Question 601 :
In Suzuki Kasami algorithm, the time required for a requesting site to enter the CS is _____
- Infinite
- finite
- zero
- unpredictable
Question 602 :
Synchronization tool is?
- thread
- pipe
- semaphore
- socket
Question 603 :
which of the service offered by middleware is allows to share - access the resources Concurrently?
- Querying service
- Persistance service
- Concurrency service
- Naming service
Question 604 :
MPI_bsend is equivalent to _____.
- One way RPC
- Two wayRPC
- Synchronous RPC
- Asynchronous RPC
Question 605 :
The consistency model which do not handle simultaneous updates-
- data centric model
- Client centric model
- server centric model
- traffic centric model
Question 606 :
Multiprogramming is mainly accomplished by:
- os
- software
- hardware
- program
Question 607 :
The security of distributed system can be achieved in terms of various security goals,which one is not the goal
- Authentication
- Authorization
- Confidentiality
- Denial Service
Question 608 :
Which of the following network is used to dissiminate information to its group members.
- Prior network
- Chief network
- Prime Network
- Overlay network
Question 609 :
A monitor is a module and monitor which of the following can encapsulates
- shared data structures
- procedures that operate on shared data structure
- synchronization between concurrent procedure invocation
- all of the mentioned
Question 610 :
Preemptive Shortest Job First scheduling is sometimes called ___
- Fast SJF scheduling
- EDF scheduling – Earliest Deadline First
- HRRN scheduling – Highest Response Ratio Next
- SRTN scheduling – Shortest Remaining Time Next
Question 611 :
In RMI, packing and unpacking of data into message in done by -
- client and server
- stub
- skeleton
- stub and skeleton
Question 612 :
What are the characteristics of computation migration?
- transfer data by entire file or immediate portion required
- transfer the computation rather than the data
- execute an entire process or parts of it at different sites
- execute an entire process or parts of it at same site
Question 613 :
A classes of failure that can occur in RPC systems, as :
- The server crashes after receiving a request And Client Cannot Locate the Server
- Client Cannot Locate the Server
- The server crashes after receiving a request.
- Server crashes
Question 614 :
Arbitrary failure may ouccur in form of
- duplicate message
- protocol
- reliable communication
- address spacde
Question 615 :
A request, at the risk of server never execution is _________.
- Never Reissue
- Always Reissue
- Reissue a request on acknoledgment
- Reissue a request on no acknoledgment
Question 616 :
In a distributed file system, _______ is mapping between logical and physical objects.
- client interfacing
- naming
- migration
- heterogeneity
Question 617 :
In socket programming, client sends request to the server using which primitive?
- Socket
- Connect
- Send
- Receive
Question 618 :
The ___________ layer, which provides the interface that client and server application objects use to interact with each other.
- increasing
- count
- stub/skeleton
- bit
Question 619 :
The security of a distributed system can be achieved by ______ used for their interactions .
- securing the processes and the channels
- securing the channels not process
- not securing the processes and the channels
- securing the processes not the channels
Question 620 :
In RPC, array is passed from client to server using
- Call by value
- call by reference
- call-by-copy/restore
- None of the above
Question 621 :
A process can be ___________
- single threaded
- tripalthreaded
- single threaded and multithreaded
- doublethreaded
Question 622 :
Message passing provides a mechanism to allow processes to communicate and to synchronize their actions ________
- By sharing the same address space
- without sharing the same address space
- by sharing the same Process Identifier
- by sharing the same process number
Question 623 :
Which is the approach for naming the files i)Files are named with a combination of host and local name.ii)Remote directories are mounted to local directories iii)A single global name structure spans all the files in the system
- i only
- ii only
- ii and iii only
- i,ii and iii
Question 624 :
What is key idea to select coordinator in Bully Algorithm?
- Select process with highest ID
- Select process with lowest ID
- Any process who identified that coordinator is failed
- Random
Question 625 :
What are the characteristics of data migration?
- transfer data by entire file or immediate portion required
- transfer the computation rather than the data
- execute an entire process or parts of it at different sites
- execute limited portion of data
Question 626 :
Which of the following process can be affected by other processes during execution in the system?
- init process
- child process
- parent process
- cooperating process
Question 627 :
Time interval from a request send to its CR execution completed is known as______
- Synchronization delay
- System throughput
- Message complexity
- Response time
Question 628 :
IDLs describe an interface in a ________ way
- language-dependent
- language-independent
- language oriented
- language specified
Question 629 :
When a user refers to a particular file?
- system MFD is searched
- his own UFD is not searched
- both MFD and UFD are searched
- every directory is searched
Question 630 :
In ______ System any communication between the processors takes place through the shared memory.
- Tightly Coupled system
- Loosely Coupled System
- Middleware System
- Scientific System