Quiznetik

Distributed Computing System (DCS) | Set 2

1. Which one of the following hides the location where in the network the file is stored?

Correct : A. transparent distributed file system

2. In a distributed file system, when a file’s physical storage location changes ___________

Correct : B. file name need not to be changed

3. In a distributed file system, _______ is mapping between logical and physical objects.

Correct : B. naming

4. In a distributed file system, a file is uniquely identified by ___________

Correct : C. the combination of host name and local name

5. There is no need to establish and terminate a connection through open and close operation in ___________

Correct : A. stateless file service

6. In distributed file system, file name does not reveal the file’s ___________

Correct : B. physical storage location

7. Which one of the following is a distributed file system?

Correct : D. all of the mentioned

8. What are the characteristics of mutual exclusion using centralized approach?

Correct : D. all of the mentioned

9. What are the advantages of token(with rings) passing approach? i) One processor as coordinator which handles all requests ii) No starvation if the ring is unidirectional iii) There are many messages passed per section entered if few users want to get in section iv) One processor as coordinator which handles all requests v) Only one message/entry if everyone wants to get in

Correct : D. i, ii and iv

10. What are the characteristics of atomicity?

Correct : A. all operations associated are executed to completion or none are performed

11. What things are the transaction coordinator is responsible for?

Correct : D. all of the mentioned

12. Which of the following advantages follows the single coordinator approach?

Correct : D. all of the mentioned

13. Which of the following disadvantages follows the single coordinator approach?

Correct : A. bottleneck

14. What are the parts of a global unique identifier?

Correct : A. local unique timestamp

15. In distributed systems, a logical clock is associated with ______________

Correct : B. each process

16. If timestamps of two events are same, then the events are ____________

Correct : A. concurrent

17. If a process is executing in its critical section ____________

Correct : B. no other process can execute in its critical section

18. A process can enter into its critical section ____________

Correct : C. when it receives a reply message from all other processes in the system

19. For proper synchronization in distributed systems ____________

Correct : C. prevention from the deadlock & starvation is must

20. In the token passing approach of distributed systems, processes are organized in a ring structure ____________

Correct : A. logically

21. In distributed systems, what will the transaction coordinator do?

Correct : D. all of the mentioned

22. In case of failure, a new transaction coordinator can be elected by ____________

Correct : C. both bully and ring algorithm

23. In distributed systems, election algorithms assumes that ____________

Correct : A. a unique priority number is associated with each active process in system

24. According to the ring algorithm, links between processes are ____________

Correct : B. unidirectional

25. What are the different ways distributed may suffer?

Correct : D. all of the mentioned

26. What are design issues in distributed system structure?

Correct : D. all of the mentioned

27. What is not true about a distributed system?

Correct : B. all processors are synchronized

28. What are the characteristics of processor in distributed system?

Correct : A. they vary in size and function

29. ______ is a unique tag, usually a number identifies the file within the file system.

Correct : A. file identifier

30. To create a file ____________

Correct : C. allocate the space in file system & make an entry for new file in directory

31. By using the specific system call, we can ____________

Correct : D. all of the mentioned

32. What is the mounting of file system?

Correct : C. attaching portion of the file system into a directory structure

33. Mapping of file is managed by ____________

Correct : A. file metadata

34. Mapping of network file system protocol to local file system is done by ____________

Correct : A. network file system

35. Which one of the following explains the sequential file access method?

Correct : B. read bytes one at a time, in order

36. Which of the following are the two parts of the file name?

Correct : C. extension & name

37. What is the mount point?

Correct : A. an empty directory at which the mounted file system will be attached

38. When a file system is mounted over a directory that is not empty then _____________

Correct : C. the system may allow the mount and the directory’s existing files will then be made obscure

39. In distributed file system ________________ directories are visible from the local machine.

Correct : D. remote

40. In the world wide web, a ____ is needed to gain access to the remote files, and separate operations are used to transfer files.

Correct : C. browser

41. Distributed naming services/Distributed information systems have been devised to _____________

Correct : B. provide unified access to the information needed for remote computing

42. Domain name system provides _____________

Correct : A. host-name-to-network-address translations for the entire internet

43. What is multimedia file?

Correct : B. must be accessed at specific rate

44. In which type of streaming multimedia file is delivered to the client, but not shared?

Correct : A. real-time streaming

45. Which one of the following is the characteristic of a multimedia system?

Correct : C. both high storage and high data rates

46. The delay that occur during the playback of a stream is called ___________

Correct : C. jitter

47. Multimedia system require hard real time scheduling ___________

Correct : A. to ensure critical tasks will be serviced within timing deadlines

48. The three general methods for delivering content from a server to a client across a network are ___________

Correct : D. all of the mentioned

49. Unicasting delivers the content to ___________

Correct : A. a single client

50. Broadcasting delivers the content to ___________

Correct : B. all clients, regardless whether they want the content or not

51. Multicasting delivers the content to ___________

Correct : C. a group of receivers who indicate they wish to receive the content

52. HTTP is __________

Correct : D. a stateless protocol that does not maintain the status of its connection with the client

53. The problem with unicast delivery is that the ___________

Correct : B. server must establish a separate unicast session for each client

54. The difficulty with multicasting from a practical point of view is ___________

Correct : C. the routers must support multicasting

55. To let a client have random access to a media stream with ___________

Correct : A. the protocol used must not be stateless

56. An RPC (remote procedure call) is initiated by the:

Correct : B. client

57. RPC works between two processes. These processes may be:

Correct : C. both (a) and (b)

58. _____is a framework for distributed objects on the Microsoft platform.

Correct : B. DCOM

59. ___ is a framework for distributed components using a messaging paradigm.

Correct : D. Jt