Question 331 :
Which of the following is a form of distributed information system?
- Home system
- Transaction Processing System
- Pervasive system
- Enterprise Resource Planning system
Question 332 :
Which of the following is an transport layer protocol?
- DNS
- TCP
- RMI
- SONET
Question 333 :
Message passing system allows processes to __________
- communicate with one another without resorting to shared data
- communicate with one another by resorting to shared data
- share data
- name the recipient or sender of the message
Question 334 :
Which is NOT the characteristic of a DFS?
- reliability
- Scalability
- Transperency
- Upgradation
Question 335 :
Distributed multimedia system uses which type of transmission mode?
- Synchronous transmission mode
- Asynchronous transmission mode
- Isochronous transmission mode
- None of the above
Question 336 :
Which of the following is disadvantage of active replication
- Consistent replicas
- Minimal bandwidth costs
- Size of the parameters is small
- Processing power
Question 337 :
In a distributed file system, when a file’s physical storage location changes ___________
- File name needs to be changed
- File name need not to be changed
- File’s host name needs to be changed
- File’s local name needs to be changed
Question 338 :
An RPC (remote procedure call) is initiated by the _________
- Server
- Client
- Client after server
- A third party
Question 339 :
In distributed systems, election algorithms assumes that ____________
- a unique priority number is associated with each active process in system
- there is no priority number associated with any process
- priority of the processes is not required
- process work without number
Question 340 :
SRM protocol stands for
- Scalable Reliable Multispreading
- Scalable Recovery Multicasting
- Scalable Reliable Multicasting
- Scalable Recovery Multispreading
Question 341 :
Suzuki-Kasami's Broadcast Algorithm is an
- Non- token based algorithm.
- Token based algorithm.
- Centralized Based algorithm
- physical clock synchronization algorithm.
Question 342 :
You are synchronizing your clock from a time server using NTP and observe the following times: [4 points] a. timestamp at client when the message leaves the client: 6:22:15.100 b. timestamp at which the server receives the message: 7:05:10.700 c. timestamp at which the server sends the reply: 7:05:10.710 d. timestamp at client when the message is received at client: 6:22:15.250 To what value do you set the client's clock?
- 0.295266204
- 0.33693287
- 0.378599537
- 0.420266204
Question 343 :
The ring election algorithm works by:
- Having all nodes in a ring of processors send a message to a coordinator who will elect the leader.
- Sending a token around a set of nodes. Whoever has the token is the coordinator.
- Sending a message around all available nodes and choosing the first one on the resultant list.
- Building a list of all live nodes and choosing the largest numbered node in the list.
Question 344 :
What is full form of AFS?
- Andrew File System
- Analog File System
- Acess File System
- Acess Fast System
Question 345 :
The data sequence of information that is time-dependent is called ___________
- Stream of data
- traditional data
- transactional data
- spatial data
Question 346 :
The name space of AFS seen by user processes is a conventional UNIX directory hierarchy, with a specific subtree ________ containing all of the shared files.
- cmu
- tmp
- root
- lib
Question 347 :
In which approach of distributed computing, workload is divided from heavily loaded nodes to lightly loaded nodes in an attempt to ensure good overall performance ?
- Load Balancing approach
- Task assignment Approach
- Load Sharing Approach
- Process migration
Question 348 :
In Raymond’s Algorithm, TOKEN is held by which node of the tree?
- Left most Leaf node
- Right most Leaf node
- Root node
- Intermediate node
Question 349 :
Number of REQUEST messages for entering the critical region can vary from N/2 to N in which algorithm? (N: Number of nodes)
- Singhal’s heuristic algorithm
- Raymond’s tree-based algorithm
- Ricart–Agrawala's algorithm
- Lamport’s algorithm
Question 350 :
Single coordinator approach has the following disadvantages : i.Simple implementation, ii.Simple deadlock handling, iii.Bottleneck
- i
- ii
- ii and iii
- iii
Question 351 :
Which of the following is not example of Information redundancy
- parity
- checksum
- Hamming codes
- Rollback if transaction aborts
Question 352 :
In _______approach, each process submitted by the user for processing is viewed as a collection of related tasks and these task are scheduled to suitable nodes in order to improve the performance.
- Task assignment approach
- Load balancing approach
- Load dividing approach
- Load sharing approach
Question 353 :
In this type of process resilence group, the processes are equal and the decisions made are collective.
- Hierarchical Group
- flat group
- IETF group
- Collected process Group
Question 354 :
Which are the two complementary deadlock-prevention schemes using time stamps ?
- The wait-die - wound-wait scheme
- The wait-n-watch scheme
- The wound-wait scheme
- The wait-wound - wound-wait scheme
Question 355 :
In which OSI layer encryption and decryption happens ?
- Application
- Presentation
- Transport
- Data Link
Question 356 :
What are the advantages of file replication?
- Improves availability -performance
- Decreases performance
- Improves consistency
- Improves speed
Question 357 :
Write the event of following notations:M ~P ~C
- A crash occurs after sending the completion message and printing the text.
- A crash happens after sending the completion message, but before the text could be printed.
- A crash happens before the server could do anything.
- The text printed, after which a crash occurs before the completion message could be sent.
Question 358 :
In wound-wait If a young process wants a resource held by an old process, the young process will _____
- Killed
- Wait
- Preempt
- Restarts and wait
Question 359 :
X.500 is implemented as part of the ______________ in its Global Directory Service
- Distributed Computing Environment
- User fraindly Environment
- Global Computing Environment
- World Computing Environment
Question 360 :
A technique that allows more than one program to be ready for execution and provides the ability to switch from one process to another.
- multitasking
- multiprocessing
- multitasking
- multiprogramming