Question 301 : The network Time protocol (NTP) which is widely used for clock synchronization on the Internet uses the ___________ method. The design of NTP invloves a ________ of time servers.
- Differential Delay, Binary tree
- Offset delay estimation, Hierarchical tree
- NTP time stamps, Quorum
- Physical clock delay, hierarchical tree
Question 302 : Identify the distributed file system among the options.
- Andrew file system
- EXT
- FAT32
- FAT
Question 303 : if ts OP1(x) < ts OP2(y), then operation OP1(x) should Precede OP(y) in this sequence belongs to -----
- Strict consistency
- Linearizability consistency
- Sequential consistency
- parallel consistency
Question 304 : In which the access takes place when different processes try to access the same data concurrently and the outcome of the execution depends on the specific order, is called
- dynamic condition
- race condition
- essential condition
- critical condition
Question 305 : Which of the below element is usually not there in the header?
- Sequence number
- Structural information
- Address
- File mode(Read/ Write)
Question 306 : A replica set can have only ________ primary.
- One
- two
- three
- zero
Question 307 : ____________ Files are the files which are read only.
- . Mutable
- Immutable
- Setup
- Recursive
Question 308 : Transient communication with synchronization after the request has been fully processed is also widely used in
- IPC
- RPC
- MPC
- Message Passing
Question 309 : In the distributed system, the goal of the task assignment approach is to assign the tasks of a process to the nodes. Consider there are two nodes n1 and n2 and four tasks {T1, T2, T3, T4,T5,T6}. Tasks T1, T2 are assigned to node n1 and tasks T3,T4, T5, T6 are assigned to node n2.Comunication cost is as given in table below. Considering serial task assignment, the communication incur will be T1, T2, T3, T4,T5,T6 T1-> 0, 6, 4, 0, 0, 12 T2-> 6, 0, 8, 12, 3, 0 T3-> 4, 8, 0, 0, 11, 0 T4=> 0, 12, 0, 0, 5, 0 T5-> 0, 3, 11, 5 , 0, 0 T6=> 12, 0, 0, 0, 0, 0
- 38
- 58
- 39
- 50
Question 310 : What are the characteristics of mutual exclusion using centralized approach ?
- One processor as coordinator which handles all requests
- It requires request,reply and release per critical section entry
- The method is free from starvation
- All of the mentioned
Question 311 : The ___________ can be deployed such that it services all or a portion of your Qnet nodes. And you can have redundant GNS servers.
- GNS server
- IS server
- DNS server
- system server
Question 312 : When a client has a cascading mount _______ server(s) is/are involved in a path name traversal.
- at least one
- more than one
- more than two
- more than three
Question 313 : Which one of the following is not shared by threads?
- program counter
- stack register
- program counter and stack
- register
Question 314 : Berkeley Algorithm is ________
- Passive Time Server Algorithm
- Active Time Server Algorithm
- both (a) and (b)
- None of the mentioned
Question 315 : _____________ manage the name spaces and binds an object to its location.
- Name Server
- Name agent
- Context
- Name resolution
Question 316 : A “glue” between client and server parts of application.
- Middleware
- Firmware
- Package
- System Software
Question 317 : The consistency model which do not handle simultaneous updates-
- data centric model
- Client centric model
- server centric model
- traffic centric model
Question 318 : In which of the following consistency model all writes become perceptible to all processes
- Strict
- Weak
- Casual
- Sequential
Question 319 : what is the task of RPCRuntime ?
- It is responsible for marshaling
- It is responsible for retransmission
- It is responsible for handling exception
- It is responsible for syntactic transparency
Question 320 : A DFS should provide following services____.
- Transparency, User mobility, Performance, Simplicity and ease of use.
- Opacity,User mobility, Performance, Simplicity and ease of use.
- Immobility ,Transparency,Performance,Simplicity and ease of use.
- Opacity,User mobility, Performance, difficult to use.
Question 321 : __________________ transparency makes sure that even if the servers are migrated from one location to to the other, they will not affect the performance of system.
- Location
- Migration
- Network
- Concurrent
Question 322 : Select the message which is not used in Centralized algorithm of Mutual Exclusion
- Release
- Request
- Hello
- Reply
Question 323 : Asymmetric multiprocessing systems of the computer system use
- master relationship
- slave relationship
- master slave relationship
- serial processing
Question 324 : Middleware called __________ for connecting independent systems together and makes them work together.
- Homogeneous
- Glue-code
- Heterogeneous
- Concurrent
Question 325 : What is the advantage of caching in remote file access?
- Reduced network traffic by retaining recently accessed disk blocks
- Faster network access
- Copies of data creates backup automatically
- Faster backup
Question 326 : A centralized mutual exclusion algorithm requires ___ messages per entry/exit
- 1
- 2
- 3
- 4
Question 327 : The ____________ is used to keep track of the oscillations of the quartz crystal.
- Counter register
- Quartz crystal
- Constant register
- None of the mentioned
Question 328 : In distributed file system, a file is uniquely identified by _________________
- host name
- local name
- the combination of host name and local name
- Priority number
Question 329 : Any electronic holding place where data can be stored and retrieved later whenever required is ____________
- memory
- drive
- disk
- circuit
Question 330 : In which approach of distributed computing, workload is divided from heavily loaded nodes to lightly loaded nodes in an attempt to ensure good overall performance ?
- Load Balancing approach
- Task assignment Approach
- Load Sharing Approach
- Process migration
Question 331 : ___________ is act between name servers and their clients.
- Name machine
- Context
- Name agents
- Main servers
Question 332 : Which technique is not used for scheduling processes of a distributed system?
- Task assignment approach
- Load balancing approach
- Load dividing approach
- Load sharing approach
Question 333 : An RPC (remote procedure call) is initiated by the _____.
- server
- client
- client after the sever
- a third party
Question 334 : which command is used to create a directory
- rmdir
- symlink
- mkdir
- open
Question 335 : Match the role of the three tier architecture in Server cluster : List – I 1. First Tier 2. Second Tier 3. Third tier List – II i. Data Processing ii. Client request Processing iii. Application Processing
- 1. (ii), 2. (iii), 3. (i)
- 1. (iii), 2. (i), 3. (ii)
- 1. (i), 2. (ii), 3. (iii)
- 1. (iii), 2. (ii), 3. (i)
Question 336 : Which ordering uses global timestamps as message id?
- Total ordering
- FIFO ordering
- Causal Ordering
- Absolute Ordering
Question 337 : In order to join or leave a group each process has to broadcast a message.
- flat group
- IETF group
- Collected process Group
- Hierarchical Group
Question 338 : A distributed database is which of the following?
- A single logical database that is spread to multiple locations and is interconnected by a network
- A loose collection of file that is spread to multiple locations and is interconnected by a network
- A single logical database that is limited to one location.
- A loose collection of file that is limited to one location.
Question 339 : Which of the following is disadvantage of active replication
- Consistent replicas
- Minimal bandwidth costs
- Size of the parameters is small
- Processing power
Question 340 : In Suzuki Kasami algorithm, the time required for a requesting site to enter the CS is _____
- Infinite
- finite
- zero
- unpredictable
Question 341 : AFS has two unusual design characteristics:
- Reliability, Scalability
- Whole-file serving, Whole-file caching
- file serving, file catching
- security, file catching
Question 342 : E-mail system is an example of
- Persistent asynchronous communication
- Persistent synchronous communication
- Transient asynchronous communication
- Transient synchronous communication
Question 343 : How can we avoid deadlock
- resource allocation must be done at once
- there must be a fixed number of resources to allocate
- all deadlock process must be aborted
- inversion technique can be used
Question 344 : A problem with the ________ protocol is that when the coordinator has crashed, participants may not be able to reach a final decision.
- One-phase commit
- Three-phase commit
- Two-phase commit
- Virtual synchrony
Question 345 : TCP is reliable _______ protocol which supports reliable point to point communication in distributed system.
- network
- transport
- communication
- system
Question 346 : Processes on the remote systems are identified by ___________
- host ID
- host name and identifier
- identifier
- process ID
Question 347 : What is DFS(Distributed File System)?
- is a file system that is distributed on multiple file servers or multiple locations
- is a file system that is distributed multiple times
- is a file system that is on centralized location
- is a file system that access any file
Question 348 : Which of the following is NOT type of transparency
- Access transparency
- Location transparency
- Replication transparency
- Clock Synchronization Transparency
Question 349 : Hiding the complicacy of the system from user in distributed environment is known as _____.
- Heterogeneity
- Security
- Flexibility
- Transparency
Question 350 : In which model, there is no distinction between the client & server process.
- clent-server model
- Master-slave model
- P2P Model
- fault model