Question 351 : In the tree structured directories _____________
- the tree has the stem directory
- the tree has the leaf directory
- the tree has the root directory
- the tree has no any directory
Question 352 : MPI and sockets are examples of
- Message oriented transient communication
- message oriented persistent communication
- Mobile Oriented Communication
- Object oriented permanent Communication
Question 353 : A type of the fault which occurs once and only the replacement/repair of a faulty component will allow the Distributed System to function normally
- Transient Fault
- Intermittent Fault
- Permanent Fault
- Temporary fault
Question 354 : Advantage of Data-caching model over the Remote service model
- Reduces network traffic
- Contention for the file servers
- Increased performance
- Contention for Network
Question 355 : The strongest form of memory coherence model, having the most stringent consistency requirement
- causal consistency
- strict consistency
- sequential consistency
- FIFO consistency
Question 356 : A shared-memory system is said to support the __________ model if the value returned by a read operation on a memory address is always the same as the value written by the most recent write operation to that address.
- causal consistency
- strict consistency
- sequential consistency
- FIFO consistency
Question 357 : The degree at which the conflicting read/write access is tolerated is defined as_________.
- Concurrency
- Consistency
- Availability
- Isolation
Question 358 : In X.500 Directory you can search for hundreds of thousands of people from a single place on the _______________.
- World Wide Web.
- at one place
- World directory
- Words largest file
Question 359 : The placement of replica servers is
- optimization problem
- more of management issue
- consistency
- performance
Question 360 : datanodes and namenode are two elements of which file system?
- AFS
- HDFS
- NFS
- None of the above
Question 361 : Computation of data is done in which component of SIMD
- Local Memory
- Front end Controllers
- Processing element
- Processor array
Question 362 : File Replication is done to _____
- increase complexity
- increase cost
- increase reliability
- increase data
Question 363 : The use of more information gives rise to_________.
- Information redundancy
- Time redundancy
- Physical redundancy
- Data Redundancy
Question 364 : In the following cases non – preemptive scheduling occurs?
- When a process switches from the running state to the ready sta
- When a process goes from the running state to the waiting state
- When a process switches from the waiting state to the ready sta
- shortest job scheduling
Question 365 : The following statement “Please give me load” is an example of which policy?
- Receiver initiated
- Sender Initiated
- Load estimation
- Load predication
Question 366 : A bully election algorithm:
- picks the first process to respond to an election request.
- relies on majority vote to pick the winning process.
- assigns the role of coordinator to the processs holding the token at the time of election.
- picks the process with the largest ID.
Question 367 : A file appears to the file server as an ordered sequence of records in
- Unstructured files
- Structured files
- Immutable files
- Mutable files
Question 368 : What are the problems of clock synchronization in distributed operating systems ? I. Processses make decision based only on local information II. The relevent information is scattered among multiple machines III. A single point of failure in the system should be avoided IV. No common clock or other precise global time source exists
- II, III and IV
- I, II and IV
- I, III and IV
- I, II, III, IV
Question 369 : What are the characteristics of data migration?
- transfer data by entire file or immediate portion required
- transfer the computation rather than the data
- execute an entire process or parts of it at different sites
- execute an entire process or parts of it at same site
Question 370 : The capabiliy of a system to detcet & recover from failure is known as _____________________.
- fault tolerant & portable
- scalable & robust
- fault tolerant & robust
- potable & scalable
Question 371 : If a ® b and b ® c then a ® c. This property is :
- Transitivity
- Reflexivity
- concurrency
- Irreflexivity
Question 372 : Inter Process Communication takes place via
- Shared memory and message passing
- Decentralized memory and message passing
- Shared memory and message replicating
- Decentralized memory and message replicating
Question 373 : ____________ is used to store the distributed objects permanently on to the data store
- Naming service
- Persistance service
- Messaging service
- Security service
Question 374 : What are the characteristics of data migration?
- transfer data by entire file or immediate portion required
- transfer the computation rather than the data
- execute an entire process or parts of it at different sites
- execute limited portion of data
Question 375 : Which of the following is not an example of stream data
- Video
- Audio
- large data files
- text
Question 376 : _________ is an object acting as a gateway for the client side.
- skeleton
- stub
- remote
- server
Question 377 : To organise file systems on disk _______________
- they are split into one or more partitions
- information about files is added to each partition
- they are made on different storage spaces
- they are made on same storage spaces
Question 378 : Which of the following technique is not used for scheduling processes in Distributed System?
- Load balancing approach
- Task assignment approach
- Load sharing approach
- FCFS approach
Question 379 : The local operating system on the server machine passes the incoming packets to the _________
- server stub
- client stub
- client operating system
- Binding agent
Question 380 : ___algorithm for coordinator election assumes that no process can fail during the election procedure until the new coordinator has been selected.
- bully algorithm
- Ring algorithm
- Lamport algorithm
- Suzuki Kasami algorithm
Question 381 : Machine that places the request to access the data is generally called as _________.
- Server Machine
- Client Machine
- Request Machine
- Response Machine
Question 382 : State which of the following holds true in Process Migration Statement 1: In non preemptive process migration,Process may be migrated during the course of its execution Statement 2: In preemptive process migration,Process may be migrated before it starts executing on its source node
- Statement 1 is correct but statement 2 is false
- Statement 1 is false but statement 2 is correct
- Both the statements are incorrect
- Both the statements are correct
Question 383 : X.500 Directory is also called
- global Yellow Pages directory
- global Blue Pages directory
- global White Pages directory
- global Black Pages directory
Question 384 : A ____________is a quartz crystal that oscillates at a well-defined frequency.
- Counter register
- Quartz crystal
- Constant register
- None of the mentioned
Question 385 : Which one of the following hides the location where in the network the file is stored?
- transparent distributed file system
- hidden distributed file system
- escaped distribution file system
- spy distributed file system
Question 386 : Which is not an examples of state information ?
- Mounting information
- Description of HDD space
- Session keys
- Lock status
Question 387 : If an old process wants a resource held by a young process, the old one will wait happens in _______
- Wait-die
- Wound-wait
- Both
- None of the mentioned
Question 388 : Which of the following is not a protocol defined by X.500?
- DAP (Directory Access Protocol)
- DSP (Directory System Protocol)
- DISP (Directory Information Shadowing Protocol)
- DGP (Directory Gateway Protocol)
Question 389 : Each process should get fair chance to execute the critical region, defines which property of mutual exclusion?
- Safety
- Liveness
- Fairness
- Scheduling
Question 390 : Remote service model for file accessing has
- Reduced contention for the network
- Reduced network traffic
- Client’s request is performed at the server’s node
- No contention for the file servers
Question 391 : The sever and client computer interact with each other using ________
- Specific Port Number and IP Address
- MAC Address
- MAC Address and Port Number
- MAC Address and IP Address
Question 392 : The Ricart & Agrawala distributed mutual exclusion algorithm is:
- Less efficient and less fault tolerant than a centralized algorithm.
- More efficient and more fault tolerant than a centralized algorithm.
- More efficient but less fault tolerant than a centralized algorithm.
- Less efficient but more fault tolerant than a centralized algorithm.
Question 393 : In Release consistency model: ____________ is used by a process to tell the system that it has just exited a critical section and ________ is used by a process to tell the system that it is about to enter a critical section
- acquire, release
- release, acquire
- entry, exit
- entry, out
Question 394 : What is full form of AFS?
- Andrew File System
- Analog File System
- Acess File System
- Acess Fast System
Question 395 : The __________consist of a network of personal computers, each with its own hard disk nad local files system and interconnected over the network termed as diskful workstations
- Workstation model
- Workstation -server model
- Processor-pool model
- Client-server model
Question 396 : In distributed systems, a logical clock is associated with
- each instruction
- each process
- each register
- none of the mentioned
Question 397 : The computer clock differs from the real time clock is known as ____
- Quartz crystal
- Clock drift
- Clock skew
- None of the mentioned
Question 398 : What of the following system is not multi-processor system?
- A system with multiple CPU, each CPU contains a single core.
- A system with a single CPU that has two core.
- A system with multiple CPU, each CPU contains two cores.
- A system with a single CPU that has a single core.
Question 399 : The _____ model is required in order to build systems with predictable behavior in case of fault
- Interaction model
- Fault model
- Architectural model
- Security model
Question 400 : Which layer is the layer closest to the transmission medium ?
- Physical
- Data link
- Network
- Transport