Question 121 :
In __________ critical section requests are executed in the increasing order of timestamps i.e a request with smaller timestamp will be given permission to execute critical section first than a request with larger timestamp.
- Cristian’s algorithm
- Berkeley algorithm
- Lamport algorithm
- Election algorithm
Question 122 :
The NFS protocol __________ concurrency control mechanisms.
- provides
- does not provide
- may provide
- may not provide at some time
Question 123 :
The segment of code in which the process may change common variables, update tables, write into files is known as ____________
- program
- critical section
- non – critical section
- synchronizing
Question 124 :
_______of data is a major fault tolerance method in distributed system
- Replication
- recovery
- concurrency
- Consistency
Question 125 :
What is not a major goal for building distributed systems?
- Resource sharing
- Computation speedup
- Reliability
- Simplicity
Question 126 :
If two event a and b are parallel, then ____________.
- a and b monotonic
- C = C
- C > C
- C < C
Question 127 :
Recart-Agrawala Algorithm is
- Election Algorithm
- Clock synchronization Algorithm
- Mutual Exclusion Algorithm
- Event ordering
Question 128 :
When the event for which a thread is blocked occurs?
- thread moves to the ready queue
- thread remains blocked
- thread completes
- a new thread is provided
Question 129 :
___________defined a relation called happens-before
- Berkeley
- Lamport
- Vector
- Cristian
Question 130 :
Select the message which is not used in Centralized algorithm of Mutual Exclusion
- Release
- Request
- Hello
- Reply
Question 131 :
A file appears to the file server as an ordered sequence of records in
- Unstructured files
- Structured files
- Immutable files
- Mutable files
Question 132 :
In GFS(Google file System) files are divided into _______chunks
- Variable Size
- Fixed Size
- Variable and Fixed size
- Not variable not fixed size
Question 133 :
Which of the following variables denote the state of site in Singhals dynamic information structure algorithm
- Requesting, Executing, and My_ priority
- Requesting, Responsing and My_priority
- Requesting, Responsing and Blocked
- Requesting, Executing and Blocked
Question 134 :
In RPC system, which of the following failure may not occur
- The client cannot locate server
- The client crashes after sending a request
- The server crashs after receiving a request
- The request message from the client to the server is obtained
Question 135 :
Which of the below element is usually not there in the header?
- Sequence number
- Structural information
- Address
- File mode(Read/ Write)
Question 136 :
Virtualization that creates one single address space architecture is called ______.
- Loosely coupled
- Peer-to-Peer
- Space-based
- Tightly coupled
Question 137 :
The maximum number of messages required per CS execution in Maekawa's algorithm for deadlock handling is
- 4√N
- √N
- 5√N
- 2√N
Question 138 :
which of the following is not basic requirements of Mutual Exclusion Algorithms
- Safety property
- Liveness property
- Fairness
- System throughput
Question 139 :
Which of the following is a disadvantage of replication?
- Reduced network traffic
- If the database fails at one site, a copy can be located at another site.
- Each site must have the same storage capacity.
- Each transaction may proceed without coordination across the network.
Question 140 :
Among the following option which is not main focus of Distributed System
- Availability
- Reliability
- Scientific Performance
- Resource sharing
Question 141 :
Which of the following is NOT type of distributed systems
- Distributed computing system
- Pervasive system
- Distributed Information System
- Parallel System
Question 142 :
The effect of a write operation by a process on data item x will always be seen by a successive read operation on x by the same process.
- Read-your-writes
- Monotonic-writes
- Monotonic-Reads
- Writes-follow-reads
Question 143 :
Which among below is not a technique commonly used for scaling in Distributed System
- Hiding Communication Latency
- Hide Performance
- Hide Distribution
- Hide Replication
Question 144 :
Which of the following are the problems of token ring algorithms
- Lost token, coordinator crash
- Coordinator crash, low efficiency
- process crash, low efficiency
- Lost token, process crash
Question 145 :
________________ provides programmers a familiar programming model by extending the local procedure call to a distributed environment
- Distributed environment
- Permanent procedure call
- Process and file
- Remote procedure call
Question 146 :
RPC allows a computer program to cause a subroutine to execute in _________
- Its own address space
- Another address space
- Both its own address space and another address space
- Applications address space
Question 147 :
Which of the following variable wait within the to enable a process
- a condition is defined by a condition variable
- objects Boolean objects can be used by condition variables
- semaphore must be used
- all of the mentioned
Question 148 :
Which is not desirable feature of a good distributed system
- User mobility
- Performance
- Data Intergrity
- Homogeneity
Question 149 :
The data consistency models in the descending order of their strictness in consistency are _____.
- Linearizability, Sequential, Casual, FIFO
- FIFO,Casual,Sequential,Linearizability
- Casual,Sequential,Linearizability,FIFO
- Sequential,Casual,FIFO,Linearizability
Question 150 :
What are not the characteristics of a DFS?
- login transparency and access transparency
- Files need not contain information about their physical location
- No Multiplicity of users
- No Multiplicity if files