Sem-VII Distributed Systems (MCQ)
Sem-VII Distributed Systems (MCQ)
Unit 1: Introduction
8. __________ involves taking a component, splitting it into smaller parts, and subsequently
spreading those parts across the system.
A) Replication
B) Distribution
c) Dispensation
d) Partitioning
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems
10. Location transparency allows: I. Users to treat the data as if it is done at one location. II.
Programmers to treat the data as if it is at one location. III. Managers to treat the data as if
it is at one location. Which one of the following is correct?
a) I, II and III
b) I and II only
c) II and III only
d) II only
11. Which of the following computing models is not an example of distributed computing
environment?
a) Cloud computing
b) Parallel computing
c) Cluster computing
d) Peer-to-peer computing
13. A transaction that has not been completed successfully is called as _______
(A) Isolation
(B) Durability
(C) Atomicity
(D) All of above
(A) Isolation
(B) Durability
(C) Atomicity
(D) None of above
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems
17. When more than one user is accessing same data at the same time then it is known
18. Which property of a transaction that protect data from system failure
(A) Isolation
(B) Durability
(C) Atomicity
(D) None of above
20. A distributed system that is not able to present itself to users and applications as if it were
only a single computer system is said to be transparent.
a) True
b) False
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems
21. Data-centered architectures evolve around the idea that processes cannot communicate
through a common (passive or active) repository.
a) True
b) False
22. A typical _________ program creates some remote objects, makes references to these
objects accessible, and waits for clients to invoke methods on these objects.
a) Server
b) Client
c) Thread
d) Concurrent
23. A typical __________ program obtains a remote reference to one or more remote objects
on a server and then invokes methods on them.
a) Server
b) Client
c) Thread
d) Concurrent
25. In two-tier client/server architecture, the running of application programs and the user
interface programs is in control of
a) Modulation side
b) Client side
c) Server Side
d) Host Side
26. Central Computer which is powerful than other computers in the network is called as
__________.
a) Client
b) Server
c) Switch
d) Hub
27. Machine that places the request to access the data/service is generally called as
__________.
A) Server Machine
b) Client Machine
c) Request Machine
d) None of the above
28. Which of the following is not the correct benefit of distributed computing.
A) Resource sharing
B) Performance
C) Availability
D) Security
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems
2. If timestamps of two events are same, then the events are ____________
a) concurrent
b) non-concurrent
c) monotonic
d) non-monotonic
6. In the token passing approach of distributed systems, processes are organized in a ring
structure ____________
a) logically
b) physically
c) both logically and physically
d) none of the mentioned
10. According to the ring algorithm, links between processes are ____________
a) bidirectional
b) unidirectional
c) both bidirectional and unidirectional
d) none of the mentioned
13. To enforce ___________ two functions are provided enter-critical and exit-critical, where
each function takes as an argument the name of the resource that is the subject of
competition.
a) Mutual Exclusion
b) Synchronization
c) Deadlock
d) Starvation
14. In ___________ only one process at a time is allowed into its critical section, among all
processes that have critical sections for the same resource.
a) Mutual Exclusion
b) Synchronization
c) Deadlock
d) Starvation
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems
1. What are the different ways in which clients and servers are dispersed across machines?
a) Servers may not run on dedicated machines
b) Servers and clients can be on same machines
c) Distribution cannot be interposed between a OS and the file system
d) OS cannot be distributed with the file system a part of that distribution
19. ______ of the distributed file system are dispersed among various machines of distributed
system.
a) Clients
b) Servers
c) Storage devices
d) All of the mentioned
21. Which one of the following hides the location where in the network the file is stored?
a) transparent distributed file system
b) hidden distributed file system
c) escaped distribution file system
d) spy distributed file system
22. In a distributed file system, when a file’s physical storage location changes ___________
a) file name need to be changed
b) file name need not to be changed
c) file’s host name need to be changed
d) file’s local name need to be changed
23. In a distributed file system, _______ is mapping between logical and physical objects.
a) client interfacing
b) naming
c) migration
d) heterogeneity
25. There is no need to establish and terminate a connection through open and close operation
in ___________
a) stateless file service
b) stateful file service
c) both stateless and stateful file service
d) none of the mentioned
26. In distributed file system, file name does not reveal the file’s ___________
a) local name
b) physical storage location
c) both local name and physical storage location
d) none of the mentioned
28. Which one of the property is NOT a requirement for Fault Tolerance?
a) Fault Containments
b) Fault Isolation
c) Dynamic Recovery
d) Fail Safe
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems
29. Which of the operating system architecture is suitable for Fault Tolerance based systems?
a) Monolithic Kernel
b) Micro Kernel
c) Real Time Kernel
d) All of the above
30. Which of the following approaches are used to achieve reliable systems?
a) Fault Prevention
b) Fault Removal
c) Fault Tolerance
d) All of the mentioned
1. _________ computing refers to applications and services that run on a distributed network
using virtualized resources.
a) Distributed
b) Cloud
c) Soft
d) Parallel
5. Which of the following cloud concept is related to pooling and sharing of resources?
a) Polymorphism
b) Abstraction
c) Virtualization
d) None of the mentioned
6. ________ has many of the characteristics of what is now being called cloud computing.
a) Internet
b) Softwares
c) Web Service
d) All of the mentioned
8. Cloud computing is an abstraction based on the notion of pooling physical resources and
presenting them as a ________ resource.
a) real
b) virtual
c) cloud
d) none of the mentioned
10. _________ model consists of the particular types of services that you can access on a cloud
computing platform.
a) Service
b) Deployment
c) Application
d) None of the mentioned
12. ________ refers to the location and management of the cloud’s infrastructure.
a) Service
b) Deployment
c) Application
d) None of the mentioned
16. The __________ model originally did not require a cloud to use virtualization to pool
resources.
a) NEFT
b) NIST
c) NIT
d) All of the mentioned
21. The ________ cloud infrastructure is operated for the exclusive use of an organization.
a) Public
b) Private
c) Community
d) All of the mentioned
22. __________ cloud is one where the cloud has been organized to serve a common function
or purpose.
a) Public
b) Private
c) Community
d) All of the mentioned
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems
23. A __________ cloud combines multiple clouds where those clouds retain their unique
identities but are bound together as a unit.
a) Public
b) Private
c) Community
d) Hybrid
26. _______ provides virtual machines, virtual storage, virtual infrastructure, and other
hardware assets.
a) IaaS
b) SaaS
c) PaaS
d) All of the mentioned
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems
27. Which of the following provides development frameworks and control structures?
a) IaaS
b) SaaS
c) PaaS
d) All of the mentioned
28. _______ is a complete operating environment with applications, management, and user
interface.
a) IaaS
b) SaaS
c) PaaS
d) All of the mentioned
29. How many types of service model are mainly present in Cloud?
a) 1
b) 2
c) 3
d) 4
30. The three different service models are together known as the _____ model of cloud
computing.
a) SPI
b) SIP
c) CPI
d) All of the mentioned
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems
33. _________ is a cloud computing service model in which hardware is virtualized in the
cloud.
a) IaaS
b) CaaS
c) PaaS
d) None of the mentioned
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems
Unit 5: Virtualization
5. Which of the following should be replaced with the question mark in the following figure?
a) Abstraction
b) Virtualization
c) Mobility Pattern
d) All of the mentioned
10. Which of the following type of virtualization is found in hypervisor such as Microsoft’s
Hyper-V ?
a) Paravirtualization
b) Full virtualization
c) Emulation
d) None of the mentioned
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems
11. In _______, the virtual machine simulates hardware, so it can be independent of the
underlying system hardware.
a) Paravirtualization
b) Full virtualization
c) Emulation
d) None of the mentioned
13. In a ____________ scheme, the VM is installed as a Type 1 Hypervisor directly onto the
hardware.
a) Paravirtualization
b) Full virtualization
c) Emulation
d) None of the mentioned
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems
1. Which of the following subject area deals with pay-as-you-go usage model?
a) Accounting Management
b) Compliance
c) Data Privacy
d) All of the mentioned
3. Security methods such as private encryption, VLANs and firewalls comes under
__________ subject area.
a) Accounting Management
b) Compliance
c) Data Privacy
d) All of the mentioned
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems
6. The reputation for cloud computing services for the quality of those services is shared by
_________
a) replicas
b) shards
c) tenants
d) all of the mentioned
7. Cloud ________ are standardized in order to appeal to the majority of its audience.
a) SVAs
b) SLAs
c) SALs
d) None of the mentioned
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems
9. Which of the following is a virtual machine technology now owned by Oracle that can run
various operating systems?
a) Vmachines
b) VirtualBox
c) ThoughtPolice
d) None of the mentioned
10. Which of the following is the fundamental unit of virtualized client in an IaaS deployment?
a) workunit
b) workspace
c) workload
d) all of the mentioned
11. ______ offering provides the tools and development environment to deploy applications on
another vendor’s application.
a) PaaS
b) IaaS
c) CaaS
d) All of the mentioned
Tatyasaheb Kore Institute of Engineering and Technology, Warananagar
Department of Computer Science and Engineering
MCQ: Distributed Systems
14. _________ serves as a PaaS vendor within Google App Engine system.
a) Google
b) Amazon
c) Microsoft
d) All of the mentioned
18. Amazon Web Services offers a classic Service Oriented Architecture (SOA) approach to
______________
a) IaaS
b) SaaS
c) PaaS
d) All of the mentioned
24. _________ applications have a much lower barrier to entry than their locally installed
competitors.
a) IaaS
b) CaaS
c) PaaS
d) None of the mentioned
25. SaaS supports multiple users and provides a shared data model through _________ model.
a) single-tenancy
b) multi-tenancy
c) multiple-instance
d) all of the mentioned
28. __________ authentication requires the outside use of a network security or trust service.
a) SSO
b) Singlefactor
c) Multi Factor
d) All of the mentioned
29. ________ is the assignment of a network identity to a specific MAC address that allows
systems to be found on networks.
a) Internet Hardware Addresses
b) Ethernet Software Addresses
c) Ethernet Hardware Addresses
d) None of the mentioned
30. _________ is one of the more expensive and complex areas of network computing.
a) Multi-Factor Authentication
b) Fault tolerance
c) Identity protection
d) All of the mentioned
33. Which of the following are a common means for losing encrypted data?
a) lose the keys
b) lose the encryption standard
c) lose the account
d) all of the mentioned
34. Which of the following was one of the weaker aspects of early cloud computing service
offerings?
a) Logging
b) Integrity checking
c) Consistency checking
d) None of the mentioned
35. Which of the following is one of the most actively developing and important areas of cloud
computing technology?
a) Logging
b) Auditing
c) Regulatory compliance
d) None of the mentioned