Distributed Computing System MCQs

Ace your homework & exams now with Quizwiz!

Processor Consistency model guarantees and conforms that ................................................ A. all write accomplished on identical memory location in identical sequence. B. all write accomplished on random memory location in random sequence C. all write accomplished on random memory location in identicalsequence D. all write accomplished on identical memory location in random order

A. all write accomplished on identical memory location in identical sequence.

NTP is ..............................layer protocol. A. application B. session C. transport D. physical

A. application

Message passing provides a mechanism to allow processes to communicate and to synchronize their actions ................. A. by sharing the same address space B. without sharing the same address space C. by sharing the same process number and process identifier D. by sharing port number

A. by sharing the same address space

Which mutual exclusion algorithm is useful when the membership of the group is unknown? A. centralized B. lamport's. C. token ring D. decentralized algorithm

A. centralized

..................................replicas are used only to improve access time on data. A. client initiated B. server initiated C. permanent D. dynamic

A. client initiated

An architecture where clients first communicate with the server for data, then format and display it to the users, is known as ......... A. client/server architecture B. three-tier architecture C. two-tier architecture D. peer-to-peer architecture

A. client/server architecture

The type of grid computing is A. collaborative grid B. system grid C. process grid D. channel grid

A. collaborative grid

In HDFS, . is the slave/worker node and holds the user data in the form of Data Blocks. A. datanode B. namenode C. data block D. replication

A. datanode

In distributed file system, DNS stands for? A. domain name system B. domain name server C. directory name service D. disk name system

A. domain name system

What are the characteristics of the stateless server? A. easier to implement B. they are not fault-tolerant upon client or server failures C. they store all information file server D. they are redundant to keep data safe

A. easier to implement

The file once created can not be changed is called ___________ A. immutable file B. mutex file C. mutable file D. none of the mentioned

A. immutable file

What are the advantages of file replication? A. improves availability & performance. B. decreases performance C. they are consistent D. improves speed

A. improves availability & performance.

When the process issues an I/O request....... A. it is placed in an i/o queue B. it is placed in a waiting queue C. it is placed in the ready queue D. it is placed in the job queue

A. it is placed in an i/o queue

What are the characteristics of a distributed file system? A. its users, servers and storage devices are dispersed B. service activity is not carried out across the network C. they have single centralized data repository D. there are multiple dependent storage devices

A. its users, servers and storage devices are dispersed

What is the feature of stateful server? A. longer server recovery time B. quick recovery after reboot C. file operations must be independent D. simple server design

A. longer server recovery time

Full form of NTP is: A. network time protocol B. new time protocol C. new timestamp protocol D. network time stamp protocol

A. network time protocol

What is a close group in group communication? A. only members can send messages to the group as a whole. B. processes that are not members (clients) can send messages to the group. C. the idea of groups is to support replicated servers. D. processes that are not members (clients) but close to the group can send messages to the group.

A. only members can send messages to the group as a whole.

How is access to resources of various machines done? A. remote logging using ssh or telnet B. zone are configured for automatic access C. ftp is not used D. ftp is used

A. remote logging using ssh or telnet

NFS file System uses Mechanism A. rpc B. corba C. rmi D. none of the above

A. rpc

Which of the following allocates/deallocates buffers ? A. rrl B. stub/skeleton layer C. transport layer D. networking layer

A. rrl

Storing file in a .........................................makes it permanently available A. secondary memory B. ram C. register D. dram

A. secondary memory

The local operating system on the server machine passes the incoming packets to the............... A. server stub B. client stub C. client operating system D. binding agent

A. server stub

In which of the following consistency models do all writes become perceptible to all processes? A. strict B. weak C. casual D. sequential

A. strict

RPC provides a(an) _____ on the client side, a separate one for each remote procedure. A. stub B. identifier C. name D. process identifier

A. stub

Network file system(NFS) is developed by? A. sun microsystem B. oracle C. apple D. honeywell

A. sun microsystem

Internet provides for remote login. A. telnet B. http C. ftp D. rpc

A. telnet

The dynamic replication algorithm takes into account ................................................... A. to reduce load on server B. files on server can be migrated anywhere C. schedule process migration D. resource sharing

A. to reduce load on server

Which algorithm requires "1 to ∞" messages to enter and leave a critical region? A. token ring algorithm B. centralized algorithm C. decentralized algorithm D. distributed algorithm

A. token ring algorithm

What are the characteristics of data migration? A. transfer data by entire file or immediate portion required B. transfer the computation rather than the data C. execute an entire process or parts of it at different sites D. execute an entire process or parts of it at same site

A. transfer data by entire file or immediate portion required

A distributed system is defined as a collection of autonomous computers linked by a network with software designed to produce an integrated computing facility. A. true B. false

A. true

11. In RMI, the objects are passed by............................... A. value B. reference C. value and reference D. object

A. value

For each critical section (CS) execution, the Ricart-Agrawala algorithm requires messages per CS execution and the Synchronization delay in the algorithm is............................... A. 3(n − 1), t B. 2(n − 1), t C. (n − 1), 2t D. (n − 1), t

B. 2(n − 1), t

Distributed pervasive systems are also known as A. user interface design B. Ubiquitous computing C. graphical user interface D. peer-to-peer system

B. Ubiquitous computing

What is not true about a distributed system? A. it is a collection of processor B. all processors are synchronized C. they do not share memory D. none of the mentioned

B. all processors are synchronized

The remote method invocation __________ A. allows a process to invoke memory on a remote object B. allows a thread to invoke a method on a remote object C. allows a thread to invoke memory on a remote object D. allows a process to invoke a method on a remote object

B. allows a thread to invoke a method on a remote object

Which of the following is an example of election algorithm. A. berkley algorithm: B. bully algorithm. C. cristian's algorithm D. lamport's

B. bully algorithm.

All related objects moved and left to a server upon the first RPC A. call by value B. call by move C. call by visit D. call by reference

B. call by move

Absolute time synchronization can be achieved using A. vector time stamping method B. christian's method C. lamport's method D. ricart-agrawala algorithm

B. christian's method

A machine that places the request to access the data is generally called................ A. server machine B. client machine C. request machine D. database server

B. client machine

To improve performance, many distributed systems A. combine check pointing with recovery-oriented computing B. combine check pointing with message logging. C. combine check pointing with distributed commit D. combine distributed commit with message logging.

B. combine check pointing with message logging.

Session file sharing semantics are suitable for caching............................... A. complete folder B. complete file C. one byte D. one block

B. complete file

If processes p and q both receive messages m and m', then p receives m before m' if and only if q receives m before m'. The order delivery is called....................................... A. absolute ordering B. consistent ordering C. causal ordering D. fifo ordering

B. consistent ordering

...........................................in NFS which function is used for creating a new file? A. open() B. create() C. develop() D. null()

B. create()

map and reduce are................................ A. libraries B. functions C. file system D. os

B. functions

data nodes and name node are two elements of which file system? A. afs B. hdfs C. nfs D. none of the above

B. hdfs

The header usually consists of the following elements in IPC I. Sequence number II. Structural information III. Address IV. File mode(Read/ Write) A. i,iii, iv B. i,ii, iii C. i, ii, iv D. i,iv

B. i,ii, iii

What is a stateless file server? A. it keeps tracks of states of different objects B. it maintains internally no state information at all C. it maintains some information in them D. none of the mentioned

B. it maintains internally no state information at all

HDFS works in a .....................................fashion. A. master-master B. master-slave C. slave-slave D. none of the above

B. master-slave

__________ is not possible in a distributed file system. A. file replication B. migration C. client interface D. remote access

B. migration

In HDFS file System, A ...............................serves as the master and there is only one Name Node per cluster A. data node B. namenode C. replication D. data block

B. namenode

In.................................... receivers never acknowledge the successful delivery of a multicast message but instead report only when they miss the message. A. basic reliable multicasting B. non-hierarchical feedback control C. hierarchical feedback control D. atomic multicast

B. non-hierarchical feedback control

Pretransfering is also known as............................................. A. premigrating B. pre-copying C. prefiltering D. post copying

B. pre-copying

Distributed system consists of set of resource................... A. printer B. processor C. cd D. processes

B. processor

In the Casual consistency model, all processes share access in ....................... A. random order B. same order C. sequential order D. specific order

B. same order

...........................is an object acting as a gateway for the client side. A. skeleton B. stub C. remote D. server

B. stub

RAYMOND'S TREE BASEDALGORITHM is an.............................. A. non- token based algorithm. B. token based algorithm. C. centralized based algorithm D. physical clock synchronization algorithm.

B. token based algorithm.

Suzuki-Kasami's Broadcast Algorithm is a/an A. non- token based algorithm. B. token based algorithm. C. centralized based algorithm D. physical clock synchronization algorithm.

B. token based algorithm.

What are the characteristics of computation migration? A. transfer data by entire file or immediate portion required B. transfer the computation rather than the data C. execute an entire process or parts of it at different sites D. execute an entire process or parts of it at same site

B. transfer the computation rather than the data

Transient communication is done by .............layer A. network B. transport C. physical D. session

B. transport

Any successive write operation by a process on a data item x will be performed on a copy of x that is up-to-date with the value most recently read by that process..................... A. monotonic-write B. writes follows reads C. read your writes D. monotonic-read

B. writes follows reads

A client gets a timestamp of 4:12:30.500 from a time server. The elapsed time between the request and response was 20 msec (0.020 sec). The current time on the client is 4:12:30.510. Using Cristian's algorithm, what is the time set to on the client? A. 1970-01-01 04:12:30 B. 1970-01-01 04:12:30 C. 1970-01-01 04:12:32 D. 1970-01-01 04:12:32

C. 1970-01-01 04:12:32

Process Fail - Stop in process omission faults A. can be detected in synchronous and asynchronous system. B. can be detected in asynchronous system. C. can be detected in synchronous system. D. can be detected in standalone system

C. can be detected in synchronous system.

Optimistic logging protocols need to keep track of .................................. A. independencies B. checking points C. dependencies D. erroneous state

C. dependencies

What are the characteristics of process migration? A. transfer data by entire file or immediate portion required B. transfer the computation rather than the data C. execute an entire process or parts of it at different sites D. execute an entire process or parts of it at same site

C. execute an entire process or parts of it at different sites

Remote Procedure Calls are used ____________ A. for communication between two processes remotely different from each other on the same system B. for communication between two processes on the same system C. for communication between two processes on separate systems D. none of the mentioned

C. for communication between two processes on separate systems

In which file system is map reduce function used? A. afs B. nfs C. hdfs D. none of the above

C. hdfs

The file once created can not be changed is called ............................. A. rigid file B. rex file C. immutable file D. robust file

C. immutable file

File Replication is done to A. increase complexity. B. increase cost. C. increase reliability D. increase data

C. increase reliability

All write accomplished on identical memory location in identical sequence. Staleness deviations related to the replica were updated. A. first time B. most recent time C. last time D. previous time

C. last time

A "glue" between client and server parts of application. A. package B. firmware C. middleware D. system software

C. middleware

which command is used to create a directory? A. rmdir B. symlink C. mkdir D. open

C. mkdir

Which address is used to identify a process on a host by the transport layer? A. physical address B. logical address C. port address D. specific address

C. port address

To differentiate the many network services a system supports ______ are used. A. variables B. sockets C. ports D. service names

C. ports

A process that is based on IPC mechanism which executes on different systems and can communicate with other processes using message based communication, is called ________ A. local procedure call B. inter process communication C. remote procedure call D. remote machine invocation

C. remote procedure call

In HDFS file System,..................................... Name Node is used when the Primary Name Node goes down. A. rack B. data C. secondary D. primary

C. secondary

Absolute time ordering of all shared accesses matters in................................... A. sequential consistency B. casual consistency C. strict consistency D. weak consistency

C. strict consistency

Scaling transparency hides A. system failure B. system collaboration C. system expansion D. system security

C. system expansion

A problem with the protocol is that when the coordinator has crashed, participants may not be able to reach a final decision. A. one-phase commit B. three-phase commit C. two-phase commit D. virtual synchrony

C. two-phase commit

This is not feature of cooperative algorithm A. complex B. larger overhead C. worst stability D. better stability

C. worst stability

To resolve the problem of data representation on different systems RPCs define _____________ A. machine dependent representation of data B. machine representation of data C. machine-independent representation of data D. none of the mentioned

C.machine-independent representation of dat

Which event is concurrent with the vectorclock (2, 8, 4)? A. (3,9,5) B. (3,8,4) C. (1,7,3) D. (4,8,2)

D. (4,8,2)

For each critical section (CS) execution, maekawa's algorithm requires messages per CS execution and the Synchronization delay in the algorithm is . A. √n , t B. 2√n , t C. 3√n , t D. 3√n , 2t

D. 3√n , 2t

What are characteristic of NFS protocol? A. search for file within directory B. read a set of directory entries C. manipulate links and directories D. all of the mentioned

D. all of the mentioned

What is stub? A. transmits the message to the server where the server side stub receives the message and invokes procedure on the server side B. packs the parameters into a form transmittable over the network C. locates the port on the server D. all of the mentioned

D. all of the mentioned

____________________ of the distributed file system are dispersed among various machines of distributed system. A. clients B. servers C. storage devices D. all of the mentioned

D. all of the mentioned

In context of HDFS file system, Point out the wrong statement. A. replication factor can be configured at a cluster level (default is set to 3) and also at a file level B. block report from each data node contains a list of all the blocks that are stored on that data node C. user data is stored on the local file system of data nodes D. data node is aware of the files to which the blocks stored on it belong to.

D. data node is aware of the files to which the blocks stored on it belong to.

In distributed file system, XDR stands for? A. external data request B. external device request C. external data recovery D. external data representation

D. external data representation

...................................consistency is that write operations by the same process are performed in the correct order everywhere. A. weak B. strict C. eventual D. fifo

D. fifo

Type of cluster computing is A. load sharing cluster B. load holding cluster C. load replication cluster D. load balancing cluster

D. load balancing cluster

What are the exceptions that have to be handled in a RMI client program? A. class not found exception B. not found exception C. arithmetic exception D. malformed URL exception

D. malformed URL exception

The hardware of DS has two types A. uniprocessor system, unicomputer system B. multiprocessor system, unicomputer system C. uniprocessor system, multicomputer system D. multiprocessor system, multicomputer system

D. multiprocessor system, multicomputer system

.................................is a process that prevents multiple threads or processes from accessing shared resources at the same time. A. critical section B. deadlock C. message passing D. mutual exclusion

D. mutual exclusion

OSI stands for ........................................... A. open service internet B. operating system interface C. optical service implementation D. open system interconnection

D. open system interconnection

What is the full form of RMI? A. remote memory installation B. remote memory invocation C. remote method installation D. remote method invocation

D. remote method invocation

.......................................provides programmers a familiar programming model by extending the local procedure call to a distributed environment A. distributed environment B. permanent procedure call C. process and file D. remote procedure call

D. remote procedure call

In all reliable multicast group communication A. n\ response expected from the receiver B. response from any of the receiver required C. response from \m\(1<m<n) of the \m\receiver required. D. response needed from all the receivers.

D. response needed from all the receivers.

What is not a major reason for building distributed systems? A. resource sharing B. computation speedup C. reliability D. simplicity

D. simplicity

...............changes the state of thread from suspended state. A. run() B. yield() C. destroy() D. start()

D. start()

What is the coherency of replicated data? A. all replicas are identical at all times B. replicas are perceived as identical only at some points in time C. users always read the most recent data in the replicas D. all of the mentioned

D.all of the mentioned

If file system is growing without affecting performance of the system then this feature is called as? A. union B. portable C. robust D. scalability

D.scalability


Related study sets

PA Property & Casualty Insurance Exam (C)

View Set

8 Antibacterial Drugs That Interfere With Protein Synthesis

View Set

Solutions Exam: Multiple Choice and Math

View Set

Genetica - Capitolo 1: struttura e funzione del DNA

View Set

Chapter 5: Consumer Credit: Advantages, Disadvantages, Sources, and Costs

View Set

CHAPTER 1: The Role of Marketing Research (MKT 455)

View Set