0% found this document useful (0 votes)
60 views21 pages

M 1 0 0 0 M 0 0 0 1 M 1 0 0 0 M 0 0 1 0 M 1 0 0 0 M 1 0 0 0 M 1 0 0 0 M 1 0

A distributed computer running a distributed program is known as a distributed process. Uni processor computing is known as centralized computing. Heterogeneous architecture implies that if the general structure of a system is connected using one architecture style, and each component can use a different one, this is an example of heterogeneous architecture. Distributed computing is a paradigm of multiple autonomous computers, having a private memory, communicating through a computer network. Multithreading is also called concurrency. Multiprogramming provides the ability to switch from one process to another and increases system productivity. A multiprocessor operating system must take care of unauthorized data access and data protection. With multiprocessing, more than one process can be running simultaneously each on a different processor. Asymmetric multiprocessing

Uploaded by

Shawol x 1kyne
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views21 pages

M 1 0 0 0 M 0 0 0 1 M 1 0 0 0 M 0 0 1 0 M 1 0 0 0 M 1 0 0 0 M 1 0 0 0 M 1 0

A distributed computer running a distributed program is known as a distributed process. Uni processor computing is known as centralized computing. Heterogeneous architecture implies that if the general structure of a system is connected using one architecture style, and each component can use a different one, this is an example of heterogeneous architecture. Distributed computing is a paradigm of multiple autonomous computers, having a private memory, communicating through a computer network. Multithreading is also called concurrency. Multiprogramming provides the ability to switch from one process to another and increases system productivity. A multiprocessor operating system must take care of unauthorized data access and data protection. With multiprocessing, more than one process can be running simultaneously each on a different processor. Asymmetric multiprocessing

Uploaded by

Shawol x 1kyne
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

DC SAMPLE QB A.

P SHAH CLUSTER

MODULE 1
Q A Parallel computer is the computer system capable of M 1
A Parallel Computing 1 1
A Centralized Computing 0 2
A Decentralized Computing 0 3
A Distributed Computing 0 4
Q A distributed computer running a distributed program is known as M 1
A Distributed Process 0 1
A Distributed Application 0 2
A Distributed Computing 0 3
A Distributed Program 1 4
Q Uni processor computing is known as M 1
A Centralized Computing 1 1
A Parallel Computing 0 2
A Distributed Computing 0 3
A Grid Computing 0 4
Q Which of the following is true about heterogeneous architecture? M 1
A There is no mixed architecture style at one abstraction level 0 1
A Heterogeneous architecture implies increased time efficiency 0 2

If the general structure of a system is connected using one architecture style, and each component 1
A can use a different one, this is one example of heterogeneous architecture 3
A Heterogeneous architecture implies decreased time efficiency 0 4
Q The transparency that enables multiple instances of resources to be used, is called M 1
A Replication transparency 1 1
A Scaling transparency 0 2
A Concurrency transparency 0 3
A Performance transparency 0 4
A paradigm of multiple autonomous computers, having a private memory, communicating through M
Q a computer network, is known as 1
A Distributed computing 1 1
A Cloud computing 0 2
A Centralized computing 0 3
A Parallel computing 0 4
Q Multithreading is also called as ____________ M 1
A Concurrency 1 1
A Simultaneity 0 2
A Crosscurrent 0 3
A Recurrent 0 4
Q The technique that increases the system’s productivity. M 1
A multiprogramming 1 1
A multitasking 0 2
A multiprocessing 0 3
A single-programming 0 4
Q Multithreading is also called as ____________ M 1
A Concurrency 1 1
A Simultaneity 0 2
A Crosscurrent 0 3
A Recurrent 0 4
A technique that allows more than one program to be ready for execution and provides the ability M
Q to switch from one process to another. 1
A multitasking 0 1
A multiprocessing 0 2
A multitasking 0 3
A multiprogramming 1 4
Q Multiprogramming is mainly accomplished by: M 1
A os 1 1
A software 0 2
A hardware 0 3
A program 0 4
In a multi-processor configuration two coprocessors are connected to host 8086 processor. The M
Q instruction sets of the two coprocessors 1
A must be same 0 1
A may overlap 0 2
A must be disjoint 0 3
A must be the same as that of host 1 4
Q Multiprogramming systems: M 1
A Are easier to develop than single programming systems 0 1
A Execute each job faster 0 2
A Execute more jobs in the same time period 1 3
A Are used only one large mainframe computers 0 4
Q A multiprocessor operating system must take care of M 1
A authorized data access and data protection 0 1
A unauthorized data access and data protection 1 2
A authorized data access 0 3
A data protection 0 4
With ................ only one process can execute at a time; meanwhile all other process are waiting
for the processer. With .............. more than one process can be running simultaneously each on a M
Q different processer. 1
A Multiprocessing, Multiprogramming 0 1
A Multiprogramming, Uniprocessing 0 2
A CMultiprogramming, Multiprocessing 0 3
A Uniprogramming, Multiprocessing 1 4
Q Asymmetric multiprocessing systems of the computer system use M 1
A master relationship 0 1
A slave relationship 0 2
A master slave relationship 1 3
A serial processing 0 4
Q What of the following system is not multi-processor system? M 1
A A system with multiple CPU, each CPU contains a single core. 0 1
A A system with a single CPU that has two core. 0 2
A A system with multiple CPU, each CPU contains two cores. 0 3
A A system with a single CPU that has a single core. 1 4
Q Which of the following is not an advantage of multiprocessor systems M 1
A Increased throughput 0 1
A Economy of scale 0 2
A Increased reliability 0 3
A Optimise the program size 1 4

MODULE 2
Q What is the other name for object middleware? M 1
A Object request interface 0 1
A Object Request broker 1 2
A Object enabled broker 0 3
A Object enabled interface 0 4
Q A “glue” between client and server parts of application. M 1
A Middleware 1 1
A Firmware 0 2
A Package 0 3
A System Software 0 4
A type of middleware that allows for between the built-in applications and the real-time OS? M
Q 1
A Firmware 0 1
A Embedded Middleware 1 2
A Database middleware 0 3
A Portals 0 4
Q Middleware forms a layer between M 1
A application and distributed platforms 1 1
A several individual computers 0 2
A application and client 0 3
A server and client 0 4
Q Middleware systems follow M 1
A middleware solution 0 1
A specific model 0 2
A specific architecture style 1 3
A specific protocol 0 4
A typical _________ program creates some remote objects, makes references to these objects
M
Q accessible, and waits for clients to invoke methods on these objects. 1
A Server 1 1
A Client 0 2
A Thread 0 3
A Concurrent 0 4
Q From the following which is not a type of Communication M 1
A Persistent and transient communication 0 1
A Synchronous and asynchronous communication 0 2
A Persistent synchronous and persistent asynchronous communication 0 3
A Non persistent communication 1 4
Q What is true about asynchronous communication M 1
1
A in asynchronous communication most of the time there is no reply from the reciever end 1
A Sender and reciver process need to be active at the time of communication 0 2
A it uses procedure calling at the server's side 0 3
A in asynchronous communication there is always a reply from the reciever end 0 4
An email service is a typical example of messaging service, where a sender sends an email
message to recipient.
M
Q 1
A It never waits for a reply from the recipient 1 1
A it always waits for a reply from the reciepient before sending next 0 2
A it will always send the reply email message to the sender. 0 3
A it is a type of synchronous communication 0 4
Q Which of the following is not a classification of group communication? M 1
A One to Many 0 1
A Many to one 0 2
A Many to Many 0 3
A Many to All 1 4
Which of the following is not commonly used semantics for ordered delivery of multicast
messages are:
M
Q 1
A Absolute Ordering 0 1
A Consistent Ordering 0 2
A Casual 0 3
A Non- Casual 1 4
Q The data sequence of information that is time-dependent is called ___________ M 1
A Stream of data 1 1
A traditional data 0 2
A transactional data 0 3
A spatial data 0 4
Q Which of the following is not an example of stream data M 1
A Video 0 1
A Audio 0 2
A large data files 0 3
A text 1 4
Q MPI and sockets are examples of M 1
A Message oriented transient communication 1 1
A message oriented persistent communication 0 2
A Mobile Oriented Communication 0 3
A Object oriented permanent Communication 0 4
Q The sever and client computer interact with each other using ________ M 1
A Specific Port Number and IP Address 1 1
A MAC Address 0 2
A MAC Address and Port Number 0 3
A MAC Address and IP Address 0 4
In consistent ordering when recieving the message each member calculate its proposed sequence
number by using the function____________
M
Q 1
A max(Fmax, Pmax) + I + i/N 1 1
A min(Fmax, Pmax) + I + i/N 0 2
A min(Fmin, Pmax) + I + i/N 0 3
A max(Fmin, Pmin) + I + i/N 0 4
A socket uses ____________ to transmit data between the sender and the reciever. M
Q 1
A IPC 1 1
A IMC 0 2
A IBC 0 3
A API 0 4
The Resource Reservation Protocol is __________________ layer protocol designed to reserver
Q resources in Distributed Computing. 1
A Transport Layer 1 1
A Network Layer 0 2
A Interface Layer 0 3
A Internet Layer 0 4

MODULE 3

Q Which of the following disadvantages follows the single coordinator approach? M 1


A Bottleneck 1 1
A Slow response 0 2
A Deadlock 0 3
A One request per second 0 4

M 1
Q Which are the two complementary deadlock-prevention schemes using timestamps?
A The wait-die & wound-wait scheme 1 1
A The wait-n-watch scheme 0 2
A The wound-wait scheme 0 3
A The wait-wound & wound-wait scheme 0 4
Q A process can enter into its critical section ____________ M 1
A anytime 0 1
A when it receives a reply message from its parent process 0 2
A when it receives a reply message from all other processes in the system 1 3
A when it receives a reply message from its child process 0 4
Q If a process is executing in its critical section ____________ M 1
A any other process can also execute in its critical section 0 1
A no other process can execute in its critical section 1 2
A one more process can execute in its critical section 0 3
A every process can execute in its critical section 0 4
Q In distributed systems, a logical clock is associated with ______________ M 1
A each instruction 0 1
A each process 1 2
A each register 0 3
A Many registers 0 4

M 1
Q When resources have multiple instances ________ is used for deadlock Avoidance.
A Bankers algorithm 1 1
A Resource Allocation Graph 0 2
A Semaphores 0 3
A Phishing 0 4
Q Synchronization tool is? M 1
A thread 0 1
A pipe 0 2
A semaphore 1 3
A socket 0 4

In which the access takes place when different processes try to access the same data concurrently
and the outcome of the execution depends on the specific order, is called M 1
Q
A dynamic condition 0 1
A race condition 1 2
A essential condition 0 3
A critical condition 0 4
Q Process synchronization can be done on which of the following levels M 1
A hardware 0 1
A software 0 2
A both hardware and software 1 3
A BIOS 0 4

M 1
Q Which of the following process can be affected by other processes during execution in the system?
A init process 0 1
A child process 0 2
A parent process 0 3
A cooperating process 1 4
Q How can we avoid deadlock M 1
A Resource Allocation must be done at once 0 1
A there must be a fixed number of resources to allocate 1 2
A all deadlock process must be aborted 0 3
A inversion technique can be used 0 4
A minimum of _____ variable(s) is/are required to be shared between processes to solve the M 1
Q critical section problem.
A 1 0 1
A 2 1 2
A 3 0 3
A 4 0 4

M 1
Q Which of the following conditions is not requied to solve the critical section problem?
A Mutual Exclusion 0 1
A Progress 0 2
A Bounded Waiting 0 3
A Sharing 1 4
The segment of code in which the process may change common variables, update tables, write into M 1
Q files is known as ____________
A program 0 1
A critical section 1 2
A non – critical section 0 3
A synchronizing 0 4
A situation where several processes access and manipulate the same data concurrently and the
outcome of the execution depends on the particular order in which access takes place is called M 1
Q ____________
A Data consistency 0 1
A race condition 1 2
A aging 0 3
A starvation 0 4

MODULE 4
The address of the next instruction to be executed by the current process is provided by the
__________
M 1
Q
A Program counter 1 1
A CPU registers 0 2
A Process stack 0 3
A Pipe 0 4
Q Which system call returns the process identifier of a terminated child? M 1
A wait 1 1
A exit 0 2
A fork 0 3
A get 0 4

A thread shares its resources(like data section, code section, open files, signals) with ___________ M 1
Q
A other process similar to the one that the thread belongs to 0 1
A other threads that belong to similar processes 0 2
A other threads that belong to the same process 1 3
A different threads that belong to the different process 0 4

_________________ is often used for implementing specialized threads within a process. M 1


Q
A Team model 1 1
A Dispatcher worker model 0 2
A Pipeline model 0 3
A Light model 0 4

M 1
Q The capability of a system to adapt the increased service load is called ___________
A scalability 1 1
A tolerance 0 2
A capacity 0 3
A polling 0 4
Q Logical extension of computation migration is M 1
A process migration 1 1
A system migration 0 2
A thread migration 0 3
A data migration 0 4

M 1
Q No special machines manage the network of architecture in which resources are known as
A Peer-to-Peer 1 1
A Space based 0 2
A Tightly coupled 0 3
A Loosely coupled 0 4
Q Scheduuling of threads done by M 1
A input 0 1
A output 0 2
A operating system 1 3
A memory 0 4
Q For execution on process need M 1
A Throughput 0 1
A Timer 0 2
A Resources 1 3
A Access Time 0 4
Q Message passing system allows processes to __________ M 1
A communicate with one another without resorting to shared data 1 1
A communicate with one another by resorting to shared data 0 2
A share data 0 3
A name the recipient or sender of the message 0 4
Q Which is not an examples of state information ? M 1
A Mounting information 0 1
A Description of HDD space 1 2
A Session keys 0 3
A Lock status 0 4
Q Which policy used in load balancing algorithm M 1
A standard policy 0 1
A variant policy 0 2
A location policy 1 3
A random policy 0 4
Q Select the correct sequence for process migration M 1
freezing the process- Transfer the process- forward the message- communicate between 1 1
A cooperating process
Transfer the process- forward the message- communicate between cooperating process-freezing 0 2
A the process
forward the message- communicate between cooperating process-freezing the process- Transfer 0 3
A the process
communicate between cooperating process-freezing the process- Transfer the process- forward the 0 4
A message
____ can be defined as a lightweight process, a part of process which is to be executed M 1
Q sequentially on one core
A method 0 1
A Thread 1 2
A virtualization 0 3
A client server 0 4
Q _____ is defined as that feeling something when it is not actually present M 1
A method 0 1
A Thread 0 2
A virtualization 1 3
A client server 0 4
Q What is common problem found in distributed system ? M 1
A Process Synchronization 0 1
A Communication synchronization 0 2
A Deadlock problem 1 3
A Power failure 0 4

What are the advantages of token(with rings) passing approach ? I. One processor as coordinator
which handles all requests II. No starvation if the ring is unidirectional III. There are many M 1
messages passed per section entered if few users want to get in section IV. One processor as
Q coordinator which handles all requests V. Only one message/entry if everyone wants to get in
A I, II and V 0 1
A I, II and IV 1 2
A II, III and IV 0 3
A II, IV and V 0 4

M 1
Q Which are the two complementary deadlock-prevention schemes using time stamps ?
A The wait-die & wound-wait scheme 1 1
A The wait-n-watch scheme 0 2
A The wound-wait scheme 0 3
A The wait-wound & wound-wait scheme 0 4
In wound-wait If a young process wants a resource held by an old process, the young process will M 1
Q _____
A Killed 0 1
A Wait 1 2
A Preempt 0 3
A Restarts and wait 0 4
Q Election message is always sent to the process with _______ M 1
A Lower numbers 0 1
A Waiting processes 0 2
A Higher numbers 1 3
A Requesting Lower number of resources 0 4

Which algorithms are used for selecting a process to act as coordinator or sequencer? I. M 1
Q Centralized algorithm II. Election algorithm III. Ring algorithm IV. Chandy-Misra-Haas algorithm
A II and IV 0 1
A II, III, IV 0 2
A II and III 1 3
A II 0 4
Q What is interprocess communication? M 1
A communication within the process 0 1
A communication between two process 1 2
A communication between two threads of same process 0 3
A Comunication of process 0 4

M 1
Q _____________ enables the migration of the virtual image from one physical machine to another.
A Visualization 0 1
A Virtualization 1 2
A Migration 0 3
A Virtual transfer 0 4
Q If one thread opens a file with read privileges then ___________ M 1
A other threads in the another process can also read from that file 0 1
A other threads in the same process can also read from that file 0 2
A any other thread can not read from that file 0 3
A all of the mentioned 1 4

MODULE 5

Q A replica set can have only ________ primary. M 1


A One 1 1
A two 0 2
A three 0 3
A zero 0 4
Q Two types of subscriptions present for replication is _____________ M 1
A push and pull 1 1
A throw and pull 0 2
A push and throw 0 3
A Pull and throw 0 4
Q _________ class contains an implementation of a proxy. M 1
A client 1 1
A server 0 2
A RMI 0 3
A object 0 4
Q In GFS, Chunk replicas are created for three reasons: ___________________ M 1
A chunk creation, re-replication, and rebalancing 1 1
A chunk deletion, re-replication, and rebalancing 0 2
A chunk creation, re-replication, and resharing 0 3
A chunk creation, chunk deletion, and rebalancing 0 4
Hide differences in data representation and how a resource is accessed” which type of
transparency is this? M
Q
A Relocation 0 1
A Failure 0 2
A Concurrency 0 3
A Access 1 4
Q Logical extension of computation migration is M
A process migration 1 1
A system migration 0 2
A thread migration 0 3
A data migration 0 4
Q Processes on the remote systems are identified by ___________ M
A host ID 0 1
A host name and identifier 1 2
A identifier 0 3
A process ID 0 4
Q To what extent inconsistencies can be tolerated depends highly on the usage of a M
A replication 0 1
A duplication 0 2
A resource 1 3
A data 0 4

The ----------- of distributed system is determined primarily by the degree to which new resource- M
Q sharing services can be added and be made available for use by a variety of client programs
A Openness 1 1
A Resource Sharing 0 2
A Transparency 0 3
A Scalability 0 4
Q Hide that a resource is replicated is known as___________transparency M
A Replication 1 1
A Location 0 2
A Migration 0 3
A Relocation 0 4
Q Hide the failure and recovery of a resource is known as which transparency M
A Failure 1 1
A Location 0 2
A Migration 0 3
A Relocation 0 4
Q Hide where a resource is located which type of transparency is this? M
A Location 1 1
A Migration 0 2
A Relocation 0 3
A Access 0 4
Q What is WPA? M 1
A wi-fi protected access 1 1
A wired protected access 0 2
A wired process access 0 3
A wi-fi process access 0 4
Q Which is not an examples of state information ? M 1
A Mounting information 0 1
A Description of HDD space 1 2
A Session keys 0 3
A Lock status 0 4
Q What are the advantages of file replication ? M 1
A Improves availability &performance 1 1
A Decreases performance 0 2
A They are consistent 0 3
A Improves speed 0 4
The portion of the process scheduler in an operating system that dispatches processes is
M
Q concerned with ____________ 1
A assigning ready processes to CPU 1 1
A assigning ready processes to waiting queue 0 2
A assigning running processes to blocked queue 0 3
A assigning new processes to cpu 0 4
Q What are the characteristics of data migration? M 1
A transfer data by entire file or immediate portion required 1 1
A transfer the computation rather than the data 0 2
A execute an entire process or parts of it at different sites 0 3
A execute limited portion of data 0 4
Q What are the characteristics of process migration? M 1
A transfer data by entire file or immediate portion required 0 1
A transfer the computation rather than the data 0 2
A execute an entire process or parts of it at different sites 1 3
A execute limited portion of data 0 4
Q Which one of the following is not shared by threads? M 1
A program counter 0 1
A stack register 0 2
A program counter and stack 1 3
A register 0 4
Q A process can be ___________ M 1
A single threaded 0 1
A tripalthreaded 0 2
A single threaded and multithreaded 1 3
A doublethreaded 0 4
Q Replication should be used when which of the following exist? M 1
When transmission speeds and capacity in a network prohibit frequent refreshing of large
0
A tables. 1
0
A When using many nodes with different operating systems and DBMSs and database designs. 2
A The application's data can be somewhat out-of-date. 1 3
A When using some nodes with selected operating system. 0 4
M
Q Storing a separate copy of the database at multiple locations is which of the following? 1
A Data Replication 1 1
A Horizontal Partitioning 0 2
A Vertical Partitioning 0 3
A Horizontal and Vertical Partitioning 0 4
Q A distributed database is which of the following? M 1
1
A A single logical database that is spread to multiple locations and is interconnected by a network 1
0
A A loose collection of file that is spread to multiple locations and is interconnected by a network 2
A A single logical database that is limited to one location. 0 3
A A loose collection of file that is limited to one location. 0 4
Q Which of the following is a disadvantage of replication? M 1
A Reduced network traffic 0 1
A If the database fails at one site, a copy can be located at another site. 0 2
A Each site must have the same storage capacity. 1 3
A Each transaction may proceed without coordination across the network. 0 4
Message passing provides a mechanism to allow processes to communicate and to synchronize
M
Q their actions ________ 1
A By sharing the same address space 1 1
A without sharing the same address space 0 2
A by sharing the same Process Identifier 0 3
A by sharing the same process number 0 4
Q Which layer is the layer closest to the transmission medium ? M 1
A Physical 1 1
A Data link 0 2
A Network 0 3
A Transport 0 4
Q A group server is responsible for_______ & ________ groups M 1
A clean and deduct 0 1
A program and make funtional 0 2
A create and destroy 1 3
A advance and fail 0 4
TCP is reliable _______ protocol which supports reliable point to point communication in
M
Q distributed system. 1
A network 0 1
A transport 1 2
A communication 0 3
A system 0 4
Q Communication channels may suffer through M 1
A protocol 0 1
A transport 0 2
A arbitrary failures 1 3
A reliable communication 0 4
Q Arbitrary failure may ouccur in form of M 1
A duplicate message 1 1
A protocol 0 2
A reliable communication 0 3
A address spacde 0 4
Q SRM protocol stands for M 1
A Scalable Reliable Multispreading 0 1
A Scalable Recovery Multicasting 0 2
A Scalable Reliable Multicasting 1 3
A Scalable Recovery Multispreading 0 4
Q In RPC system, which of the following failure may not occur M 1
A The client cannot locate server 0 1
A The client crashes after sending a request 0 2
A The server crashs after receiving a request 0 3
A The request message from the client to the server is obtained 1 4
MODULE 6

Q Hide the failure and recovery of a resource is known as which transparency M


A Failure 1 1
A Location 0 2
A Migration 0 3
A Relocation 0 4
Q Hide where a resource is located which type of transparency is this? M
A Location 1 1
A Migration 0 2
A Relocation 0 3
A Access 0 4
Q What is WPA? M 1
A wi-fi protected access 1 1
A wired protected access 0 2
A wired process access 0 3
A wi-fi process access 0 4
Q Which is not an examples of state information ? M 1
A Mounting information 0 1
A Description of HDD space 1 2
A Session keys 0 3
A Lock status 0 4
Q What are the advantages of file replication ? M 1
A Improves availability &performance 1 1
A Decreases performance 0 2
A They are consistent 0 3
A Improves speed 0 4
The portion of the process scheduler in an operating system that dispatches processes is concerned M
Q with ____________ 1
A assigning ready processes to CPU 1 1
A assigning ready processes to waiting queue 0 2
A assigning running processes to blocked queue 0 3
A assigning new processes to cpu 0 4
Q What are the characteristics of data migration? M 1
A transfer data by entire file or immediate portion required 1 1
A transfer the computation rather than the data 0 2
A execute an entire process or parts of it at different sites 0 3
A execute limited portion of data 0 4
Q What are the characteristics of process migration? M 1
A transfer data by entire file or immediate portion required 0 1
A transfer the computation rather than the data 0 2
A execute an entire process or parts of it at different sites 1 3
A execute limited portion of data 0 4
Q Which one of the following is not shared by threads? M 1
A program counter 0 1
A stack register 0 2
A program counter and stack 1 3
A register 0 4
Q A process can be ___________ M 1
A single threaded 0 1
A tripalthreaded 0 2
A single threaded and multithreaded 1 3
A doublethreaded 0 4
Q Replication should be used when which of the following exist? M 1
0
A When transmission speeds and capacity in a network prohibit frequent refreshing of large tables. 1
0
A When using many nodes with different operating systems and DBMSs and database designs. 2
A The application's data can be somewhat out-of-date. 1 3
A When using some nodes with selected operating system. 0 4
M
Q Storing a separate copy of the database at multiple locations is which of the following? 1
A Data Replication 1 1
A Horizontal Partitioning 0 2
A Vertical Partitioning 0 3
A Horizontal and Vertical Partitioning 0 4
Q A distributed database is which of the following? M 1
1
A A single logical database that is spread to multiple locations and is interconnected by a network 1
0
A A loose collection of file that is spread to multiple locations and is interconnected by a network 2
A A single logical database that is limited to one location. 0 3
A A loose collection of file that is limited to one location. 0 4
Q Which of the following is a disadvantage of replication? M 1
A Reduced network traffic 0 1
A If the database fails at one site, a copy can be located at another site. 0 2
A Each site must have the same storage capacity. 1 3
A Each transaction may proceed without coordination across the network. 0 4
Message passing provides a mechanism to allow processes to communicate and to synchronize M
Q their actions ________ 1
A By sharing the same address space 1 1
A without sharing the same address space 0 2
A by sharing the same Process Identifier 0 3
A by sharing the same process number 0 4
Q Which layer is the layer closest to the transmission medium ? M 1
A Physical 1 1
A Data link 0 2
A Network 0 3
A Transport 0 4
Q A group server is responsible for_______ & ________ groups M 1
A clean and deduct 0 1
A program and make funtional 0 2
A create and destroy 1 3
A advance and fail 0 4
TCP is reliable _______ protocol which supports reliable point to point communication in M
Q distributed system. 1
A network 0 1
A transport 1 2
A communication 0 3
A system 0 4
Q Communication channels may suffer through M 1
A protocol 0 1
A transport 0 2
A arbitrary failures 1 3
A reliable communication 0 4
Q Arbitrary failure may ouccur in form of M 1
A duplicate message 1 1
A protocol 0 2
A reliable communication 0 3
A address spacde 0 4
Q SRM protocol stands for M 1
A Scalable Reliable Multispreading 0 1
A Scalable Recovery Multicasting 0 2
A Scalable Reliable Multicasting 1 3
A Scalable Recovery Multispreading 0 4
Q In RPC system, which of the following failure may not occur M 1
A The client cannot locate server 0 1
A The client crashes after sending a request 0 2
A The server crashs after receiving a request 0 3
A The request message from the client to the server is obtained 1 4
Which application-level protocol plays a crucial role in carrying out the data definition and M
Q manipulation in addition to X-500 features? 1
A TCP 0 1
A LDAP 1 2
A FTP 0 3
A UDP 0 4

X.500 Directory Service is a standard way to develop an electronic directory of people in an M


Q organization so that it can be part of a available to anyone in the world with Internet access. 1
A social directory 0 1
A local directory 0 2
A global directory 1 3
A personal directory 0 4
Q X.500 Directory is also called M 1
A global Yellow Pages directory 0 1
A global Blue Pages directory 0 2
A global White Pages directory 1 3
A global Black Pages directory 0 4
In X.500 Directory you can search for hundreds of thousands of people from a single place on the M
Q _______________. 1
A World Wide Web. 1 1
A at one place 0 2
A World directory 0 3
A Words largest file 0 4
The distributed global directory works through a __________________ and one or more central M
Q places that manage many directories. 1
A registration process 1 1
A saccession process 0 2
A application process 0 3
A distribution process 0 4
Q X.500 directory uses _______. M 1
A User Information Tree 0 1
A Directory Information Tree 1 2
A Person Information Tree 0 3
A system Information Tree 0 4
Q In X.500, each local directory is called a _____________________. M 1
A Directory System Agent 1 1
A Local System Agent 0 2
A Personal System Agent 0 3
A Secret System Agent 0 4
M
Q In X.500 the user interface program for access to one or more DSAs is a ___________________. 1
A Directory User Agent 1 1
A System User Agent 0 2
A Network User Agent 0 3
A World User Agent 0 4
Q DUAs include whois, finger, and programs that offer a_____________. M 1
A graphical user interface. 1 1
A system interface. 0 2
A Local user interface. 0 3
A global user interface. 0 4
M
Q X.500 is implemented as part of the ______________ in its Global Directory Service 1
A Distributed Computing Environment 1 1
A User fraindly Environment 0 2
A Global Computing Environment 0 3
A World Computing Environment 0 4
M
Q X.500 is a way to route e-mail as well as to provide name lookup, using the _________________. 1
A Lightweight Directory Access Protocol 1 1
A Directory Access Protocol 0 2
A Global Directory Access Protocol 0 3
A Local Directory Access Protocol 0 4
Q X.500 is a series of ________________ covering electronic directory services. M 1
A system standards 0 1
A networking standards 0 2
A computer networking standards 1 3
A operating system standards 0 4
Q The protocols defined by X.500 include M 1
A DISP,DOP 1 1
A TCP,IP 0 2
A ISO,OSI 0 3
A IP 0 4
GNS allows you to locate services via an _________ wherever the service is located, whether on M
Q the local system or on a remote node. 1
A user name 0 1
A arbitrary name 1 2
A system name 0 3
A address name 0 4
The ___________ can be deployed such that it services all or a portion of your Qnet nodes. And M
Q you can have redundant GNS servers. 1
A GNS server 1 1
A IS server 0 2
A DNS server 0 3
A system server 0 4
Q Google Distributed System is M 1
A arbitrary system 0 1
A search engine is now a major player in cloud computing. 1 2
A GNS server 0 3
A computer networking standards 0 4
Q Google is a _______based corporation M 1
A Japan 0 1
A US 1 2
A Rasia 0 3
A UK 0 4
M
Q Google was born out of a research project at Standford with the company launched in 1
A 1995 0 1
A 1992 0 2
A 1997 0 3
A 1998 1 4
Q In global google sysytem The user can expect query result in M 1
A 0.7 seconds 0 1
A 0.4 seconds 0 2
A 0.2 seconds 1 3
A 0.8 seconds 0 4
to locate and retrieve the contents of the web and pass the content onto the indexing subsystem. M
Q Performed by a software called 1
A Googlebot. 1 1
A Gobot. 0 2
A bot. 0 3
A lebot. 0 4
Q In global google sysytem indexing define as M 1
A index for the contents of the web that is similar to an index at the back of a book 1 1
A Serial nos 0 2
A Serial nos in parrallel 0 3
A index of data 0 4
In global google system index of links is also M
Q maintained to keep track of 1
A links to a given site 1 1
A links of user 0 2
A links to programs 0 3
A links of user queries 0 4
Q In global google system Ranking algorithm is called M 1
A SyatemRank 0 1
A LinkRank 0 2
A PageRank 1 3
A IPRank 0 4
In global google system offering application-level software over the Internet M
Q as 1
A web application 1 1
A user application 0 2
A link application 0 3
A system application 0 4
Q With the launch of Google App Engine, Google went beyond _____________. M 1
A software as a service 1 1
A service provider 0 2
A quality as a service 0 3
A data as a service 0 4
M
Q Other organizations are able to run their ______________on the Google platform. 1
A own web applications 1 1
A own services 0 2
A own queries 0 3
A own network programs 0 4

You might also like