Question 961 :
Two types of subscriptions present for replication is _____________
- push and pull
- throw and pull
- push and throw
- Pull and throw
Question 962 :
In X.500 the user interface program for access to one or more DSAs is a ___________________.
- Directory User Agent
- System User Agent
- Network User Agent
- World User Agent
Question 963 :
In which the access takes place when different processes try to access the same data concurrently and the outcome of the execution depends on the specific order, is called
- dynamic condition
- race condition
- essential condition
- critical condition
Question 964 :
Distributed OS functions on the ________ principle
- File Foundation
- Single system image
- Multi system image
- Networking image
Question 965 :
In the token passing approach of distributed systems, processes are organized in a ring structure _____
- logically
- physically
- both logically and physically
- Conceptually
Question 966 :
Any electronic holding place where data can be stored and retrieved later whenever required is ____________
- memory
- drive
- disk
- circuit
Question 967 :
Middleware communication protocols support -
- High-level communication services
- Multi-level Communication Services
- Remote Procedure Call
- Interprocess communication
Question 968 :
DIT in Domain Name Space stands for
- Direct Information Transparency
- Directory Implicit Transfer
- Direct Information Token
- Directory Information Tree
Question 969 :
In which of the following consistency model all writes become perceptible to all processes
- Strict
- Weak
- Casual
- Sequential
Question 970 :
The characteristic of distributed system that cares reliability of system so that in case of any failure, system continues to operate properly-
- Scalability
- Concurrency
- Fault tolerance
- Openness
Question 971 :
Logical extension of computation migration is
- process migration
- system migration
- thread migration
- data migration
Question 972 :
The calls, whose caller has expired due to node crash, is known as _____.
- orphan
- dead
- alive
- request
Question 973 :
In RMI, a remote interface is a normal ____ interface, which must extend the marker interface
- C
- C++
- Java
- Pascal
Question 974 :
An architecture where clients first communicate the server for data then format and display it to the users, is known as ___________
- Client/Server architecture
- Three-tier architecture
- Two-tier architecture
- Peer-to-Peer architecture
Question 975 :
The main disadvantage of P2P model are _______________________ - _______________________.
- lack of scalability, high complexity
- support for scalability, low complexity
- lact of scalability, high simplycity
- support for scalability, high simplycity
Question 976 :
The ______ is used to provide security to the shared resources, processes - channels used for their interactions.
- Interaction model
- Fault model
- Architectural model
- Security model
Question 977 :
If an old process wants a resource held by a young process, the old one will wait happens in _______
- Wait-die
- Wound-wait
- Both
- wait-wound-wait
Question 978 :
Which file is a sequence of bytes organized into blocks understandable by the system’s linker?
- object file
- source file
- executable file
- text file
Question 979 :
Which of the following should be satisfied for proper synchronization in distributed systems?
- prevention from the deadlock is must
- prevention from the starvation is must
- prevention from the deadlock - starvation is must
- Prevention from the livelock is must
Question 980 :
Session file sharing semantics are suitable for caching
- complete folder
- complete file
- One byte
- one block
Question 981 :
According to the ring algorithm, links between processes are _____
- Bidirectional
- Unidirectional
- Both bidirectional and unidirectional
- None of the mentioned
Question 982 :
What are the advantages of token(with rings) passing approach ? I. One processor as coordinator which handles all requests II. No starvation if the ring is unidirectional III. There are many messages passed per section entered if few users want to get in section IV. One processor as coordinator which handles all requests V. Only one message/entry if everyone wants to get in
- I, II and V
- I, II and IV
- II, III and IV
- II, IV and V
Question 983 :
A typical __________ program obtains a remote reference to one or more remote objects on a server and then invokes methods on them.
- a) Server
- b) Client
- c) Thread
- d) Concurrent
Question 984 :
The strongest form of memory coherence model, having the most stringent consistency requirement
- causal consistency
- strict consistency
- sequential consistency
- FIFO consistency
Question 985 :
Select NON-token-based algorithm from the options below.
- Suzuki–Kasami’s Broadcast Algorithm
- Singhal’s Heuristic Algorithm
- Raymond’s Tree-Based Algorithm
- Ricart–Agrawala Algorithm
Question 986 :
In global google system Ranking algorithm is called
- SyatemRank
- LinkRank
- PageRank
- IPRank
Question 987 :
Using extra equipments or processed either in hardware or software is______.
- Information redundancy
- Time redundancy
- Physical redundancy
- Data Redundancy
Question 988 :
Which event is concurrent with the vector clock (2, 8, 4)?
- (3,9,5)
- (3,8,4)
- (1,7,3)
- (4,8,2)
Question 989 :
storage of firmware is -
- ROM
- RAM
- External
- Cache memory
Question 990 :
Bully Algorithm was proposed by ____________
- Garcia-Molina.