Distributed Computing MCQ



Question 301 : The network Time protocol (NTP) which is widely used for clock synchronization on the Internet uses the ___________ method. The design of NTP invloves a ________ of time servers.

  1. Differential Delay, Binary tree
  2. Offset delay estimation, Hierarchical tree
  3. NTP time stamps, Quorum
  4. Physical clock delay, hierarchical tree
  

Question 302 : Identify the distributed file system among the options.

  1. Andrew file system
  2. EXT
  3. FAT32
  4. FAT
  

Question 303 : if ts OP1(x) < ts OP2(y), then operation OP1(x) should Precede OP(y) in this sequence belongs to -----

  1. Strict consistency
  2. Linearizability consistency
  3. Sequential consistency
  4. parallel consistency
  

Question 304 : In which the access takes place when different processes try to access the same data concurrently and the outcome of the execution depends on the specific order, is called

  1. dynamic condition
  2. race condition
  3. essential condition
  4. critical condition
  

Question 305 : Which of the below element is usually not there in the header?

  1. Sequence number
  2. Structural information
  3. Address
  4. File mode(Read/ Write)
  

Question 306 : A replica set can have only ________ primary.

  1. One
  2. two
  3. three
  4. zero
  

Question 307 : ____________ Files are the files which are read only.

  1. . Mutable
  2. Immutable
  3. Setup
  4. Recursive
  

Question 308 : Transient communication with synchronization after the request has been fully processed is also widely used in

  1. IPC
  2. RPC
  3. MPC
  4. Message Passing
  

Question 309 : In the distributed system, the goal of the task assignment approach is to assign the tasks of a process to the nodes. Consider there are two nodes n1 and n2 and four tasks {T1, T2, T3, T4,T5,T6}. Tasks T1, T2 are assigned to node n1 and tasks T3,T4, T5, T6 are assigned to node n2.Comunication cost is as given in table below. Considering serial task assignment, the communication incur will be T1, T2, T3, T4,T5,T6 T1-> 0, 6, 4, 0, 0, 12 T2-> 6, 0, 8, 12, 3, 0 T3-> 4, 8, 0, 0, 11, 0 T4=> 0, 12, 0, 0, 5, 0 T5-> 0, 3, 11, 5 , 0, 0 T6=> 12, 0, 0, 0, 0, 0

  1. 38
  2. 58
  3. 39
  4. 50
  

Question 310 : What are the characteristics of mutual exclusion using centralized approach ?

  1. One processor as coordinator which handles all requests
  2. It requires request,reply and release per critical section entry
  3. The method is free from starvation
  4. All of the mentioned
  

Question 311 : The ___________ can be deployed such that it services all or a portion of your Qnet nodes. And you can have redundant GNS servers.

  1. GNS server
  2. IS server
  3. DNS server
  4. system server
  

Question 312 : When a client has a cascading mount _______ server(s) is/are involved in a path name traversal.

  1. at least one
  2. more than one
  3. more than two
  4. more than three
  

Question 313 : Which one of the following is not shared by threads?

  1. program counter
  2. stack register
  3. program counter and stack
  4. register
  

Question 314 : Berkeley Algorithm is ________

  1. Passive Time Server Algorithm
  2. Active Time Server Algorithm
  3. both (a) and (b)
  4. None of the mentioned
  

Question 315 : _____________ manage the name spaces and binds an object to its location.

  1. Name Server
  2. Name agent
  3. Context
  4. Name resolution
  

Question 316 : A “glue” between client and server parts of application.

  1. Middleware
  2. Firmware
  3. Package
  4. System Software
  

Question 317 : The consistency model which do not handle simultaneous updates-

  1. data centric model
  2. Client centric model
  3. server centric model
  4. traffic centric model
  

Question 318 : In which of the following consistency model all writes become perceptible to all processes

  1. Strict
  2. Weak
  3. Casual
  4. Sequential
  

Question 319 : what is the task of RPCRuntime ?

  1. It is responsible for marshaling
  2. It is responsible for retransmission
  3. It is responsible for handling exception
  4. It is responsible for syntactic transparency
  

Question 320 : A DFS should provide following services____.

  1. Transparency, User mobility, Performance, Simplicity and ease of use.
  2. Opacity,User mobility, Performance, Simplicity and ease of use.
  3. Immobility ,Transparency,Performance,Simplicity and ease of use.
  4. Opacity,User mobility, Performance, difficult to use.
  

Question 321 : __________________ transparency makes sure that even if the servers are migrated from one location to to the other, they will not affect the performance of system.

  1. Location
  2. Migration
  3. Network
  4. Concurrent
  

Question 322 : Select the message which is not used in Centralized algorithm of Mutual Exclusion

  1. Release
  2. Request
  3. Hello
  4. Reply
  

Question 323 : Asymmetric multiprocessing systems of the computer system use

  1. master relationship
  2. slave relationship
  3. master slave relationship
  4. serial processing
  

Question 324 : Middleware called __________ for connecting independent systems together and makes them work together.

  1. Homogeneous
  2. Glue-code
  3. Heterogeneous
  4. Concurrent
  

Question 325 : What is the advantage of caching in remote file access?

  1. Reduced network traffic by retaining recently accessed disk blocks
  2. Faster network access
  3. Copies of data creates backup automatically
  4. Faster backup
  

Question 326 : A centralized mutual exclusion algorithm requires ___ messages per entry/exit

  1. 1
  2. 2
  3. 3
  4. 4
  

Question 327 : The ____________ is used to keep track of the oscillations of the quartz crystal.

  1. Counter register
  2. Quartz crystal
  3. Constant register
  4. None of the mentioned
  

Question 328 : In distributed file system, a file is uniquely identified by _________________

  1. host name
  2. local name
  3. the combination of host name and local name
  4. Priority number
  

Question 329 : Any electronic holding place where data can be stored and retrieved later whenever required is ____________

  1. memory
  2. drive
  3. disk
  4. circuit
  

Question 330 : In which approach of distributed computing, workload is divided from heavily loaded nodes to lightly loaded nodes in an attempt to ensure good overall performance ?

  1. Load Balancing approach
  2. Task assignment Approach
  3. Load Sharing Approach
  4. Process migration
  

Question 331 : ___________ is act between name servers and their clients.

  1. Name machine
  2. Context
  3. Name agents
  4. Main servers
  

Question 332 : Which technique is not used for scheduling processes of a distributed system?

  1. Task assignment approach
  2. Load balancing approach
  3. Load dividing approach
  4. Load sharing approach
  

Question 333 : An RPC (remote procedure call) is initiated by the _____.

  1. server
  2. client
  3. client after the sever
  4. a third party
  

Question 334 : which command is used to create a directory

  1. rmdir
  2. symlink
  3. mkdir
  4. open
  

Question 335 : Match the role of the three tier architecture in Server cluster : List – I 1. First Tier 2. Second Tier 3. Third tier List – II i. Data Processing ii. Client request Processing iii. Application Processing

  1. 1. (ii), 2. (iii), 3. (i)
  2. 1. (iii), 2. (i), 3. (ii)
  3. 1. (i), 2. (ii), 3. (iii)
  4. 1. (iii), 2. (ii), 3. (i)
  

Question 336 : Which ordering uses global timestamps as message id?

  1. Total ordering
  2. FIFO ordering
  3. Causal Ordering
  4. Absolute Ordering
  

Question 337 : In order to join or leave a group each process has to broadcast a message.

  1. flat group
  2. IETF group
  3. Collected process Group
  4. Hierarchical Group
  

Question 338 : A distributed database is which of the following?

  1. A single logical database that is spread to multiple locations and is interconnected by a network
  2. A loose collection of file that is spread to multiple locations and is interconnected by a network
  3. A single logical database that is limited to one location.
  4. A loose collection of file that is limited to one location.
  

Question 339 : Which of the following is disadvantage of active replication

  1. Consistent replicas
  2. Minimal bandwidth costs
  3. Size of the parameters is small
  4. Processing power
  

Question 340 : In Suzuki Kasami algorithm, the time required for a requesting site to enter the CS is _____

  1. Infinite
  2. finite
  3. zero
  4. unpredictable
  

Question 341 : AFS has two unusual design characteristics:

  1. Reliability, Scalability
  2. Whole-file serving, Whole-file caching
  3. file serving, file catching
  4. security, file catching
  

Question 342 : E-mail system is an example of

  1. Persistent asynchronous communication
  2. Persistent synchronous communication
  3. Transient asynchronous communication
  4. Transient synchronous communication
  

Question 343 : How can we avoid deadlock

  1. resource allocation must be done at once
  2. there must be a fixed number of resources to allocate
  3. all deadlock process must be aborted
  4. inversion technique can be used
  

Question 344 : A problem with the ________ protocol is that when the coordinator has crashed, participants may not be able to reach a final decision.

  1. One-phase commit
  2. Three-phase commit
  3. Two-phase commit
  4. Virtual synchrony
  

Question 345 : TCP is reliable _______ protocol which supports reliable point to point communication in distributed system.

  1. network
  2. transport
  3. communication
  4. system
  

Question 346 : Processes on the remote systems are identified by ___________

  1. host ID
  2. host name and identifier
  3. identifier
  4. process ID
  

Question 347 : What is DFS(Distributed File System)?

  1. is a file system that is distributed on multiple file servers or multiple locations
  2. is a file system that is distributed multiple times
  3. is a file system that is on centralized location
  4. is a file system that access any file
  

Question 348 : Which of the following is NOT type of transparency

  1. Access transparency
  2. Location transparency
  3. Replication transparency
  4. Clock Synchronization Transparency
  

Question 349 : Hiding the complicacy of the system from user in distributed environment is known as _____.

  1. Heterogeneity
  2. Security
  3. Flexibility
  4. Transparency
  

Question 350 : In which model, there is no distinction between the client & server process.

  1. clent-server model
  2. Master-slave model
  3. P2P Model
  4. fault model