Distributed Computing MCQ's




Question 301 :
What are the characteristics of process migration?


  1. transfer data by entire file or immediate portion required
  2. transfer the computation rather than the data
  3. execute an entire process or parts of it at different sites
  4. execute limited portion of data
  

Question 302 :
The type of communication where the sender is blocked until its message is stored in a local buffer at the receiving host, or actually delivered to the receiver.


  1. Transient communication
  2. Persistent communication
  3. Synchronous communication
  4. Asynchronous communication
  

Question 303 :
RPC works between two processes. These processes must be ____________


  1. on the same computer
  2. on different computers connected with a network
  3. on the same computer and also on different computers connected with a network
  4. on none of the computers
  

Question 304 :
Which is not an examples of state information ?


  1. Mounting information
  2. Description of HDD space
  3. Session keys
  4. Lock status
  

Question 305 :
____are useful for the enforcement of mutual exclusion and also provide an effective means of inter-process communication.


  1. Semaphores
  2. Messages
  3. Monitors
  4. Addressing
  

Question 306 :
Processes do not communicate with each other and creates their own check points.


  1. User Triggered
  2. Uncoordinated check points
  3. Coordinated check points
  4. Message based check pointing.
  

Question 307 :
When calling the socket primitive, the caller creates a new communication end point for a specific _________ protocol


  1. Transport
  2. Application
  3. UDP
  4. Socet
  

Question 308 :
Which policy determines when it will benecessary to transfer the process from one node to another?


  1. Selection policy
  2. Transfer policy
  3. Location policy
  4. Information policy
  

Question 309 :
What is common problem found in distributed system ?


  1. Process Synchronization
  2. Communication synchronization
  3. Deadlock problem
  4. Power failure
  

Question 310 :
When will file system fragmentation occur?


  1. unused space or single file are not contiguous
  2. used space is not contiguous
  3. unused space is non-contiguous
  4. multiple files are non-contiguous
  

Question 311 :
A distributed computer running a distributed program is known as


  1. Distributed Process
  2. Distributed Application
  3. Distributed Computing
  4. Distributed Program
  

Question 312 :
Storing a separate copy of the database at multiple locations is which of the following?


  1. Data Replication
  2. Horizontal Partitioning
  3. Vertical Partitioning
  4. Horizontal and Vertical Partitioning
  

Question 313 :
What is Inter process communication?


  1. allows processes to communicate and synchronize their actions when using the same address space
  2. allows processes to communicate and synchronize their actions without using the same address space
  3. allows the processes to only synchronize their actions without c
  4. communicate with one another without resorting to shared dat
  

Question 314 :
A Parallel computer is the computer system capable of


  1. Parallel Computing
  2. Centralized Computing
  3. Decentralized Computing
  4. Distributed Computing
  

Question 315 :
_______is a property to consider in faulty distributed environments


  1. Replication
  2. recovery
  3. concurrency
  4. Consistency
  

Question 316 :
Replication model in which no master replica or slave replica is_________.


  1. Master-Slave
  2. Client -Server
  3. Peer-to-peer
  4. Permanent
  

Question 317 :
The directory can be viewed as a _________ that translates file names into their directory entries.


  1. symbol table
  2. partition
  3. swap space
  4. cache
  

Question 318 :
A situation where several processes access and manipulate the same data concurrently and the outcome of the execution depends on the particular order in which access takes place is called ____________


  1. Data consistency
  2. race condition
  3. aging
  4. starvation
  

Question 319 :
Once failure has occurred in many cases it is important to ______critical processes to a known state in order to resume processing


  1. start
  2. stop
  3. recover
  4. pause
  

Question 320 :
__________ is a process that prevents multiple threads or processes from accessing shared resources at the same time


  1. Critical section
  2. Deadlock
  3. Message passing
  4. Mutual Exclusion
  

Question 321 :
The variable that assures updates to a datastore are propagated to all local copies is ______.


  1. Release
  2. Acquire
  3. Read
  4. Write
  

Question 322 :
In ______________ all the processes submitted by the users are distributed among the nodes of the system so as to equalize the workload among the nodes


  1. Load Sharing
  2. Load Balancing
  3. Task Assignment
  4. Data Parallelism
  

Question 323 :
The ring election algorithm works by:


  1. Having all nodes in a ring of processors send a message to a coordinator who will elect the leader.
  2. Sending a token around a set of nodes. Whoever has the token is the coordinator.
  3. Sending a message around all available nodes and choosing the first one on the resultant list.
  4. Building a list of all live nodes and choosing the largest numbered node in the list.
  

Question 324 :
A redundancy technique used to mask failure where extra (duplicate) hardware and/or software is added to the system.


  1. Information Redundancy
  2. Time Redundancy
  3. Physical Redundancy
  4. Space Redundancy
  

Question 325 :
When a client has a cascading mount _______ server(s) is/are involved in a path name traversal.


  1. at least one
  2. more than one
  3. more than two
  4. more than three
  

Question 326 :
The type of communication where a sender continues its execution immediately after it has submitted its message for transmission


  1. Transient communication
  2. Persistent communication
  3. Synchronous communication
  4. Asynchronous communication
  

Question 327 :
Hide where a resource is located which type of transparency is this?


  1. Location
  2. Migration
  3. Relocation
  4. Access
  

Question 328 :
Process Fail - Stop in process omission faults


  1. Can be detected in synchronous system.
  2. Can be detected in asynchronous system.
  3. Can be detected in synchronous and asynchronous system.
  4. Can be detected in standalone system.
  

Question 329 :
Type of cluster computing is


  1. Load sharing cluster
  2. Load holding cluster
  3. Load replication cluster
  4. Load balancing cluster
  

Question 330 :
________algorithm uses the information about properties of the node and characteristics of processes.


  1. probabilistic algorithm
  2. Heuristics solution
  3. deterministic algorithm
  4. Optimal solution
  
Pages