question 1 :
In which technique, processes are reassigned at the runtime depending upon the situation that is the load will be transferred from heavily loaded nodes to the lightly loaded nodes.


  1. Task assignmnet
  2. Static load balancing
  3. Dynamic load balancing
  4. Hybrid technique.
  

Question 2 :
Multithreading is also called as ____________


  1. Concurrency
  2. Simultaneity
  3. Crosscurrent
  4. Recurrent
  

Question 3 :
Which of the service is not offered by middleware ?


  1. Persistance service
  2. Translation service
  3. Querying service
  4. Concurrency service
  

Question 4 :
A typical _________ program creates some remote objects, makes references to these objects accessible, and waits for clients to invoke methods on these objects.


  1. Server
  2. Client
  3. Thread
  4. Concurrent
  

Question 5 :
Isosynchronous is a type of which communication _____.


  1. MOM
  2. IPC
  3. Stream Oriented Communication
  4. Group Communication
  

Question 6 :
The ______________ is used to store a constant value that is decided based on the frequency of oscillation of the quartz crystal


  1. Counter register
  2. Quartz crystal
  3. Constant register
  4. ALU
  

Question 7 :
A system can easily add more users and resources to the system without any noticeable loss of performance is called ______


  1. Geographical scalability
  2. Size scalability
  3. Administative scalability
  4. Financial scalability
  

Question 8 :
In ____ Any read on a data item x returns a value corresponding to the results of the most recent write on x


  1. Strict consistency
  2. Linear consistency
  3. Sequential consistency
  4. parallel consistency
  

Question 9 :
Network operating system runs on ___________


  1. Server
  2. Client
  3. Every system in the network
  4. Network Agent
  

Question 10 :
In ____________ all processes see only those memory reference operations in the correct order that are potentially causally related


  1. Continuous Consistency
  2. Causal Consistency
  3. Sequential Consistency
  4. Eventual Consistency
  

Question 11 :
An RMI Server is responsible for _______


  1. All mentioned above
  2. Creating an instance of the remote object
  3. Exporting the remote object
  4. Binding the instance of the remote object to the RMI registry
  

Question 12 :
Which of the following is not a pipeline stage


  1. Operand fetch
  2. Execute
  3. Pipeline Flush
  4. Memory access
  

Question 13 :
Absolute time synchronization can be achieved using


  1. Vector time stamping method
  2. Christian’s method
  3. Lamport’s method
  4. Ricart-Agrawala algorithm
  

Question 14 :
A process can enter into its critical section ____________


  1. anytime
  2. when it receives a reply message from its parent process
  3. when it receives a reply message from all other processes in the system
  4. when it receives a reply message from its child process
  

Question 15 :
A ___ is a software module consisting of one or more procedures, an initialization sequence, and local data.


  1. monitor
  2. message passing
  3. strong semaphore
  4. binary semaphore
  

Question 16 :
The principal transparency issue related to naming is ______________ transparency.


  1. Replication
  2. Location
  3. Migration
  4. Access
  

Question 17 :
The Stub - Skeleton is used in__________________ Middleware.


  1. RMI
  2. RPC
  3. MOM
  4. web service
  

Question 18 :
What are the characteristics of mutual exclusion using centralized approach ? i. One processor as coordinator which handles all requests ii. It requires request,reply and release per critical section entry iii.The method is free from starvation.


  1. i
  2. ii
  3. iii
  4. i,ii and iii
  

Question 19 :
The high availability - load balancing are the key features of _________________________.


  1. Cluster computing
  2. Grid computing
  3. Centralized computing
  4. Single Computing
  

Question 20 :
Google was born out of a research project at Standford with the company launched in


  1. 1995
  2. 1992
  3. 1997
  4. 1998
  

Question 21 :
The type of communication where a message that has been submitted for transmission is stored by the communication system as long as it takes to deliver it to the receiver


  1. Transient communication
  2. Persistent communication
  3. Synchronous communication
  4. Asynchronous communication
  

Question 22 :
Which of the following disadvantages follows the single coordinator approach?


  1. Bottleneck
  2. Slow response
  3. Deadlock
  4. One request per second
  

Question 23 :
State which of the following holds true for Load Sharing approach in distributed system Statement 1: It use Double threshold as process transfer policy Statement 2: It calculate CPU utilization to estimate the load of a node under load estimation policy


  1. Statement 1 is correct but statement 2 is false
  2. Statement 1 is false but statement 2 is correct
  3. Both the statements are incorrect
  4. Both the statements are correct
  

Question 24 :
Following is not Task Assignment Approach algorithms


  1. Graph Theoretic Deterministic Algorithm
  2. Centrilized Heuristic Algorithm
  3. Raymond's Algorithm
  4. Hierarchical Algorithm
  

Question 25 :
In distributed system, each processor has its own ___________


  1. local memory and clock
  2. Battery
  3. Remote Memory
  4. Display
  

Question 26 :
The ___________ layer, which provides the interface that client and server application objects use to interact with each other.


  1. Increasing
  2. Count
  3. Bit
  4. Stub/skeleton
  

Question 27 :
In RPC, _________________ handles transmission of messages across the network between client and the server machine


  1. Rpc transmission
  2. Rpc runtime
  3. Rpc communication
  4. Rpc interface
  

Question 28 :
OSI has ___ layers.


  1. 4
  2. 5
  3. 6
  4. 7
  

Question 29 :
Which of the following algorithm is Token Based Algorithm for Mutual Exclusion


  1. Lamport Algorithm
  2. Ricart–Agrawala‘s Algorithm
  3. Suzuki-Kasami‘s Broadcast Algorithms
  4. Maekawa‘s Algorithm
  

Question 30 :
In ____- algorithms collect state information and react to system state if it changed


  1. Static load balancing
  2. Dynamic load balancing
  3. constant load balancing
  4. single load balancing
  
Pages