Purple Hat App: Distributed Computing System MCQ
Purple Hat App: Distributed Computing System MCQ
p
4. Which technique is based on compile-time program transformation for accessing remote
data in a distributed-memory parallel system?
a) cache coherence scheme
b) computation migration
Ap
c) remote procedure call
at
d) message passing
H
c) thread migration
d) data migration
rp
p
13. Which of the following two operations are provided by the IPC facility?
a) write & delete message
b) delete & receive message
c) send & delete message
d) receive & send message.
Ap
at
14. Messages sent by a process __________
H
__________
a) communication link
Pu
b) message-passing link
c) synchronization link
d) all of the mentioned.
16. Which of the following are TRUE for direct communication?
a) A communication link can be associated with N number of process(N = max. number of
processes supported by system)
b) A communication link can be associated with exactly two processes
c) Exactly N/2 links exist between each pair of processes(N = max. number of processes
supported by system)
d) Exactly two link exists between each pair of processes.
17. In indirect communication between processes P and Q __________
a) there is another process R to handle and pass on the messages between P and Q
b) there is another machine between the two processes to help communication
c) there is a mailbox to help communication between P and Q
d) none of the mentioned.
18. In the non blocking send __________
a) the sending process keeps sending until the message is received
b) the sending process sends the message and resumes operation
c) the sending process keeps sending until it receives a message
d) none of the mentioned
19. In the Zero capacity queue __________
a) the queue can store at least one message
b) the sender blocks until the receiver receives the message
c) the sender keeps sending and the messages don’t wait in the queue
d) none of the mentioned.
20. The Zero Capacity queue __________
a) is referred to as a message system with buffering
b) is referred to as a message system with no buffering
c) is referred to as a link
d) none of the mentioned
p
d) none of the mentioned
p
d) rpc
a) 10
b) 12
Pu
c) 14
d) 16
Q.33 What is the expanded key size of AES-192? [2m]
a) 44 words
b) 60 words
c) 52 words
d) 36 words
Q.34 The 4×4 byte matrices in the AES algorithm are called[2m]
a) States
b) Words
c) Transitions
d) Permutations
Q.35. In AES the 4×4 bytes matrix key is transformed into a keys of size
__________[1m]
a) 32 words
b) 64 words
Q.36In distributed systems, a logical clock is associated with ______________[2m]
a) each instruction
b) each process
c) each register
d) none of the mentioned
Q.37 If timestamps of two events are same, then the events are ____________[2m]
a) concurrent
b) non-concurrent
c) monotonic
d) non-monotonic
Q.38 If a process is executing in its critical section ____________[2m]
a) any other process can also execute in its critical section
b) no other process can execute in its critical section
c) one more process can execute in its critical section
d) none of the mentioned
p
Q.39 A process can enter into its critical section ____________[2m]
a) anytime
Ap
b) when it receives a reply message from its parent process
c) when it receives a reply message from all other processes in the system
d) none of the mentioned
at
Q.40 For proper synchronization in distributed systems ____________[1m]
H
b) clock
c) both local memory and clock
d) none of the mentione
Q.42 If one site fails in distributed system[1m]
a) the remaining sites can continue operating
b) all the sites will stop working
c) directly connected sites will stop working
d) none of the mentioned
Q. 43What are the characteristics of tightly coupled system? [1m]
i) Same clock, usually shared memory
ii) Communication is via this shared memory
iii) Multiprocessors
iv) Different clock
a) i
b) i, ii and ii
c) ii and iii
d) i, iii and iv
Q. 44What are the characteristics of tightly coupled system? [1m]
i) Different clock
ii) Use communication links
iii) Same clock
iv) Distributed systems
Q.45 What are the characteristics of mutual exclusion using centralized approach? [1m]
a) One processor as coordinator which handles all requests
b) It requires request, reply and release per critical section entry
c) The method is free from starvation
d) All of the mentioned
Q.46 What are the parts of a global unique identifier? [1m]
p
a) Local unique timestamp
b) Remote timestamp
c) Clock number
d) All of the mentioned
Ap
at
H
c) 54 words
d) 44 words
le
Q.47 There is an addition of round key before the start of the AES round algorithms.
[1m]
rp
a) True
b) False
Pu
Q.48How many modes of operation are there in in DES and AES? [1m]
a) 4
b) 3
c) 2
d) 5
Q.49 Which one of the following modes of operation in DES is used for operating short
data? [1m]
a) Cipher Feedback Mode (CFB)
b) Cipher Block chaining (CBC)
c) Electronic code book (ECB)
d) Output Feedback Modes (OFB)
Q.50Which of the following statements are true[1m]
i) In the CBC mode, the plaintext block is XORed with previous ciphertext block before
encryption
ii) The CTR mode does not require an Initialization Vector
iii) The last block in the CBC mode uses an Initialization Vector
iv) In CBC mode repetitions in plaintext do not show up in ciphertext
p
Ap
at
H
le
rp
Pu