CS Unit 3
CS Unit 3
2. With a ______, the client passes requests for file records over a network.
A. file server.
B. database server.
C. transaction server.
D. groupware server.
ANSWER: A
3. With a _______, the client passes SQL requests as message to the database server.
A. file server.
B. database server.
C. transaction server.
D. web server.
ANSWER: B
4. With a transaction server, the client invokes _____ that resides on the server with an SQL database engine.
A. file server.
B. web server.
C. database server.
D. transaction server.
ANSWER: D
5. Expand OLTP.
A. Online Transaction Processing.
B. Offline Transaction Processing.
C. Online Transition Processing.
D. Offline Transition Processing.
ANSWER: A
7. Expand ORB.
A. Object Request Broker.
B. Object Response Broker.
C. Operation Request Broker.
D. Operation Response Broker.
ANSWER: A
11. __________ help us identify structural elements that may be used as building blocks in the construction of ever
more complex systems.
A. Design.
B. Planning.
C. Architectures.
D. Implementation.
ANSWER: C
14. Which model addresses the needs of establishments with a mix of heterogeneous servers.
A. Home office.
B. Ethernet client/server model.
C. Client/Server enterprise model.
D. Single server model.
ANSWER: C
19. Which will collects information from all the agents on the network and displays it graphically?
A. A managing workstation.
B. Client building block.
C. Server building block.
D. Middleware
ANSWER: A
21. In distributed computing environment, operating systems functions are ______ or _________ services.
A. base, extended.
B. single,base.
C. multiple,base.
D. multiple,extended.
ANSWER: A
23. _________ are add-on modular software components that are layered on top of the base services.
A. Distributed services.
B. Base services.
C. Extended services.
D. All the above.
ANSWER: C
25. An operating system with preemptive multitasking must allot _____ time slots of execution to each task.
A. more.
B. less.
C. fixed.
D. varient.
ANSWER: C
32. _________ means hiding the network and its services from the users and the application programmers.
A. Technology.
B. Method.
C. System.
D. Transparency.
ANSWER: D
33. _________ provides a single password that works on all servers and for all services on the network.
A. Logon transparency.
B. Location transparency.
C. Namespace transparency.
D. Failure transparency.
ANSWER: A
34. To use the same naming conventions to locate any resources on the network ________ is used.
A. logon transparency.
B. namespace transparency.
C. location transparency.
D. administration transparency.
ANSWER: B
35. _________ provides a single image file system that can be distributed across a group of file servers.
A. Distributed file service.
B. Distributed data service.
C. Dedicated file service.
D. Dedicated data service.
ANSWER: A
38. __________ is the name by which the local directory is known at the intergalactic level.
A. Local component.
B. Global component.
C. File name.
D. All the above.
ANSWER: B
39. How many types of synchronization schemes are used to refresh the replicas?
A. 1.
B. 2.
C. 5.
D. Many.
ANSWER: B
40. __________ causes a periodic propagation to all the replicas of all changes made on the master.
A. Immediate replication.
B. Intermediate replication.
C. Skulking.
D. Regular replication.
ANSWER: C
41. NOS addresses the problem of distributed time using ______ techniques.
A. 2.
B. 4.
C. 6.
D. 8.
ANSWER: A
43. In time shared systems, the authentication is done by the OS using __________.
A. namespace.
B. host name.
C. user name.
D. passwords.
ANSWER: D
45. _______ allows network managers to monitor user activities, including attempted logons and which servers or files
are used.
A. Audit services.
B. Authentication.
C. Authorization.
D. All the above.
ANSWER: A
46. _________ approach uses 2 keys to encrypt and decrypt the data.
A. Private key.
B. Public key.
C. Secret Key.
D. Session key.
ANSWER: B
47. _________ approach uses a single key to encrypt and decrypt the data.
A. Private key.
B. Public key.
C. Secret key.
D. Session key.
ANSWER: A
48. _________ ensures that data is not modified as it passes through the network.
A. Encryption.
B. Cryptographic checksums.
C. Authentication.
D. Authorization.
ANSWER: B
51. _________ indicates that the two sides of a communication kink use the same protocol interface to conduct a
networked conversation.
A. Server centric.
B. Intranet.
C. Internet.
D. Peer-to-Peer.
ANSWER: D
61. In which year, the relational model of database management was developed at IBM?
A. 1970.
B. 1790.
C. 1979.
D. 1987 .
ANSWER: A
65. _________ provides basic definitions and explains the structure of the SQL3 specification.
A. SQL/CLI.
B. SQL/PSM.
C. SQL/Foundation.
D. SQL/Framework.
ANSWER: D
66. __________ defines the mechanics of intermingling SQL with other languages via pre-compilers and embedded
SQL.
A. SQL/Bindings.
B. SQL/Transactions.
C. SQL/Framework.
D. SQL/Temporal.
ANSWER: A
67. ___________ defines how SQL databases participate in an transaction.
A. SQL/Bindings.
B. SQL/Transactions.
C. SQL/Framework.
D. SQL/Temporal.
ANSWER: B
68. ______________ defines how SQL database handle time series data.
A. SQL/Bindings.
B. SQL/Transactions.
C. SQL/Framework.
D. SQL/Temporal.
ANSWER: D
69. SQL3 may include specifications for multimedia SQL, called _______________.
A. SQL/MM.
B. SQL/Bindings.
C. SQL/Transactions.
D. SQL/Framework.
ANSWER: A
70. Which one of the following is dealing with stored procedures and procedural language extensions for SQL?
A. SQL/CLI.
B. SQL/Bindings.
C. SQL/PSM.
D. SQL/Temporal.
ANSWER: C
72. A database server maintains ________ that contain information about the SQL objects housed within it.
A. Dynamic catalog tables.
B. Query result set.
C. Record set.
D. CLI.
ANSWER: A
73. The database use _____ types of architecture to handle remote database.
A. 1.
B. 2.
C. 3.
D. 4.
ANSWER: C
74. In which database architecture each database client has given its own process address space?
A. Process per client architecture.
B. Multithreaded architecture.
C. Hybrid architecture.
D. Client server architecture.
ANSWER: A
76. Relational databases have built-in extensions and they are _________________.
A. standard.
B. process.
C. storage.
D. non-standard.
ANSWER: D
77. Access to the stored procedure is controlled through the server's _____________.
A. load balancing.
B. security mechanisms.
C. system.
D. processor.
ANSWER: B
78. The concept of stored procedures was pioneered by ____________________ to improve the performance of SQL
on networks.
A. Sybase.
B. Java.
C. COBAL.
D. BASIC.
ANSWER: A
79. The encapsulation features of stored producers are well suited for creating performance-critical applications know
as ____________________.
A. object.
B. processing .
C. online transaction processing.
D. all the above.
ANSWER: C
82. The main drawback of stored procedure is that they are __________.
A. standard.
B. difficult to maintain.
C. difficult to store.
D. non standard.
ANSWER: D
85. ____________ stored procedures only return a single row, but they support cursors.
A. Sybase.
B. SQL server.
C. Oracle 7.
D. SQL engine.
ANSWER: C
86. IBM offers __________ for text, image, audio, video and finger prints.
A. applicatios.
B. logic.
C. extenders.
D. animation.
ANSWER: C
87. Which of the following supports only one trigger per insert/delete/update operations?
A. Ingres.
B. Informix.
C. Orace 7.
D. Sybase.
ANSWER: D
93. _______ are not time-critically and can tolerate slower response times.
A. OLTP.
B. Decision support systems.
C. Data mining.
D. Data warehouse.
ANSWER: B
94. ________ are more powerful, easy-to-use and business-specific than DSS tools.
A. Executive information systems.
B. Decision support systems.
C. OLTP.
D. Data warehouse.
ANSWER: A
95. The average number of records accessed by OLTP database needs is ______.
A. less than 10 individual records.
B. 10-15.
C. 100 to 1000.
D. more than 1000.
ANSWER: A
102. __________ means that a transaction's effects are permanent after it commits.
A. Atomicity.
B. Consistency.
C. Isolation.
D. Durability.
ANSWER: D
103. _________ becomes the fundamental unit of recovery, concurrency and concurrency in a client/server systems.
A. Transaction.
B. Decision support systems.
C. Information management systems.
D. Online transaction processing.
ANSWER: A
104. ________ are the workhorses of the current generation of transactional systems.
A. File transaction.
B. Flat transaction.
C. Begin transaction.
D. Commit transaction.
ANSWER: B
105. ________ within a flat transaction that allow periodic saves of accumulated work.
A. Savepoints.
B. Commit.
C. Rollback.
D. Alter.
ANSWER: A
107. ___________ are a variation of synopoints that make the accumulated work durable.
A. Flat transaction.
B. Commit.
C. Rollback.
D. Chained transactions.
ANSWER: D
108. ________ extend the chained transactions to let the user roll back the entire chain, if the user request it.
A. Sagas.
B. Commit.
C. Rollback.
D. Synopoints.
ANSWER: A
109. ________ provide the ability to define transactions within other transactions.
A. Sagas.
B. Synopoints.
C. Nestded transactions.
D. Chained transactions.
ANSWER: C
110. __________ includes starting server processes, funneling work to them, monitoring their execution and balancing
their workloads.
A. Process management.
B. Transaction management.
C. Product management.
D. Quality management.
ANSWER: B
111. _________ means that it guarantees the ACID properties to all programs that run under its protection.
A. Process management.
B. Transaction management.
C. Product management.
D. Quality management.
ANSWER: B
112. Which of the following is not an example for conversational transactional interface?
A. ATMI.
B. RSC.
C. Synopoint.
D. MQSeries.
ANSWER: D
113. ____________ is any piece of software that manages shared resources and allows the updates to its resources to
be externally coordinated via a two-phase commit protocol.
A. Transaction manager.
B. Application program.
C. Resource manager.
D. Process management.
ANSWER: C
114. _________ is the component that coordinates and controls the resource managers.
A. Transaction manager.
B. Application program.
C. Resource manager.
D. Process management.
ANSWER: A
115. Which of the following(s) is(are) the benefits of client/server oriented TP monitors?
A. Firewall of protection.
B. High availability.
C. Load balancing.
D. All the above.
ANSWER: D
116. ________ can acts as transaction coordinator for work that is exchanged through transactional queries.
A. Load balancing.
B. MOM integration.
C. Resource manager.
D. Firewall.
ANSWER: B
117. The use of ________is mandatory for communications between heterogeneous transaction manger domains.
A. OSI-TP.
B. OLTP.
C. MOM.
D. flat transaction.
ANSWER: A
118. ________ controls communications between distributed applications.
A. OLTP.
B. Communication resource manager.
C. Application program.
D. Firewall.
ANSWER: B
122. The technology for multimedia document management and workflow comes from _________.
A. electronic document imaging service.
B. service provider.
C. end users.
D. ISO.
ANSWER: A
123. ________ automates the movement of documents by moving them from one business operation to the next
according to customer defined rules and routes.
A. Subroutines.
B. Workflow.
C. Remote task invocation.
D. All the above.
ANSWER: B
124. __________ defines the paths along which the object moves.
A. Routes.
B. Rules.
C. Roles.
D. Destination.
ANSWER: A
126. ________ define job functions independently of the people who do it.
A. Routes.
B. Rules.
C. Roles.
D. Destination.
ANSWER: C
127. __________ is a logical step that contributes toward the completion of a workflow process.
A. Activity.
B. Work.
C. Roles.
D. Rules.
ANSWER: A
130. _______ functions are essential for addressing, sending and receiving a nail message.
A. Decision support system.
B. Information management system.
C. Electronic data interchange.
D. Simple messaging services.
ANSWER: D
131. ___________ involved in opening and reading messages delivered to a message store.
A. Decision support system.
B. Message store manipulation.
C. Electronic data interchange.
D. Simple messaging services.
ANSWER: B
132. ___________ includes APIs that let an application log on to the mail system and authenticate its users.
A. Mail object manipulation.
B. Authentication and security services.
C. Messaging API.
D. All the above.
ANSWER: B
136. ___________ are used to explode an object into many parts in workflow.
A. And-Splits.
B. Or-Splits.
C. Or-Joins.
D. And-Joins.
ANSWER: A
137. ________ are used to peel off a new parts from a group in workflow.
A. And-Splits.
B. Or-Splits.
C. Or-Joins.
D. And-Joins.
ANSWER: B
139. _______ are rendezvous points that are used to group together objects so that they move in a route as a group.
A. And-Splits.
B. Or-Splits.
C. Or-Joins.
D. And-Joins.
ANSWER: D
140. ____________ provides a simple main interface that deals with SMSSendMail and SMSSendDocuments.
A. Vendor independent messaging.
B. Messaging API.
C. Common mail calls.
D. All the above.
ANSWER: A
141. In which technology, data and business logic are encapsulated within objects, allowing them to be located
anywhere within a distributed systems?
A. Information management.
B. Distributed object.
C. Decision support systems.
D. File management.
ANSWER: B
142. Distributed objects are packaged as independent piece of code that can be accessed by remote clients via
__________.
A. Internet.
B. method invocation.
C. Intranet.
D. method calling.
ANSWER: B
143. Distributed objects are, by definition _________ because of the way they are packaged.
A. methods.
B. functions.
C. components.
D. objects.
ANSWER: C
146. Which of the following interact with their clients and implement logic of the business objects?
A. Client objects.
B. Middle-tier server objects.
C. Server objects.
D. CORBA.
ANSWER: B
148. Which component deals with component creation, destruction and archival?
A. Security.
B. Licensing.
C. Versioning.
D. Life cycle management.
ANSWER: D
149. ________ component must be able to install itself and automatically register its factory with the operating system
or component registry.
A. Self-installing.
B. Security.
C. Licensing.
D. Versioning.
ANSWER: A
150. Middle-tier objects can communicate with each other via a _______.
A. server objects.
B. server ORB.
C. client objects.
D. functions.
ANSWER: B
Staff Name
Kavitha K .