Question 871 :
Security for information resource does not include
- Availability
- Concurrency
- Confidentiality
- Integrity
Question 872 :
Which of the following is a disadvantage of replication?
- Reduced network traffic
- If the database fails at one site, a copy can be located at another site.
- Each site must have the same storage capacity.
- Each transaction may proceed without coordination across the network.
Question 873 :
A process can enter into its critical section _______
- anytime
- when it receives a reply message from its parent process
- when it receives a reply message from all other processes in the system
- when it receives a reply message from its child process
Question 874 :
What is the advantage of caching in remote file access?
- Reduced network traffic by retaining recently accessed disk blocks
- Faster network access
- Copies of data creates backup automatically
- Copies of data resolves inconsistencies
Question 875 :
Distributed file system supports i)Remote Information Sharting ii)User Mobility iii)Unavailability iv)Diskless Workstations
- i,ii,iii only
- ii,iii,iv only
- i,ii,iv only
- iii and iv only
Question 876 :
An email service is a typical example of messaging service, where a sender sends an email message to recipient.
- It never waits for a reply from the recipient
- it always waits for a reply from the reciepient before sending next
- it will always send the reply email message to the sender.
- it is a type of synchronous communication
Question 877 :
____________ used in replication of stocks
- Numerical deviation
- Staleness deviation
- Ordering deviation
- Time deviation
Question 878 :
In which pipeline ,the data between adjacent stages is controlled by handshaking protocol.
- Blocking pipeline
- Non-blocking pipeline
- Asynchronous pipeline
- Synchronous pipeline
Question 879 :
In _______ assignment of job is done at run
- Dynamic load balancing algorithm
- Static load balancing algorithm
- Symmetric load balancing algorithm
- Asymmetric load balancing algorithm
Question 880 :
Non-token based algorithms uses ______________to order requests for the critical section
- token
- Timestamp
- sequence number
- token ID
Question 881 :
In the case of____________ , changes to an open file are only locally visible.
- session semantics
- immutable files
- atomic transactions
- Client Interfacing
Question 882 :
_________ all related objects moved and left to a server upon the first RPC
- Call by value
- Call by move
- Call by visit
- Call by reference
Question 883 :
In a nutshell, what Birrell and Nelson suggested was allowing programs to call procedures located on other machines related to
- RPC
- IPC
- PROTOCOL
- BINDING
Question 884 :
In global google sysytem indexing define as
- index for the contents of the web that is similar to an index at the back of a book
- Serial nos
- Serial nos in parrallel
- index of data
Question 885 :
The Mekawa mutual exclusion algorithm requires _______ messages per Critical Section invocation
- 2N
- 2 √N
- 3N
- 3 √N
Question 886 :
What is true about No a priori knowledge about the processes ?
- Process assignment decisions should be dynamic i.e based on the current load of the system and not on some static policy
- Heuristic methods requiring less computational efforts
- Algorithms provide near optimal system performance with a minimum overhead
- Scheduling algorithms that operate based on the information about the chracteristics and resource requirements of the processes
Question 887 :
Which are the two complementary deadlock-prevention schemes using time stamps ?
- The wait-die - wound-wait scheme
- The wait-n-watch scheme
- The wound-wait scheme
- The wait-wound - wound-wait scheme
Question 888 :
Maekawa’s algorithm is a ___________ mutual exclusion algorithm.
- Token-based
- Voting-based
- Non-token based
- Tree-based
Question 889 :
In the distributed system, the goal of the task assignment approach is toassign the tasks of a process to the nodes. Consider there are two nodes n1and n2 and four tasks {T1, T2, T3, T4,T5,T6}. Tasks T1 are assigned to node n1and tasks T2,T3,T4, T5, T6 are assigned to node n2.Comunication cost is as given in table below. Considering serial task assignment, the communication incur will be T1, T2, T3, T4,T5,T6T1-> 0, 6, 4, 0, 0, 12T2-> 6, 0, 8, 12, 3, 0T3-> 4, 8, 0, 0, 11, 0T4=> 0, 12, 0, 0, 5, 0T5-> 0, 3, 11, 5 , 0, 0T6=> 12, 0, 0, 0, 0, 0
- 38
- 22
- 39
- 50
Question 890 :
Resource Record in DNS has_____.
- Mapping of domain Name to IP address
- Resources consumption records
- Key Performance Indicator for Domain
- Backup nodes IP Address
Question 891 :
Which mutual exclusion algorithm works when the membership of the group is unknown?
- Centralized.
- Ricart-Agrawala.
- Lamport.
- Token Ring.
Question 892 :
The sections of a program that need exclusive access to shared resources are referred as___________
- Critical sections
- deadlocks
- fairness
- starvation
Question 893 :
To what extent inconsistencies can be tolerated depends highly on the usage of a
- replication
- duplication
- resource
- data
Question 894 :
Full form of NTP is:
- Network Time Protocol
- New time Protocol
- New Timestamp Protocol
- Network Timestamp Protocol
Question 895 :
In which type of failures we assume that communication links are nonfaulty, but that process P cannot distinguish crash failures from omission failures
- Fail-stop failures
- Fail-noisy failures
- fail-silent failures
- Fail-safe failures
Question 896 :
Writes done by a single process are seen by all other processes in the order in which they were issued, but writes from different processes may be seen in a different order by different processes is the necessary condition in ______
- Casual consistency
- FIFO consistency
- LRU consistency
- Optimal consistency
Question 897 :
Which Data consistency model states Writes done by a single process are seen by all other processes in the order in which they were issued but writes form different processes may be seen in a different order by different processes
- Weak consistency
- Sequential consistency
- FIFO consistency
- Strict consistency
Question 898 :
A remote procedure call is __________.
- a single process
- a single thread
- a single stream
- inter-process communication
Question 899 :
Network File System writes data_____
- Index wise
- Automatic
- Synchronously
- Asynchronously
Question 900 :
Following is not a agreement to ensure consistency.
- 2PC
- 3PC
- Paxos
- P2P