300 Top Distributed Computing System Mcqs and Answers Dcs Quiz
300 Top Distributed Computing System Mcqs and Answers Dcs Quiz
HOME Interview Questions MCQs Class Notes *LAB VIVA SEMINAR TOPICS ONLINE TEST GATE CAT Internship ABOUT US
B. false
Answer: A.true
B. firmware
C. package
D. system software
Answer: A.middleware
C. uniprocessorsystem,multicomputer system
B. system grid
C. process grid
D. channel grid
B. system collaboration
C. system failure
D. system security
B. http
C. ftp
D. rpc
Answer: A.telnet
10. The header usually consists of the following elements in IPC I. Sequence number II. Structural
information III. Address IV. File mode(Read/ Write)
A. i,iii, iv
B. i,ii, iii
C. i, ii, iv
D. i,iv
B. reference
D. object
Answer: A.value
12. What are the exceptions which have to be handled in a RMI client program?
A. malformedurlexception
B. notfoundexception
C. arithmeticexception
D. class•not•found•excepti on
Answer: A.malformedurlexception
B. transport
C. physical
D. session
Answer: B.transport
14. The local operating system on the server machine passes the incoming packets to the
A. server stub
B. client stub
D. binding agent
15. Machine that places the request to access the data is generally called as.
A. server machine
B. client machine
C. request machine
D. database server
16. provides programmers a familiar programming model by extending the local procedure call to a
distributed environment
A. distributed environment
17. An architecture where clients first communicate the server for data then format and display it to the
users, is known as
A. client/server architecture
B. three-tier architecture
C. two-tier architecture
D. peer-to-peer architecture
B. stub
C. remote
D. server
Answer: B.stub
19. Message passing provides a mechanism to allow processes to communicate and to synchronize their
actions
A. by sharing the same address space
B. stub/skeleton layer
C. transport layer
D. networking layer
Answer: A.rrl
C. optical serviceimplementation
22. Which address is used to identify a processon a host by the transport layer?
A. physical address
B. logical address
C. port address
D. specific address
24. If processes p and q both receive messages m and m’, then p receives m before m’ if and only if q receives
m before m’.The order delivery is called
A. absolute ordering
B. consistent ordering
C. causal ordering
D. fifo ordering
B. processes that are not members (clients) can send message to the group.
D. processes that are not members (clients) but close to the group can send message to the group.
26. all related objects moved and left to a server upon the first RPC
A. call by value
B. call by move
C. call by visit
D. call by reference
28. is a process that prevents multiple threads or processes from accessing shared resources at the same
time.
A. critical section
B. deadlock
C. message passing
D. mutual exclusion
B. christian’s method
C. lamport’s method
D. ricart-agrawala algorithm
30. Which mutual exclusion algorithm is useful when the membership of the group is unknown?
A. centralized
B. lamport’s.
C. token ring
D. decentralized algorithm
Answer: A.centralized
B. (3,8,4)
C. (1,7,3)
D. (4,8,2)
Answer: D.(4,8,2)
32. A client gets a timestamp of 4:12:30.500 from a time server. The elapsed time between the request and response was 20
msec (0.020 sec). The current time on the client is 4:12:30.510. Using Cristian’s algorithm, what is the time set to on the client?
A. 1970-01-01 04:12:30
B. 1970-01-01 04:12:30
C. 1970-01-01 04:12:32
D. 1970-01-01 04:12:32
B. session
C. transport
D. physical
Answer: A.application
B. bully algorithm.
C. cristian’s algorithm
D. lamport’s
35. For each critical section (CS) execution, Ricart-Agrawala algorithm requires messages per CS execution and the
Synchronization delay in the algorithm is .
A. 3(n − 1), t
B. 2(n − 1), t
C. (n − 1), 2t
D. (n − 1), t
36. For each critical section (CS) execution, maekawa’s algorithm requires messages per CS execution and the Synchronization
delay in the algorithm is .
A. √n , t
B. 2√n , t
C. 3√n , t
D. 3√n , 2t
Answer: D.3√n , 2t
C. centralized basedalgorithm
C. centralized basedalgorithm
D. network timestampprotocol
40. Which algorithm requires <1 to ∞= messages to enter and leave a critical region?
A. token ring algorithm
B. centralized algorithm
C. decentralized algorithm
D. distributed algorithm
B. pre copying
C. prefiltering
D. post copying
Answer: B.precopying
B. yield()
C. destroy()
D. start()
Answer: D.start()
B. processor
C. cd
D. processes
Answer: B.processor
B. larger overhead
C. worst stability
D. better stability
D. ftp is used
B. casual consistency
C. strict consistency
D. weak consistency
B. same order
C. sequential order
D. specific order
52. In which of the following consistency model all writes become perceptible to all processes
A. strict
B. weak
C. casual
D. sequential
Answer: A.strict
53. consistency is that write operations by the same process are performed in the correct order everywhere.
A. weak
B. strict
C. eventual
D. fifo
Answer: D.fifo
54. Any successive write operation by a process on a data item x will be performed on a copy of x that is up to date with the
value most recently read by that process.
A. monotonic-write
D. monotonic-read
B. server initiated
C. permanent
D. dynamic
56. In receivers never acknowledge the successful delivery of multicast message but instead report onlywhen missing the
message.
A. basic reliable multicasting
D. atomic multicast
B. three-phase commit
C. two-phase commit
D. virtual synchrony
B. checking points
C. dependencies
D. erroneous state
Answer: C.dependencies
59. Processor Consistency model guarantees and conforms that
A. all write accomplished on identical memory location in identical sequence.
C. last time
D. previous time
C. schedule processmigration
D. resource sharing
B. increase cost
C. increase reliability
D. increase data
B. create()
C. develope()
D. null()
Answer: B.create()
65. which command is used to create adirectory
A. rmdir
B. symlink
C. mkdir
D. open
Answer: C.mkdir
66. datanodes and namenode are two elementsof which file system?
A. afs
B. hdfs
C. nfs
Answer: B.hdfs
67. In which file system mapreduce function isused?
A. afs
B. nfs
C. hdfs
Answer: C.hdfs
68. In distributed file system, DNS stands for?
A. domain name system
B. corba
C. rmi
Answer: A.rpc
70. map and reduce are
A. libraries
B. functions
C. file system
D. os
Answer: B.functions
71. In HDFS file System, A serves as the master and there is only oneNameNode per cluster
A. data node
B. namenode
C. replication
D. data block
Answer: B.namenode
72. HDFS works in a fashion.
A. master-master
B. master-slave
C. slave-slave
Answer: B.master-slave
73. In HDFS file System, NameNode is used when the PrimaryNameNode goes down.
A. rack
B. data
C. secondary
D. primary
Answer: C.secondary
74. In context of HDFS file system, Point out the wrong statement.
A. replication factor can be configured at a cluster level (default is set to 3) and also at afile level
B. block report from each datanode contains a list of all the blocks that are storedon that datanode
Answer: D.datanode is aware of the files to which the blocks stored on it belong to
75. In HDFS, . is the slave/workernode and holds the user data in the form of Data Blocks.
A. datanode
B. namenode
C. data block
D. replication
Answer: A.datanode
B. portable
C. robust
D. scalability
Answer: D.scalability
78. Storing file in makes itpermanently available
A. secondary memory
B. ram
C. register
D. dram
B. complete file
C. one byte
D. one block
B. oracle
C. apple
D. honeywell
B. rex file
C. immutable file
D. robust file
B. sockets
C. ports
D. service names
Answer: C.ports
84. RPC provides a(an) _____ on the client side, a separate one for each remote procedure.
A. stub
B. identifier
C. name
D. process identifier
Answer: A.stub
85. What is stub?
A. transmits the message to the server where the server side stub receives the message and invokes procedure on the server side
B. computation speedup
C. reliability
D. simplicity
Answer: D.simplicity
93. What is a stateless file server?
A. it keeps tracks of states of different objects
B. decreases performance
D. improves speed
B. mutex file
C. mutable file
B. servers
C. storage devices
B. migration
C. client interface
D. remote access
Answer: B.migration
101. Which one of the following hides the location where in the network the file is stored?
A. transparent distributed file system
B. naming
C. migration
D. heterogeneity
Answer: B.naming
104. In a distributed file system, a file is uniquely identified by ___________
A. host name
B. local name
C. novel network
B. ii and iii
C. i, ii and iii
D. i, ii and iv
C. when responses are received from all processes, then the process can enter its critical section
Answer: A.all operations associated are executed to completion or none are performed
111. What things are the transaction coordinator is responsible for?
A. starting the execution of the transaction
C. bottleneck
B. slow response
C. deadlock
Answer: A.bottleneck
114. What are the parts of a global unique identifier?
A. local unique timestamp
B. remote timestamp
C. clock number
B. each process
C. each register
B. non-concurrent
C. monotonic
D. non-monotonic
Answer: A.concurrent
117. If a process is executing in its critical section ____________
A. any other process can also execute in its critical section
C. when it receives a reply message from all other processes in the system
Answer: C.when it receives a reply message from all other processes in the system
119. For proper synchronization in distributed systems ____________
A. prevention from the deadlock is must
B. physically
Answer: A.logically
B. ring algorithm
Answer: A.a unique priority number is associated with each active process in system
124. According to the ring algorithm, links between processes are ____________
A. bidirectional
B. unidirectional
Answer: B.unidirectional
125. What are the different ways distributed may suffer?
A. failure of a link
B. failure of a site
C. loss of message
B. fault-tolerance
C. clustering
B. file name
C. file type
C. allocate the space in file system & make an entry for new file in directory
Answer: C.allocate the space in file system & make an entry for new file in directory
131. By using the specific system call, we can ____________
A. open the file
B. deleting a filesystem
B. page table
C. virtual memory
D. file system
C. volume manager
D. remote mirror
Answer: A.an empty directory at which the mounted file system will be attached
138. When a file system is mounted over a directory that is not empty then _____________
A. the system may not allow the mount
C. the system may allow the mount and the directory’s existing files will then be made obscure
Answer: C.the system may allow the mount and the directory’s existing files will then be made obscure
139. In distributed file system ________________ directories are visible from the local machine.
A. protected
B. local
C. private
D. remote
Answer: D.remote
140. In the world wide web, a ____ is needed to gain access to the remote files, and separate operations are used to transfer
files.
A. laptop
B. plugin
C. browser
D. player
Answer: C.browser
141. Distributed naming services/Distributed information systems have been devised to _____________
A. provide information about all the systems
Answer: B.provide unified access to the information needed for remote computing
142. Domain name system provides _____________
A. host-name-to-network-address translations for the entire internet
B. progressive download
C. compression
B. playback delay
C. jitter
D. event delay
Answer: C.jitter
147. Multimedia system require hard real time scheduling ___________
A. to ensure critical tasks will be serviced within timing deadlines
D. for security
Answer: A.to ensure critical tasks will be serviced within timing deadlines
148. The three general methods for delivering content from a server to a client across a network are ___________
A. unicasting
B. multicasting
C. broadcasting
Answer: B.all clients, regardless whether they want the content or not
Answer: C.a group of receivers who indicate they wish to receive the content
152. HTTP is __________
A. a stateful protocol
B. a stateless protocol
C. a protocol that maintains the status of its connection with the client
D. a stateless protocol that does not maintain the status of its connection with the client
Answer: D.a stateless protocol that does not maintain the status of its connection with the client
153. The problem with unicast delivery is that the ___________
A. memory allocation is difficult
Answer: B.server must establish a separate unicast session for each client
154. The difficulty with multicasting from a practical point of view is ___________
A. memory allocation is difficult
B. client
Answer: B.client
157. RPC works between two processes. These processes may be:
A. on the same computer
B. DCOM
C. DDObjects
D. none
Answer: B.DCOM
159. ___ is a framework for distributed components using a messaging paradigm.
A. CORBA
B. DCOM
C. DDObjects
D. Jt
Answer: D.Jt
Distributed Computing System objective questions with answers pdf download online exam test
---- >> Below Are The Related Posts Of Above Questions :::
------>>[MOST IMPORTANT]<<------
LEAVE A REPLY
Your email address will not be published. Required fields are marked *
Comment *
Name *
Email *
Website
Post Comment
Engineering 2022 , FAQs Interview Questions , Theme by Engineering|| Privacy Policy|| Terms and Conditions|| ABOUT US|| Contact US||
Engineering interview questions,Mcqs,Objective Questions,Class Lecture Notes,Seminor topics,Lab Viva Pdf PPT Doc Book free download. Most Asked Technical Basic CIVIL |
Mechanical | CSE | EEE | ECE | IT | Chemical | Medical MBBS Jobs Online Quiz Tests for Freshers Experienced .