MCQ Merged
MCQ Merged
ANSWER: A
In __________________ system there is a single systemwide primary memory (address space) that is
shared by all the processors.
D) None of these.
ANSWER: A
User should not need or be able to recognize whether a resource is remote or local is called as_____
A) Access Transparancy
B) resource transparency
C) migration transparency
D) concurrency transparency
ANSWER: A
The most important features commonly used to differentiate between network operating systems
and distributed operating systems are______
ANSWER: B
A) k+1
B) k-1
C) k*2
D) k+2
ANSWER: A
What is the use of, the Cell Directory Service (CDS), the Global Directory Service (GDS), and the
Global Directory Agent (GDA).
A) To allow resources such as servers, files, devices, and so on, to be uniquelynamed and accessed in
a location-transparent manner.
B) To dis-allow resources such as servers, files, devices, and so on, to be uniquelynamed and
accessed in a location-transparent manner.
ANSWER: A
What is the long-form of NIST with respect to the Distributed computing environment?
ANSWER: A
ANSWER: A
Which Distributed Computing model is used if the user does not need any computing power but
once in a while he or she may need a very large amount of computing power for a short time.
A) Processor-Pool Model
B) Workstation-Server Model
C) Hybrid model
D) Workstation model.
ANSWER: A
What is the use of the Sequence number field in message structure with respect to Inter-Process
Communication?
ANSWER: C
ANSWER: D
With respect to nonblocking receive primitive, how the receiving process knows that the message
has arrived in the message buffer.
ANSWER: A
[Identify the communication mode in IPC .]Identify the Communication mode , in IPC
A) Synchronous mode of communication, with both send and receive primitives having blocking
mode
B) Asynchronous mode of communication, with both send and receive primitives having blocking
mode
C) Synchronous mode of communication, with both send and receive primitiveshaving Non-blocking
mode
D) Asynchronous mode of communication, with both send and receive primitives having Non
blocking mode.
ANSWER: A
C) Hybrid
D) None of them
ANSWER: A
In one-to-many communication, the degree of reliability is normally expressed in the form of
_______
A) The O-reliable
B) The l-reliable
C) The m-out-of-n-reliable
ANSWER: D
ANSWER: A
ANSWER: A
ANSWER: A
A) Register primitive.
B) deregister primitive
C) lookup primitive
ANSWER: D
What do you mean by Syntactic transparency with respect to RPC?
A) It means that a remote procedure call should have exactly the same syntax as a local procedure
call.
B) It means that a remote procedure call should not have exactly the same syntax as a local
procedure call.
ANSWER: A
ANSWER: A
A) transmission of messages across the network between client and server machines.
ANSWER: A
B) It is used to make the client and server transparent from each other.
D) Both " Its is used to generate the Client Stub and Server Stub." and "It is used to define the
interface between a client and server."
ANSWER: D
ANSWER: A
The process by which a client becomes associated with a server so that calls can take place is known
as ________________.
A) binding
B) server locating
C) server naming
D) None
ANSWER: A
A) a quartz crystal
B) a counter register
C) constant register.
ANSWER: D
In the Bully algorithm, when the process having the priority number just below the failed
coordinator detects that the coordinator has failed, it immediately elects itself as the coordinator
and sending _______coordinator messages.
A) n-2
B) n/2
C) n-1
D) None.
ANSWER: A
For clocks based on a quartz crystal, the drift rate is approximately 10-6 (10 raised to 6) , giving a
difference of 1 second every _________________seconds, or ______________ days.
D) None.
ANSWER: A
Passive Time Server Centralized Algorithm. when the reply is received at the client's node, its clock is
readjusted to___________________.
A) T+(T1 - To)/2.
B) T+(T0 - T1)/2.
C) T+(T1 - To)/2+1.
D) T1+(T - To)/2.
ANSWER: A
A) If A and B are events in the same process and A occurs before B, then A -->B.
B) If A is the event of sending a message by one process and B is the event of thereceipt of the same
message by another process, then A -->B..
C) If A -->B and B-->C, then A-->C. That is, happened-before is a transitive relation.
ANSWER: D
D) None.
ANSWER: B
C) Time must never run backward, because it causes repetition of certain operations, when fast clock
is set to slow down.
ANSWER: D
In the worst case bully algorithm requires ________________ and in the best case it requires
________________.
A) O (n2) messages and n-2 messages
ANSWER: A
in the ring algorithm, irrespective of which process detects the failure of the coordinator and
initiates an election, an election always requires ________________ messages
A) 2(n-1) messages.
B) 2n messages.
C) 2(n-2) messages.
D) only n messages.
ANSWER: A
In the mutual exclusion algorithm, _____ dictates that requests must be executed in the order they
are made.
A) Starvation
B) Tolerance
C) Fairness
D) Deadlock
ANSWER: C
What is the drawback of the distributed approach for implementing mutual exclusion?
D) Both "It liable of n point of failure" and "Waiting time may large if too many processes in the
system"
ANSWER: B
Lamport algorithm executes critical section requests in the _____ order of timestamps.
A) Increasing
B) Decreasing
C) random
D) none of these
ANSWER: A
Non-token based mutual exclusion algorithm logical clock are maintained and updated according to
______.
A) Maekawa’s algorithm
B) Ricart-agrawala
C) Lamport’s scheme
D) Generalized algorithm
ANSWER: C
Lamport’s algorithm requires messages to be delivered in the _____ order between every pair of
sites.
A) FIFO
B) critical section
C) LIFO
ANSWER: A
The performance of the mutual exclusion algorithm is measured using _______ metrics
B) Synchronization delay
C) Response time
D) All
ANSWER: D
The Richart agarwal algorithm requires _____________ message per critical section execution for n
number of sites.
A) 2n
B) 2(n – 1)
C) 2n + 1
D) n – 1
ANSWER: B
The Lamport’s algorithm requires _____________ message per critical section execution for N
number of sites.
A) 3(N-1)
B) 2(N-1)
C) (N-1)
D) 3N
ANSWER: A
A) Many site
B) Requesting site
C) Current site
D) Only one
ANSWER: D
ANSWER: A
The space complexity is the ____________registers and time complexity is ________time for n-
process bakery algorithm of shared memory mutual exclusion.
ANSWER: C
In wait for the graph (WFG), a directed edge from node P1 to node P2 indicates that:
ANSWER: A
A) Transmit State
B) Block state
C) Activate State
D) Detect State
ANSWER: A
A) Deadlock Prevention
B) Deadlock Avoidance
C) Deadlock Detection
D) None.
ANSWER: A
ANSWER: A
In the _____________, a process can make a request for numerous resources simultaneously and
the request is satisfied if any one of the requested resource is granted.
A) OR model
B) AND model
C) AND-OR model
ANSWER: A
C) the OR model
D) none.
ANSWER: A
ANSWER: B
A deadlock detection algorithm must satisfy the following two conditions:Condition 1: Progress (No
false deadlocks): The algorithm should not report deadlockswhich do not exist.Condition 2: Safety
(No undetected deadlocks): The algorithm must detect all existingdeadlocks infinite both conditions
are true time.
ANSWER: B
ANSWER: B
ANSWER: D
Consider the following statements related to consistency models:(i) Strict consistency (SC): Only
Write operations issued by the same processor and to thesame memory location must be seen by
others in that order.(ii) PRAM memory: Only Write operations issued by the same processor are
seen by othersin the order they were issued, but Writes from different processors may be seen by
otherprocessors in different orders.(iii) Slow Memory: Any Read to a location (variable) is required to
return the value writtenby the most recent Write to that location (variable) as per a global time
reference.
ANSWER: D
Choose the correct consistency model that defines the following conditions:I. All Writes are
propagated to other processes, and all Writes done elsewhere are brought locally, at a sync
instruction.II. Accesses to sync variables are sequentially consistentIII. Access to sync variable is not
permitted unless all Writes elsewhere have completedIV. No data access is allowed until all previous
synchronization variable accesses have been performed
A) Weak consistency
B) Causal consistency
C) Processor consistency
D) Program consistency
ANSWER: A
A) Path Pushing
B) Edge-Chasing
C) Diffusion Computation
ANSWER: A
ANSWER: A
IN THE CASE OF____________ , CHANGES TO AN OPEN FILE ARE ONLY LOCALLY VISIBLE.
A) session semantics
B) immutable files
C) atomic transactions
ANSWER: A
What is an advantage with respect to the Bulk data transfer in the Distributed File System?
A) To obtain multiple number of blocks with a single seek.nObtain multiple number of blocks with a
single seeknObtain multiple number of blocks with a single seeknObtain multiple number of blocks
with a single seeknObtain multiple number of blocks with a single seeknObtain multiple number of
blocks with a single seek
ANSWER: D
D) None.
ANSWER: A
Templates are _____________ used for ___________ of tuples from the tuple space.
A) tuples, retrieval
B) tuples, store
C) structures, store
D) tuples, create
ANSWER: A
__________________ primitive is used by any process who wants to store a tuple in the tuple space.
A) OUT
B) IN
C) RD
D) EVAL
ANSWER: A
_______________primitive is used by a process that wants to retrieve a tuple from tuple space.
A) IN
B) OUT
C) RD
D) EVAL
ANSWER: A
D) None
ANSWER: A
B) Decreases performance
D) Improves speed
ANSWER: A
A) True
B) False
C) May be
D) Cant say
ANSWER: B
D) All
ANSWER: D
WHICH ONE OF THE FOLLOWING HIDES THE LOCATION WHERE IN THE NETWORK THE FILE IS
STORED?
ANSWER: A
B) host name
C) local name
D) None
ANSWER: A
IN DISTRIBUTED FILE SYSTEM, FILE NAME DOES NOT REVEAL THE FILE’S ____________
A) local name
D) none
ANSWER: B
C) novel network
ANSWER: D
D) All
ANSWER: B
"CORRECT ORDER" MEANS THAT IF A WRITE OPERATION (W3) IS CAUSALLY RELATED TO ANOTHER
WRITE OPERATION (W2) AND A WRITE OPERATION (W2) IS CAUSALLY RELATED TO ANOTHER WRITE
OPERATION (W1), THEN THE ACCEPTABLE ORDER IS ________________.
A) w1, w2, w3
B) w3, w2, w1
C) w1, w3, w2
D) w3, w1, w2
ANSWER: A
A) Buffering
B) Blocking
C) Message-passing
D) False sharing
ANSWER: D
_______REFERS TO THE BLOCK SIZE OF THE DSM SYSTEM, I.E. TO THE UNITS OF SHARING AND THE
UNIT OF DATA TRANSFER ACROSS THE NETWORK WHEN A NETWORK BLOCK FAULT OCCURS.
A) Granularity
B) Coherence
C) Abstraction
D) Synchronization
ANSWER: A
A) security
C) consistency
ANSWER: B
THE PROBLEM OF ___________ MAY OCCUR WHEN DATA ITEMS IN THE SAME DATA BLOCK ARE
BEING UPDATED BY MULTIPLE NODES AT THE SAME TIME.
A) thrashing
B) granularity
C) consistency
D) None
ANSWER: A
B) structuring as a database
D) None
ANSWER: C
A) no structuring
B) structuring as a database
D) None
ANSWER: B
THE ____________ MODEL IS THE STRONGEST FORM OF MEMORY COHERENCE, HAVING THE MOST
STRINGENT CONSISTENCY REQUIREMENT.
A) sequential consistency
B) causal consistency
C) strict consistency
D) None
ANSWER: C
A SHARED-MEMORY SYSTEM IS SAID TO SUPPORT THE __________ MODEL IF THE VALUE RETURNED
BY A READ OPERATION ON A MEMORY ADDRESS IS ALWAYS THE SAME AS THE VALUE WRITTEN BY
THE MOST RECENT WRITE OPERATION TO THAT ADDRESS.
A) causal consistency
B) strict consistency
C) sequential consistency
D) None
ANSWER: B
RPC is used for ________________.
ANSWER: A
A) Register primitive.
B) deregister primitive
C) lookup primitive
ANSWER: D
A) It means that a remote procedure call should have exactly the same syntax as a local procedure
call.
B) It means that a remote procedure call should not have exactly the same syntax as a local
procedure call.
ANSWER: A
ANSWER: A
A) transmission of messages across the network between client and server machines.
B) It is used to make the client and server transparent from each other.
D) Both " Its is used to generate the Client Stub and Server Stub." and "It is used to define the
interface between a client and server."
ANSWER: D
ANSWER: D
ANSWER: A
The process by which a client becomes associated with a server so that calls can take place is known
as ________________.
A) binding
B) server locating
C) server naming
D) None
ANSWER: A
A computer clock usually consists of _________________
A) a quartz crystal
B) a counter register
C) constant register.
ANSWER: D
In the Bully algorithm, when the process having the priority number just below the failed
coordinator detects that the coordinator has failed, it immediately elects itself as the coordinator
and sending _______coordinator messages.
A) n-2
B) n/2
C) n-1
D) None.
ANSWER: A
For clocks based on a quartz crystal, the drift rate is approximately 10-6 (10 raised to 6) , giving a
difference of 1 second every _________________seconds, or ______________ days.
D) None.
ANSWER: A
Passive Time Server Centralized Algorithm. when the reply is received at the client's node, its clock is
readjusted to___________________.
A) T+(T1 - To)/2.
B) T+(T0 - T1)/2.
C) T+(T1 - To)/2+1.
D) T1+(T - To)/2.
ANSWER: A
A) If A and B are events in the same process and A occurs before B, then A -->B.
B) If A is the event of sending a message by one process and B is the event of thereceipt of the same
message by another process, then A -->B..
C) If A -->B and B-->C, then A-->C. That is, happened-before is a transitive relation.
D) All are correct
ANSWER: D
D) None.
ANSWER: B
C) Time must never run backward, because it causes repetition of certain operations, when fast clock
is set to slow down.
ANSWER: D
In the worst case bully algorithm requires ________________ and in the best case it requires
________________.
ANSWER: A
in the ring algorithm, irrespective of which process detects the failure of the coordinator and
initiates an election, an election always requires ________________ messages
A) 2(n-1) messages.
B) 2n messages.
C) 2(n-2) messages.
D) only n messages.
ANSWER: A
In the mutual exclusion algorithm, _____ dictates that requests must be executed in the order they
are made.
A) Starvation
B) Tolerance
C) Fairness
D) Deadlock
ANSWER: C
What is the drawback of the distributed approach for implementing mutual exclusion?
D) Both "It liable of n point of failure" and "Waiting time may large if too many processes in the
system"
ANSWER: B
Lamport algorithm executes critical section requests in the _____ order of timestamps.
A) Increasing
B) Decreasing
C) random
D) none of these
ANSWER: A
Non-token based mutual exclusion algorithm logical clock are maintained and updated according to
______.
A) Maekawa’s algorithm
B) Ricart-agrawala
C) Lamport’s scheme
D) Generalized algorithm
ANSWER: C
Lamport’s algorithm requires messages to be delivered in the _____ order between every pair of
sites.
A) FIFO
B) critical section
C) LIFO
D) none of the above
ANSWER: A
The performance of the mutual exclusion algorithm is measured using _______ metrics
B) Synchronization delay
C) Response time
D) All
ANSWER: D
The Richart agarwal algorithm requires _____________ message per critical section execution for n
number of sites.
A) 2n
B) 2(n – 1)
C) 2n + 1
D) n – 1
ANSWER: B
The Lamport’s algorithm requires _____________ message per critical section execution for N
number of sites.
A) 3(N-1)
B) 2(N-1)
C) (N-1)
D) 3N
ANSWER: A
A) Many site
B) Requesting site
C) Current site
D) Only one
ANSWER: D
Mitchell and Merritt's algorithm is a ____________ algorithm.
ANSWER: A
The space complexity is the ____________registers and time complexity is ________time for n-
process bakery algorithm of shared memory mutual exclusion.
ANSWER: C
In wait for the graph (WFG), a directed edge from node P1 to node P2 indicates that:
ANSWER: A
A) Transmit State
B) Block state
C) Activate State
D) Detect State
ANSWER: A
A) Deadlock Prevention
B) Deadlock Avoidance
C) Deadlock Detection
D) None.
ANSWER: A
_________________ distributed deadlock detection algorithms uses _______________ to detect
deadlocks.
ANSWER: A
In the _____________, a process can make a request for numerous resources simultaneously and
the request is satisfied if any one of the requested resource is granted.
A) OR model
B) AND model
C) AND-OR model
ANSWER: A
C) the OR model
D) none.
ANSWER: A
D) either b or c
ANSWER: B
A deadlock detection algorithm must satisfy the following two conditions:Condition 1: Progress (No
false deadlocks): The algorithm should not report deadlockswhich do not exist.Condition 2: Safety
(No undetected deadlocks): The algorithm must detect all existingdeadlocks infinite both conditions
are true time.
ANSWER: B
ANSWER: B
ANSWER: D
Consider the following statements related to consistency models:(i) Strict consistency (SC): Only
Write operations issued by the same processor and to thesame memory location must be seen by
others in that order.(ii) PRAM memory: Only Write operations issued by the same processor are
seen by othersin the order they were issued, but Writes from different processors may be seen by
otherprocessors in different orders.(iii) Slow Memory: Any Read to a location (variable) is required to
return the value writtenby the most recent Write to that location (variable) as per a global time
reference.
ANSWER: D
Choose the correct consistency model that defines the following conditions:I. All Writes are
propagated to other processes, and all Writes done elsewhere are brought locally, at a sync
instruction.II. Accesses to sync variables are sequentially consistentIII. Access to sync variable is not
permitted unless all Writes elsewhere have completedIV. No data access is allowed until all previous
synchronization variable accesses have been performed
A) Weak consistency
B) Causal consistency
C) Processor consistency
D) Program consistency
ANSWER: A
A) Path Pushing
B) Edge-Chasing
C) Diffusion Computation
ANSWER: A
WHAT ARE THE CHARACTERISTICS OF THE DISTRIBUTED FILE SYSTEM?
ANSWER: A
IN THE CASE OF____________ , CHANGES TO AN OPEN FILE ARE ONLY LOCALLY VISIBLE.
A) session semantics
B) immutable files
C) atomic transactions
ANSWER: A
What is an advantage with respect to the Bulk data transfer in the Distributed File System?
A) To obtain multiple number of blocks with a single seek.nObtain multiple number of blocks with a
single seeknObtain multiple number of blocks with a single seeknObtain multiple number of blocks
with a single seeknObtain multiple number of blocks with a single seeknObtain multiple number of
blocks with a single seek
ANSWER: D
D) None.
ANSWER: A
Templates are _____________ used for ___________ of tuples from the tuple space.
A) tuples, retrieval
B) tuples, store
C) structures, store
D) tuples, create
ANSWER: A
__________________ primitive is used by any process who wants to store a tuple in the tuple space.
A) OUT
B) IN
C) RD
D) EVAL
ANSWER: A
_______________primitive is used by a process that wants to retrieve a tuple from tuple space.
A) IN
B) OUT
C) RD
D) EVAL
ANSWER: A
D) None
ANSWER: A
B) Decreases performance
D) Improves speed
ANSWER: A
A) True
B) False
C) May be
D) Cant say
ANSWER: B
D) All
ANSWER: D
WHICH ONE OF THE FOLLOWING HIDES THE LOCATION WHERE IN THE NETWORK THE FILE IS
STORED?
ANSWER: A
B) host name
C) local name
D) None
ANSWER: A
IN DISTRIBUTED FILE SYSTEM, FILE NAME DOES NOT REVEAL THE FILE’S ____________
A) local name
D) none
ANSWER: B
C) novel network
D) all of the mentioned
ANSWER: D
IN A DISTRIBUTED COMPUTING ENVIRONMENT, DISTRIBUTED SHARED MEMORY IS USED WHICH
IS_____________.
D) All
ANSWER: B
"CORRECT ORDER" MEANS THAT IF A WRITE OPERATION (W3) IS CAUSALLY RELATED TO ANOTHER
WRITE OPERATION (W2) AND A WRITE OPERATION (W2) IS CAUSALLY RELATED TO ANOTHER WRITE
OPERATION (W1), THEN THE ACCEPTABLE ORDER IS ________________.
A) w1, w2, w3
B) w3, w2, w1
C) w1, w3, w2
D) w3, w1, w2
ANSWER: A
A) Buffering
B) Blocking
C) Message-passing
D) False sharing
ANSWER: D
_______REFERS TO THE BLOCK SIZE OF THE DSM SYSTEM, I.E. TO THE UNITS OF SHARING AND THE
UNIT OF DATA TRANSFER ACROSS THE NETWORK WHEN A NETWORK BLOCK FAULT OCCURS.
A) Granularity
B) Coherence
C) Abstraction
D) Synchronization
ANSWER: A
A) security
C) consistency
D) None of the mentioned
ANSWER: B
THE PROBLEM OF ___________ MAY OCCUR WHEN DATA ITEMS IN THE SAME DATA BLOCK ARE
BEING UPDATED BY MULTIPLE NODES AT THE SAME TIME.
A) thrashing
B) granularity
C) consistency
D) None
ANSWER: A
A) no structuring
B) structuring as a database
D) None
ANSWER: C
A) no structuring
B) structuring as a database
D) None
ANSWER: B
THE ____________ MODEL IS THE STRONGEST FORM OF MEMORY COHERENCE, HAVING THE MOST
STRINGENT CONSISTENCY REQUIREMENT.
A) sequential consistency
B) causal consistency
C) strict consistency
D) None
ANSWER: C
A SHARED-MEMORY SYSTEM IS SAID TO SUPPORT THE __________ MODEL IF THE VALUE RETURNED
BY A READ OPERATION ON A MEMORY ADDRESS IS ALWAYS THE SAME AS THE VALUE WRITTEN BY
THE MOST RECENT WRITE OPERATION TO THAT ADDRESS.
A) causal consistency
B) strict consistency
C) sequential consistency
D) None
ANSWER: B
Distributed System – MCQs
1. Winnt.exe shall be used for
a. 16-bit
b. 32-bit
c. 8-bit
d. None
8. IP sell is a set of
a. Internet standards
b. Internet protocols
c. Collection of Internet protocols
d. None
9. RADIUS means
a. Remote authentication dial-in user service. b. Radius distribution services
c. Both d. None
1
10. RADIUS used for
a. Centralized management of user authentication
b. Authorized for remote access servers
c. Both
d. None
24. Within the network we can have a number of computers sharing resources maintained by independent
administrators, called as
a. User
b. Workgroup
c. Both
d. None
25. _____ is a record that consists of all the information that defines a user in windows 2000.
a. User account
b. Group account
c. Both
d. None
26. People who don’t have an actual on the computer. They can use
a. Any account which is present in computer
b. Guest account
c. Both
d. None
3
28. Which member of the group has the backup right.
a. Administrator
b. Back up user
c. Both
d. None
5
46. Windows 2000 provides how many types and disk storage.
a. 12 types
b. 2 type
c. 4 type
d. None
57. ________ can be used to save the hard disk partition table to a floppy disk.
a. Window.exe
b. Windisk.exe
c. Both
d. None
7
63. Ram stands for
a. Read-only memory
b. Readable optional memory
c. Both
d. None