Question 271 :
Which of the following algorithm is Non- Token Based Algorithm for Mutual Exclusion
- Singhal‘s Heurastic Algorithm
- Suzuki-Kasami‘s Broadcast Algorithms
- Maekawa‘s Algorithm
- Raymond‘s Tree based Algorithm
Question 272 :
In the token passing approach of distributed systems, processes are organized in a ring structure
- Logically
- Physically
- Both logically and physically
- No specific to any structure
Question 273 :
Replication should be used when which of the following exist?
- When transmission speeds and capacity in a network prohibit frequent refreshing of large tables.
- When using many nodes with different operating systems and DBMSs and database designs.
- The application's data can be somewhat out-of-date.
- When using some nodes with selected operating system.
Question 274 :
Which of the following process can be affected by other processes during execution in the system?
- init process
- child process
- parent process
- cooperating process
Question 275 :
In a multi-processor configuration two coprocessors are connected to host 8086 processor. The instruction sets of the two coprocessors
- must be same
- may overlap
- must be disjoint
- must be the same as that of host
Question 276 :
Registration of a server makes it possible for a client to locate the server and
- Bind to it
- Listen to it
- Refer to it
- Store to it
Question 277 :
Which address is used to identify a process on a host by the transport layer?
- physical address
- logical address
- port address
- specific address
Question 278 :
Which of the following is not an example of stream data
- Video
- Audio
- large data files
- text
Question 279 :
Hide where a resource is located which type of transparency is this?
- Location
- Migration
- Relocation
- Access
Question 280 :
A remote object is ______ of a class that implements a remote interface.
- function
- call
- method
- instance
Question 281 :
_____ is defined as that feeling something when it is not actually present
- method
- Thread
- virtualization
- client server
Question 282 :
Hide that a resource may be moved to another location while in use
- Relocation transparency
- migration transparency
- location transparency
- Replication transparency
Question 283 :
In a distributed system, information is exchanged through __________.
- Memory sharing
- Message passing
- Email sending
- Network sharing
Question 284 :
____________ Files are the files which are read only.
- . Mutable
- Immutable
- Setup
- Recursive
Question 285 :
A monitor is a module and monitor which of the following can encapsulates
- shared data structures
- procedures that operate on shared data structure
- synchronization between concurrent procedure invocation
- all of the mentioned
Question 286 :
In which algorithm, One process is elected as the coordinator.
- Distributed mutual exclusion algorithm
- Centralized mutual exclusion algorithm
- Vector Algorithm
- Lamport algorithm
Question 287 :
Following is Possible diffeerent RPC server semantics.
- The server guarantees it will secure communication.
- The server guarantees it will distribute workload
- The server guarantees it will halt communication.
- The server guarantees it will carry out an oper-ation at most once.
Question 288 :
Which is not an examples of state information ?
- Mounting information
- Description of HDD space
- Session keys
- Lock status
Question 289 :
A layer which is the binary data protocol layer.
- stub layer
- skeleton layer
- remote layer
- transport protocol
Question 290 :
RPC stands for
- Remote process communication
- Remote Procedure Call
- Reliable Process communication
- Reliable Procedure communication
Question 291 :
In distributed file system, DNS stands for?
- Domain Name System
- Domain Name Server
- Directory name service
- Disk name system
Question 292 :
Replication model in which one replica is server replica and other follow the sever is___________.
- Master-Slave
- Client -Server
- Peer-to-peer
- Permanent
Question 293 :
In Erasure correction approach a missing packet is constructed from
- other successfully delivered packets
- last delivered packet
- first packet
- retransmitting packets
Question 294 :
If processes p and q both receive messages m and m', then p receives m before m' if and only if q receives m before m'.The order delivery is called______________
- Absolute ordering
- Consistent ordering
- Causal ordering
- FIFO ordering
Question 295 :
Rebooting as a practical recovery technique requires that components are largely
- coupled in the sense that there are dependencies between different components.
- coupled in the sense that there are no dependencies between different components.
- decoupled in the sense that there are few or no dependencies between different components
- decoupled in the sense that there are dependencies between different components.
Question 296 :
If a process is executing in its critical section ____________
- any other process can also execute in its critical section
- no other process can execute in its critical section
- one more process can execute in its critical section
- every process can execute in its critical section
Question 297 :
A client gets a timestamp of 4:12:30.500 from a time server. The elapsed time between the request and response was 20 msec (0.020 sec). The current time on the client is 4:12:30.510. Using Cristian’s algorithm, what is the time set to on the client?
- 0.175347222
- 0.175347222
- 0.17537037
- 0.17537037
Question 298 :
RMI uses stub and skeleton for communication with the ________
- client
- remote
- server
- any
Question 299 :
Which Distributed System Model deals with Communication?
- Security Model
- Fault Model
- Interaction Model
- Architecture Model
Question 300 :
Serializability is the term, used in ______ characteristic of distributed system
- scalability
- concurrency
- fault tolerance
- openness