Distributed Computing System Quiz Questions

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

Distributed Computing System Quiz Questions

1. Message passing provides a mechanism to allow processes to communicate and to


synchronize their actions___________

1. without sharing the same address space


2. by sharing the same address space
3. by sharing port number
4. by sharing the same process number and process identifier

Answer: by sharing the same address space

2. Which address is used to identify a process on a host by the transport layer?

1. logical address
2. physical address
3. specific address
4. port address

Answer: port address

3. ____________is an object acting as a gateway for the client side.

1. stub
2. skeleton
3. server
4. remote

Answer: stub

4.OSI stands for ________

1. open service internet


2. operating system interface
3. optical service implementation
4. open system interconnection

Answer: open system interconnection

5. In all reliable multicast group communication_______________

1. response from any of the receiver required


2. response from \m\(1<m<n) of the \n\receiver required
3. n\ response expected from the receiver
4. response needed from all the receivers

Answer: response needed from all the receivers

6. Which of the following allocates/deallocates buffers?


1. stub/skeleton layer
2. transport layer
3. rrl
4. networking layer

Answer: rrl

7. An architecture where clients first communicate the server for data then format and
display it to the users, is known as____________

1. three-tier architecture
2. two-tier architecture
3. client/server architecture
4. peer-to-peer architecture

Answer: client/server architecture

8. If processes p and q both receive messages m and m', then p receives m before m' if
and only if q receives m before m'.The order delivery is called

1. consistent ordering
2. absolute ordering
3. causal ordering
4. fifo ordering

Answer: consistent ordering

9. What is the feature of stateful server?

1. quick recovery after reboot


2. file operations must be idempotent
3. longer server recovery time
4. simple server design

Answer: longer server recovery time

10. File Replication is done to_______________

1. increase cost
2. increase complexity
3. increase reliability
4. increase data

Answer: increase reliability

11. Pre transferring also known as_________________

1. premigrating
2. prefiltering
3. postcopying
4. precopying

Answer: precopying

12. To improve performance, many distributed systems___________

1. combine check pointing with message logging


2. combine check pointing with recovery oriented computing
3. All of above
4. None of above

Answer: combine check pointing with message logging

13. Which algorithm requires "1 to ∞" messages to enter and leave a critical region?

1. centralized algorithm
2. decentralized algorithm
3. token ring algorithm
4. distributed algorithm

Answer: token ring algorithm

14. The dynamic replication algorithm takes into account________________

1. files on server can be migrated anywhere


2. schedule process migration
3. to reduce load on server
4. resource sharing

Answer: to reduce load on server

15. Machine that places the request to access the data is generally called
as______________

1. client machine
2. server machine
3. database server
4. request machine

Answer: client machine

16. Which of the following is an example of election algorithm.

1. bully algorithm
2. cristian’s algorithm
3. berkley algorithm
4. lamport’s

Answer: bully algorithm


17. Full form of NTP is_____________

1. network time protocol


2. new timestamp protocol
3. new time protocol
4. network time stamp protocol

Answer: network time protocol

18. This is not feature of cooperative algorithm_____________

1. larger overhead
2. complex
3. worst stability
4. better stability

Answer: worst stability

19. The local operating system on the server machine passes the incoming packets to
the______________

1. server stub
2. binding agent
3. client operating system
4. client stub

Answer: server stub

20. NTP is_________ layer protocol.

1. session
2. application
3. physical
4. transport

Answer: application

21. Transient communication done by layer______________

1. transport
2. network
3. session
4. physical

Answer: transport

22. Which mutual exclusion algorithm is useful when the membership of the group is
unknown?

1. lamport’s.
2. centralized
3. decentralized algorithm
4. token ring

Answer: centralized

23. Distributed system consists of set of resource____________

1. printer
2. cd
3. processor
4. processes

Answer: processor

24. What are the characteristics of data migration?

1. execute an entire process or parts of it at different sites


2. transfer the computation rather than the data
3. transfer data by entire file or immediate portion required
4. execute an entire process or parts of it at same site

Answer: transfer data by entire file or immediate portion required

25. A “glue” between client and server parts of application____________

1. firmware
2. middleware
3. package
4. system software

Answer: middleware

26. Absolute time synchronization can be achieved using______________

1. christian’s method
2. vector time stamping method
3. ricart-agrawala algorithm
4. lamport’s method

Answer: christian’s method

27. What are the characteristics of computation migration?

1. transfer the computation rather than the data


2. transfer data by entire file or immediate portion required
3. execute an entire process or parts of it at different sites
4. execute an entire process or parts of it at same site

Answer: transfer the computation rather than the data


28. In Casual consistency model all processes hared accesses in____________

1. sequential order
2. same order
3. random order
4. specific order

Answer: same order

29. ______consistency is that write operations by the same process are performed in the
correct order everywhere.

1. strict
2. weak
3. fifo
4. eventual

Answer: fifo

30. In which of the following consistency model all writes become perceptible to all
processes___________

1. weak
2. strict
3. sequential
4. casual

Answer: strict

31. In RMI, the objects are passed by_____________

1. reference
2. value
3. All of above
4. Object

Answer: value

32. _________is a process that prevents multiple threads or processes from accessing
shared resources at the same time.

1. critical section
2. message passing
3. deadlock
4. mutual exclusion

Answer: mutual exclusion

33. Any successive write operation by a process on a data item x will be performed on a
copy of x that is up to date with the value most recently read by that process.
1. writes follows reads
2. monotonic-write
3. monotonic-read
4. read your writes

Answer: writes follows reads

34. The hardware of DS has two types____________

1. multiprocessor system, unicomputer system


2. uniprocessor system, multicomputer system
3. multiprocessor system, multicomputer system
4. uniprocessor system, unicomputer system

Answer: multiprocessor system ,multicomputer system

35. Replicas are used only to improve access time on data _________________

1. server initiated
2. client initiated
3. permanent
4. dynamic

Answer: client initiated

36. In __________ receivers never acknowledge the successful delivery of multicast


message but instead report only when missing the message.

1. non-hierarchical feedback control


2. hierarchical feedback control
3. basic reliable multicasting
4. atomic multicast

Answer: non-hierarchical feedback control

37. Process Fail - Stop in process omission faults_____________

1. can be detected in asynchronous system.


2. can be detected in synchronous system.
3. can be detected in standalone system.
4. can be detected in synchronous and asynchronous system.

Answer: can be detected in synchronous system.

38. Scaling transparency hides______________

1. system collaboration
2. system failure
3. system security
4. system expansion
Answer: system expansion

39. Staleness deviations relate to the a replica was updated________

1. most recent time


2. first time
3. previous time
4. last time

Answer: last time

40. A problem with the ____________ protocol is that when the coordinator has
crashed, participants may not be able to reach afinal decision

1. three-phase commit
2. one-phase commit
3. two-phase commit
4. virtual synchrony

Answer: two-phase commit

41. Type of grid computing is_______________

1. process grid
2. system grid
3. collaborative grid
4. channel grid

Answer: collaborative grid

42. Distributed pervasive system is also known as__________

1. user interface design


2. graphical user interface
3. ubiquitous computing
4. peer to peer system

Answer: ubiquitous computing

43. Optimistic logging protocols need to keep track of___________

1. checking points
2. independencies
3. erroneous state
4. dependencies

Answer: dependencies

44. Processor Consistency model guarantees and conforms that________________


1. all write accomplished on random memory location in random sequence
2. all write accomplished on identical memory location in identical sequence.
3. All of above
4. None of above

Answer: all write accomplished on identical memory location in identical sequence.

45. Type of cluster computing is_______________

1. load sharing cluster


2. load replication cluster
3. load balancing cluster
4. load holding cluster

Answer: load balancing cluster

You might also like