0% found this document useful (0 votes)
13 views20 pages

CS Unit 3

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views20 pages

CS Unit 3

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

Dr.G.R.

Damodaran College of Science


(Autonomous, affiliated to the Bharathiar University, recognized by the UGC)Re-accredited at
the 'A' Grade Level by the NAAC and ISO 9001:2008 Certified
CRISL rated 'A' (TN) for MBA and MIB Programmes

III B.Sc Computer Science [2012 - 2015]


Semester V
Elective I:Client / Server Technology – 507U7
Multiple Choice Questions.

1. The Client/Server systems can be scaled ______.


A. horizontally.
B. vertically.
C. both a and b.
D. mix and match.
ANSWER: C

2. With a ______, the client passes requests for file records over a network.
A. file server.
B. database server.
C. transaction server.
D. groupware server.
ANSWER: A

3. With a _______, the client passes SQL requests as message to the database server.
A. file server.
B. database server.
C. transaction server.
D. web server.
ANSWER: B

4. With a transaction server, the client invokes _____ that resides on the server with an SQL database engine.
A. file server.
B. web server.
C. database server.
D. transaction server.
ANSWER: D

5. Expand OLTP.
A. Online Transaction Processing.
B. Offline Transaction Processing.
C. Online Transition Processing.
D. Offline Transition Processing.
ANSWER: A

6. Groupware addresses the management of ________ information.


A. structured.
B. semi-structured.
C. binary.
D. decimal.
ANSWER: B

7. Expand ORB.
A. Object Request Broker.
B. Object Response Broker.
C. Operation Request Broker.
D. Operation Response Broker.
ANSWER: A

8. The _______ is the first truly intergalactic client/server application.


A. HTTP.
B. TCP/IP.
C. Intranet.
D. World Wide Web.
ANSWER: D

9. Groupware, Transaction and Web servers are examples of _____.


A. clients.
B. fat clients.
C. middleware.
D. fat servers.
ANSWER: D

10. ________ are more traditional form of client/server.


A. Fat servers.
B. Fat clients.
C. middleware.
D. both a and b.
ANSWER: B

11. __________ help us identify structural elements that may be used as building blocks in the construction of ever
more complex systems.
A. Design.
B. Planning.
C. Architectures.
D. Implementation.
ANSWER: C

12. In which place, LAN based single server model is used?


A. Enterprise.
B. Small shops.
C. World Wide Web.
D. Distributed environment.
ANSWER: B

13. The server present a _______ to the clients.


A. single system image.
B. multi system image.
C. hybrid system image.
D. all the above.
ANSWER: A

14. Which model addresses the needs of establishments with a mix of heterogeneous servers.
A. Home office.
B. Ethernet client/server model.
C. Client/Server enterprise model.
D. Single server model.
ANSWER: C

15. Client/Server model is made up of _____ building blocks.


A. 1.
B. 2.
C. 3.
D. many.
ANSWER: C
16. Expand DSM.
A. Distributed System Model.
B. Direct System Model
C. Distributed System Maintenance.
D. Distributed System Management.
ANSWER: D

17. The middleware building block runs on _________ side(s) of an application.


A. client.
B. server.
C. both a and b.
D. fat client
ANSWER: C

18. __________ is the nervous system of the client/server infrastructure.


A. Clinet.
B. Server.
C. Middleware.
D. all the above.
ANSWER: C

19. Which will collects information from all the agents on the network and displays it graphically?
A. A managing workstation.
B. Client building block.
C. Server building block.
D. Middleware
ANSWER: A

20. Middleware building block is divided into ____ categories.


A. 1.
B. 2.
C. 3.
D. 4.
ANSWER: C

21. In distributed computing environment, operating systems functions are ______ or _________ services.
A. base, extended.
B. single,base.
C. multiple,base.
D. multiple,extended.
ANSWER: A

22. _________ services are part of the standard operating systems.


A. Base.
B. Extended.
C. Distributed.
D. All the above.
ANSWER: A

23. _________ are add-on modular software components that are layered on top of the base services.
A. Distributed services.
B. Base services.
C. Extended services.
D. All the above.
ANSWER: C

24. An operating system must dispatch tasks based on _________.


A. file size.
B. file type.
C. number of tasks.
D. task priority.
ANSWER: D

25. An operating system with preemptive multitasking must allot _____ time slots of execution to each task.
A. more.
B. less.
C. fixed.
D. varient.
ANSWER: C

26. ________ is not the example for large objects.


A. video.
B. Text.
C. Graphics.
D. Intelligent documents.
ANSWER: B

27. In a network, ________ is a mobile container of components.


A. place.
B. shippable place.
C. main memory.
D. secondary memory.
ANSWER: B

28. Which one of the followings is not an OOUI?


A. NextStep.
B. MAC OS.
C. Windows 95.
D. Windows 3.X.
ANSWER: D

29. In which clients, icons represent objects?


A. Non GUI.
B. GUI.
C. OOUI.
D. All the above.
ANSWER: C

30. __________ clients keep snapshots of tables locally.


A. File.
B. Database.
C. Groupware.
D. Transaction.
ANSWER: B

31. ________ clients coordinate multiserver transaction.


A. TP monitor.
B. File.
C. Database.
D. Groupware.
ANSWER: A

32. _________ means hiding the network and its services from the users and the application programmers.
A. Technology.
B. Method.
C. System.
D. Transparency.
ANSWER: D

33. _________ provides a single password that works on all servers and for all services on the network.
A. Logon transparency.
B. Location transparency.
C. Namespace transparency.
D. Failure transparency.
ANSWER: A

34. To use the same naming conventions to locate any resources on the network ________ is used.
A. logon transparency.
B. namespace transparency.
C. location transparency.
D. administration transparency.
ANSWER: B

35. _________ provides a single image file system that can be distributed across a group of file servers.
A. Distributed file service.
B. Distributed data service.
C. Dedicated file service.
D. Dedicated data service.
ANSWER: A

36. Expand LFS.


A. Location file system.
B. Local file system.
C. Least file service.
D. Location file service.
ANSWER: B

37. In modern NOS, the directory service is implemented as __________.


A. distributed.
B. replicated.
C. object database.
D. all the above.
ANSWER: D

38. __________ is the name by which the local directory is known at the intergalactic level.
A. Local component.
B. Global component.
C. File name.
D. All the above.
ANSWER: B

39. How many types of synchronization schemes are used to refresh the replicas?
A. 1.
B. 2.
C. 5.
D. Many.
ANSWER: B

40. __________ causes a periodic propagation to all the replicas of all changes made on the master.
A. Immediate replication.
B. Intermediate replication.
C. Skulking.
D. Regular replication.
ANSWER: C

41. NOS addresses the problem of distributed time using ______ techniques.
A. 2.
B. 4.
C. 6.
D. 8.
ANSWER: A

42. __________ is a US government security standard for operating systems.


A. C1.
B. C2.
C. S1.
D. S2.
ANSWER: B

43. In time shared systems, the authentication is done by the OS using __________.
A. namespace.
B. host name.
C. user name.
D. passwords.
ANSWER: D

44. Servers use ___________ to control user access.


A. user list.
B. domain list.
C. access control list.
D. all the above.
ANSWER: C

45. _______ allows network managers to monitor user activities, including attempted logons and which servers or files
are used.
A. Audit services.
B. Authentication.
C. Authorization.
D. All the above.
ANSWER: A

46. _________ approach uses 2 keys to encrypt and decrypt the data.
A. Private key.
B. Public key.
C. Secret Key.
D. Session key.
ANSWER: B

47. _________ approach uses a single key to encrypt and decrypt the data.
A. Private key.
B. Public key.
C. Secret key.
D. Session key.
ANSWER: A

48. _________ ensures that data is not modified as it passes through the network.
A. Encryption.
B. Cryptographic checksums.
C. Authentication.
D. Authorization.
ANSWER: B

49. Expand MOM.


A. Message Oriented Middleware.
B. Message Of Moddleware.
C. Method Oriented Middleware.
D. Method Of Middleware.
ANSWER: A

50. Which one of the followings is not a peer-to-peer protocol?


A. Sockets.
B. TLI.
C. NetBIOS.
D. SNA.
ANSWER: D

51. _________ indicates that the two sides of a communication kink use the same protocol interface to conduct a
networked conversation.
A. Server centric.
B. Intranet.
C. Internet.
D. Peer-to-Peer.
ANSWER: D

52. Peer-to-Peer communication is also known as ___________.


A. program-to-program.
B. Server-to-server.
C. client-to-server.
D. server-toclient.
ANSWER: A

53. Sockets were introduced in _________.


A. 1981.
B. 1918.
C. 1984.
D. 1985.
ANSWER: A

54. TLI protocol was introduced by __________.


A. Xerox research institute.
B. IBM.
C. AT&T.
D. Microsoft.
ANSWER: C

55. The TLI API consists of about ____ API calls.


A. 10.
B. 20.
C. 25.
D. 40.
ANSWER: C

56. An internet address is a _____ bit number.


A. 16.
B. 32.
C. 64.
D. 256.
ANSWER: B

57. ________ is an entry point to an application that resides on a host.


A. IP address.
B. Modem.
C. Port.
D. Router.
ANSWER: C

58. NetBIOS is the protocol used in ______ communication.


A. standalone.
B. LAN.
C. server client
D. distributed.
ANSWER: B

59. _________ offers powerful datagram and connection oriented services.


A. NetBIOS.
B. NetBEUI.
C. MAC address.
D. port.
ANSWER: B

60. The NetBIOS services are provided through ________.


A. GUI.
B. icons.
C. objects.
D. set of commands.
ANSWER: D

61. In which year, the relational model of database management was developed at IBM?
A. 1970.
B. 1790.
C. 1979.
D. 1987 .
ANSWER: A

62. _________ can be used to manipulate information collected in tables.


A. Statement.
B. Commands.
C. Rows.
D. Columns.
ANSWER: B

63. _______ is the first company offers a commercial version of SQL.


A. Oracle corporation.
B. Gupta.
C. Informix.
D. XDB.
ANSWER: A

64. Which of the following is not a ISO standard for SQL?


A. SQL-89.
B. SQL1.
C. SQL2.
D. SQL3.
ANSWER: B

65. _________ provides basic definitions and explains the structure of the SQL3 specification.
A. SQL/CLI.
B. SQL/PSM.
C. SQL/Foundation.
D. SQL/Framework.
ANSWER: D

66. __________ defines the mechanics of intermingling SQL with other languages via pre-compilers and embedded
SQL.
A. SQL/Bindings.
B. SQL/Transactions.
C. SQL/Framework.
D. SQL/Temporal.
ANSWER: A
67. ___________ defines how SQL databases participate in an transaction.
A. SQL/Bindings.
B. SQL/Transactions.
C. SQL/Framework.
D. SQL/Temporal.
ANSWER: B

68. ______________ defines how SQL database handle time series data.
A. SQL/Bindings.
B. SQL/Transactions.
C. SQL/Framework.
D. SQL/Temporal.
ANSWER: D

69. SQL3 may include specifications for multimedia SQL, called _______________.
A. SQL/MM.
B. SQL/Bindings.
C. SQL/Transactions.
D. SQL/Framework.
ANSWER: A

70. Which one of the following is dealing with stored procedures and procedural language extensions for SQL?
A. SQL/CLI.
B. SQL/Bindings.
C. SQL/PSM.
D. SQL/Temporal.
ANSWER: C

71. The database server is also known as _________.


A. SQL engine.
B. SQL standard.
C. Web server.
D. File server.
ANSWER: A

72. A database server maintains ________ that contain information about the SQL objects housed within it.
A. Dynamic catalog tables.
B. Query result set.
C. Record set.
D. CLI.
ANSWER: A

73. The database use _____ types of architecture to handle remote database.
A. 1.
B. 2.
C. 3.
D. 4.
ANSWER: C

74. In which database architecture each database client has given its own process address space?
A. Process per client architecture.
B. Multithreaded architecture.
C. Hybrid architecture.
D. Client server architecture.
ANSWER: A

75. The main drawback of hybrid architecture is _________.


A. Long duration.
B. Load balancing.
C. Performance.
D. Response time.
ANSWER: A

76. Relational databases have built-in extensions and they are _________________.
A. standard.
B. process.
C. storage.
D. non-standard.
ANSWER: D

77. Access to the stored procedure is controlled through the server's _____________.
A. load balancing.
B. security mechanisms.
C. system.
D. processor.
ANSWER: B

78. The concept of stored procedures was pioneered by ____________________ to improve the performance of SQL
on networks.
A. Sybase.
B. Java.
C. COBAL.
D. BASIC.
ANSWER: A

79. The encapsulation features of stored producers are well suited for creating performance-critical applications know
as ____________________.
A. object.
B. processing .
C. online transaction processing.
D. all the above.
ANSWER: C

80. RPC-like mechanism for database is referred to as _______________________.


A. shared resources.
B. stored procedures .
C. procedures.
D. logic.
ANSWER: B

81. stored procedure is __________.


A. data centric.
B. application centric.
C. database centric.
D. file centric.
ANSWER: C

82. The main drawback of stored procedure is that they are __________.
A. standard.
B. difficult to maintain.
C. difficult to store.
D. non standard.
ANSWER: D

83. Sybase Stored procedures do not support __________.


A. cursors.
B. pointer.
C. arrays.
D. all the above.
ANSWER: A
84. Sybase and SQL server stored procedures can return _______.
A. single row.
B. single column.
C. multiple row.
D. multiple column.
ANSWER: C

85. ____________ stored procedures only return a single row, but they support cursors.
A. Sybase.
B. SQL server.
C. Oracle 7.
D. SQL engine.
ANSWER: C

86. IBM offers __________ for text, image, audio, video and finger prints.
A. applicatios.
B. logic.
C. extenders.
D. animation.
ANSWER: C

87. Which of the following supports only one trigger per insert/delete/update operations?
A. Ingres.
B. Informix.
C. Orace 7.
D. Sybase.
ANSWER: D

88. Which of the following supports multiple triggers?


A. Ingres.
B. Informix.
C. Orace 7.
D. Sybase.
ANSWER: A

89. Oracle 7 supports ______ triggers per table.


A. upto 5.
B. upto 10.
C. upto 12.
D. upto 15.
ANSWER: C

90. DB2 V2.1 was introduced in ______.


A. 1992.
B. 1995.
C. 1996.
D. 1997.
ANSWER: B

91. In OLTP systems, the client typically interacts with a _________.


A. transaction server.
B. database server.
C. file sever.
D. web server.
ANSWER: A

92. _______ are used to analyze data and create reports.


A. File server.
B. SQL commands.
C. Web servers.
D. Decision support systems.
ANSWER: D

93. _______ are not time-critically and can tolerate slower response times.
A. OLTP.
B. Decision support systems.
C. Data mining.
D. Data warehouse.
ANSWER: B

94. ________ are more powerful, easy-to-use and business-specific than DSS tools.
A. Executive information systems.
B. Decision support systems.
C. OLTP.
D. Data warehouse.
ANSWER: A

95. The average number of records accessed by OLTP database needs is ______.
A. less than 10 individual records.
B. 10-15.
C. 100 to 1000.
D. more than 1000.
ANSWER: A

96. The performance of OLTP is _____.


A. relatively low.
B. moderate.
C. average.
D. highly automated.
ANSWER: D

97. MDA stands for ___________.


A. Media data analysis.
B. Multidimentional analysis.
C. Media data analyzer.
D. Multidimentional analyzer.
ANSWER: B

98. __________ is a collection of actions embued with ACID properties.


A. Connection.
B. Transaction.
C. Query.
D. All the above.
ANSWER: B

99. Expand ACID.


A. Atomicity, Consistency, Isolation and Durability.
B. Automatic, Consistent, Isolation and Duration.
C. Automatic, Consistent, Isolation and Durability.
D. Automatic, Concurrent, Isolation and Duration.
ANSWER: A

100. _________ means that a transaction is an indivisible unit of work.


A. Consistency.
B. Isolation.
C. Durability.
D. Atomicity.
ANSWER: D
101. ___________ means that a transaction's behavior is not affected by other transactions that execute concurrently.
A. Atomicity.
B. Consistency.
C. Isolation.
D. Durability.
ANSWER: C

102. __________ means that a transaction's effects are permanent after it commits.
A. Atomicity.
B. Consistency.
C. Isolation.
D. Durability.
ANSWER: D

103. _________ becomes the fundamental unit of recovery, concurrency and concurrency in a client/server systems.
A. Transaction.
B. Decision support systems.
C. Information management systems.
D. Online transaction processing.
ANSWER: A

104. ________ are the workhorses of the current generation of transactional systems.
A. File transaction.
B. Flat transaction.
C. Begin transaction.
D. Commit transaction.
ANSWER: B

105. ________ within a flat transaction that allow periodic saves of accumulated work.
A. Savepoints.
B. Commit.
C. Rollback.
D. Alter.
ANSWER: A

106. Synopoints are also known as ________.


A. savepoints.
B. commit.
C. rollback.
D. alter.
ANSWER: A

107. ___________ are a variation of synopoints that make the accumulated work durable.
A. Flat transaction.
B. Commit.
C. Rollback.
D. Chained transactions.
ANSWER: D

108. ________ extend the chained transactions to let the user roll back the entire chain, if the user request it.
A. Sagas.
B. Commit.
C. Rollback.
D. Synopoints.
ANSWER: A

109. ________ provide the ability to define transactions within other transactions.
A. Sagas.
B. Synopoints.
C. Nestded transactions.
D. Chained transactions.
ANSWER: C

110. __________ includes starting server processes, funneling work to them, monitoring their execution and balancing
their workloads.
A. Process management.
B. Transaction management.
C. Product management.
D. Quality management.
ANSWER: B

111. _________ means that it guarantees the ACID properties to all programs that run under its protection.
A. Process management.
B. Transaction management.
C. Product management.
D. Quality management.
ANSWER: B

112. Which of the following is not an example for conversational transactional interface?
A. ATMI.
B. RSC.
C. Synopoint.
D. MQSeries.
ANSWER: D

113. ____________ is any piece of software that manages shared resources and allows the updates to its resources to
be externally coordinated via a two-phase commit protocol.
A. Transaction manager.
B. Application program.
C. Resource manager.
D. Process management.
ANSWER: C

114. _________ is the component that coordinates and controls the resource managers.
A. Transaction manager.
B. Application program.
C. Resource manager.
D. Process management.
ANSWER: A

115. Which of the following(s) is(are) the benefits of client/server oriented TP monitors?
A. Firewall of protection.
B. High availability.
C. Load balancing.
D. All the above.
ANSWER: D

116. ________ can acts as transaction coordinator for work that is exchanged through transactional queries.
A. Load balancing.
B. MOM integration.
C. Resource manager.
D. Firewall.
ANSWER: B

117. The use of ________is mandatory for communications between heterogeneous transaction manger domains.
A. OSI-TP.
B. OLTP.
C. MOM.
D. flat transaction.
ANSWER: A
118. ________ controls communications between distributed applications.
A. OLTP.
B. Communication resource manager.
C. Application program.
D. Firewall.
ANSWER: B

119. __________ is a peer-to-peer conversational interface based on CPI-C and APRC.


A. TxRPC.
B. XATMI.
C. CPI-C V21
D. CPI-C V2.
ANSWER: C

120. Expand RTI.


A. Remote Target Invocation.
B. Remote Target Instance.
C. Remote Task Invocation.
D. Remote Task Instance.
ANSWER: C

121. Groupware helps _________ create document databases.


A. developer.
B. service provider.
C. programmers.
D. end users.
ANSWER: D

122. The technology for multimedia document management and workflow comes from _________.
A. electronic document imaging service.
B. service provider.
C. end users.
D. ISO.
ANSWER: A

123. ________ automates the movement of documents by moving them from one business operation to the next
according to customer defined rules and routes.
A. Subroutines.
B. Workflow.
C. Remote task invocation.
D. All the above.
ANSWER: B

124. __________ defines the paths along which the object moves.
A. Routes.
B. Rules.
C. Roles.
D. Destination.
ANSWER: A

125. ________ define what information is routed and to whom.


A. Routes.
B. Rules.
C. Roles.
D. Destination.
ANSWER: B

126. ________ define job functions independently of the people who do it.
A. Routes.
B. Rules.
C. Roles.
D. Destination.
ANSWER: C

127. __________ is a logical step that contributes toward the completion of a workflow process.
A. Activity.
B. Work.
C. Roles.
D. Rules.
ANSWER: A

128. Process control and status consists of ____ API calls.


A. 10.
B. 28.
C. 23.
D. 25.
ANSWER: C

129. _________ is an important source of mail enabled business transactions.


A. Decision support system.
B. Information management system.
C. Electronic data interchange.
D. Data structures.
ANSWER: C

130. _______ functions are essential for addressing, sending and receiving a nail message.
A. Decision support system.
B. Information management system.
C. Electronic data interchange.
D. Simple messaging services.
ANSWER: D

131. ___________ involved in opening and reading messages delivered to a message store.
A. Decision support system.
B. Message store manipulation.
C. Electronic data interchange.
D. Simple messaging services.
ANSWER: B

132. ___________ includes APIs that let an application log on to the mail system and authenticate its users.
A. Mail object manipulation.
B. Authentication and security services.
C. Messaging API.
D. All the above.
ANSWER: B

133. Conferencing also known as _________ which is a native groupware technology.


A. electronic meeting.
B. electronic mail.
C. fax.
D. routing.
ANSWER: A

134. Client/server conferencing technology can be divided into ____ types.


A. 2.
B. 5.
C. 7.
D. 10.
ANSWER: A
135. __________ allows groups to interactively collaborate on a joint project using instantly refreshed document
replicas.
A. Realtime conference.
B. Runtime conference.
C. Anytime conference.
D. All the above.
ANSWER: B

136. ___________ are used to explode an object into many parts in workflow.
A. And-Splits.
B. Or-Splits.
C. Or-Joins.
D. And-Joins.
ANSWER: A

137. ________ are used to peel off a new parts from a group in workflow.
A. And-Splits.
B. Or-Splits.
C. Or-Joins.
D. And-Joins.
ANSWER: B

138. __________ are certain numbers to rejoin the group in workflow.


A. And-Splits.
B. Or-Splits.
C. Or-Joins.
D. And-Joins.
ANSWER: C

139. _______ are rendezvous points that are used to group together objects so that they move in a route as a group.
A. And-Splits.
B. Or-Splits.
C. Or-Joins.
D. And-Joins.
ANSWER: D

140. ____________ provides a simple main interface that deals with SMSSendMail and SMSSendDocuments.
A. Vendor independent messaging.
B. Messaging API.
C. Common mail calls.
D. All the above.
ANSWER: A

141. In which technology, data and business logic are encapsulated within objects, allowing them to be located
anywhere within a distributed systems?
A. Information management.
B. Distributed object.
C. Decision support systems.
D. File management.
ANSWER: B

142. Distributed objects are packaged as independent piece of code that can be accessed by remote clients via
__________.
A. Internet.
B. method invocation.
C. Intranet.
D. method calling.
ANSWER: B
143. Distributed objects are, by definition _________ because of the way they are packaged.
A. methods.
B. functions.
C. components.
D. objects.
ANSWER: C

144. _______ are the leading component standards for desktop.


A. CORBA.
B. Java.
C. Middleware.
D. OpenDOc.
ANSWER: D

145. _______ are the leading component standards for enterprise.


A. CORBA.
B. Java.
C. Middleware.
D. OpenDOc.
ANSWER: A

146. Which of the following interact with their clients and implement logic of the business objects?
A. Client objects.
B. Middle-tier server objects.
C. Server objects.
D. CORBA.
ANSWER: B

147. _________ interoperate using language-neutral, client/server interaction models.


A. Methods.
B. Functions.
C. Components.
D. Objects.
ANSWER: C

148. Which component deals with component creation, destruction and archival?
A. Security.
B. Licensing.
C. Versioning.
D. Life cycle management.
ANSWER: D

149. ________ component must be able to install itself and automatically register its factory with the operating system
or component registry.
A. Self-installing.
B. Security.
C. Licensing.
D. Versioning.
ANSWER: A

150. Middle-tier objects can communicate with each other via a _______.
A. server objects.
B. server ORB.
C. client objects.
D. functions.
ANSWER: B

Staff Name
Kavitha K .

You might also like