Distributed Computing MCQ's




Question 541 :
The degree of tolerance of update dependancy and state read is defined as________.


  1. Concurrency
  2. Consistency
  3. Availability
  4. Isolation
  

Question 542 :
A replica set can have only ________ primary.


  1. One
  2. two
  3. three
  4. zero
  

Question 543 :
What is the characteristic of Naming and Name resolution?


  1. Name system in the network.
  2. Address messages with the process-id
  3. Virtual Circuit
  4. Message Switching
  

Question 544 :
To improve performance, many distributed systems


  1. combine check pointing with recovery oriented computing
  2. combine check pointing with message logging
  3. combine check pointing with distributed commit
  4. combine distributed commit with message logging.
  

Question 545 :
MOM stands for?


  1. Message oriented middleware
  2. Mails oriented middleware
  3. Middleware of messages
  4. Main object middleware
  

Question 546 :
How does the Quorum-based mutual exclusion algorithm reduce the message complexity of invoking mutual exclusion


  1. By having sites broadcast the request to all other sites
  2. By having sites broadcast the request to a central coordinator
  3. By having sites ask permission to a higher priority site
  4. By having sites ask permission from only a subset of sites.
  

Question 547 :
To organise file systems on disk _______________


  1. they are split into one or more partitions
  2. information about files is added to each partition
  3. they are made on different storage spaces
  4. they are made on same storage spaces
  

Question 548 :
From the given options select the appropriate statement for sequential consistency(SC).


  1. SC is the strongest and yet practical consistency model
  2. SC allows for high availability during periods of network disconnectivity
  3. SC allows a client thread to read a stale value of some variable
  4. SC is only applicable to distributed shared memory systems and not applicable to distributed storage systems
  

Question 549 :
What is WPA?


  1. wi-fi protected access
  2. wired protected access
  3. wired process access
  4. wi-fi process access
  

Question 550 :
________ Property of Distributed System offers services according to standard rules that describe the syntax and semantics of those services


  1. Openness
  2. Transparency
  3. Reliabilty
  4. Scalability
  

Question 551 :
A DFS should provide following services____.


  1. Transparency, User mobility, Performance, Simplicity and ease of use.
  2. Opacity,User mobility, Performance, Simplicity and ease of use.
  3. Immobility ,Transparency,Performance,Simplicity and ease of use.
  4. Opacity,User mobility, Performance, difficult to use.
  

Question 552 :
_________________ is often used for implementing specialized threads within a process.


  1. Team model
  2. Dispatcher worker model
  3. Pipeline model
  4. Light model
  

Question 553 :
Which event is concurrent with the vector clock (2, 8, 4)?


  1. (3, 9, 5)
  2. (3, 8, 4)
  3. (1, 7, 3) à
  4. (4, 8, 2)
  

Question 554 :
What are the characteristics of transaction semantics?


  1. The users of this model are interested in the atomicity property for their transaction
  2. Suitable for applications that are concerned about coherence of data
  3. Easy to implement in a single processor system
  4. Write-back enhances access performance
  

Question 555 :
Processor Consistency model guarantees and conforms that


  1. All write accomplished on identical memory location in identical sequence.
  2. All write accomplished on random memory location in random sequence
  3. All write accomplished on random memory location in identical sequence
  4. All write accomplished on identical memory location in random order
  

Question 556 :
Hide the failure and recovery of a resource is known as which transparency


  1. Failure
  2. Location
  3. Migration
  4. Relocation
  

Question 557 :
The ____- control the assignment of resources to processes


  1. task manager
  2. resource manager
  3. process manager
  4. object manager
  

Question 558 :
Google is a _______based corporation


  1. Japan
  2. US
  3. Rasia
  4. UK
  

Question 559 :
datanodes and namenode are two elements of which file system?


  1. AFS
  2. HDFS
  3. NFS
  4. None of the above
  

Question 560 :
Which one of the following is not true about NFS?


  1. Server- client Based Architecture
  2. Clientand Server Caching
  3. End users do not interact
  4. No Replication
  

Question 561 :
Identify the distributed file system among the options.


  1. Andrew file system
  2. EXT
  3. FAT32
  4. FAT
  

Question 562 :
Which are the two complementary deadlock-prevention schemes using timestamps?


  1. The wait-die - wound-wait scheme
  2. The wait-n-watch scheme
  3. The wound-wait scheme
  4. The wait-wound - wound-wait scheme
  

Question 563 :
Which one is NOT a part of the sets of services underlying the Google Search Engine


  1. Crawling
  2. Testing
  3. Ranking
  4. Indexing
  

Question 564 :
The application layer packet is encapsulated in a


  1. TCP or UDP packet
  2. IP packet
  3. Presentation packet
  4. data link layer
  

Question 565 :
Hide the failure and recovery of a resource is known as which transparency


  1. Failure
  2. Location
  3. Migration
  4. Relocation
  

Question 566 :
_____ implies that the user need not be aware whether the resource is in volatile memory or on the disk.


  1. Relocation Transparency
  2. Location Transparency
  3. Migration Transparency
  4. Persistence Transparency
  

Question 567 :
Which are the two complementary deadlock-prevention schemes using timestamps?


  1. The wait-die - wound-wait scheme
  2. The wait-n-watch scheme
  3. The wound-wait scheme
  4. The wait-wound - wound-wait scheme
  

Question 568 :
With multiprogramming ______ is used productively.


  1. time
  2. space
  3. money
  4. ready
  

Question 569 :
Which event is concurrent with the vector clock (2, 8, 4)?


  1. (3, 9, 5)
  2. (3, 8, 4)
  3. (1, 7, 3) à
  4. (4, 8, 2)
  

Question 570 :
A system that offers intermediate-term storage capacity for messages, without requiring either the sender or receiver to be active during message transmission is suitable for


  1. Persistent asynchronous communication
  2. Transient asynchronous communication
  3. Persistent synchronous communication
  4. Transient synchronous communication
  
Pages