1. Which one of the following hides the location where in the network the file is stored?
Correct : A. transparent distributed file system
2. In a distributed file system, when a file’s physical storage location changes ___________
Correct : B. file name need not to be changed
3. In a distributed file system, _______ is mapping between logical and physical objects.
Correct : B. naming
4. In a distributed file system, a file is uniquely identified by ___________
Correct : C. the combination of host name and local name
5. There is no need to establish and terminate a connection through open and close operation in ___________
Correct : A. stateless file service
6. In distributed file system, file name does not reveal the file’s ___________
Correct : B. physical storage location
7. Which one of the following is a distributed file system?
Correct : D. all of the mentioned
8. What are the characteristics of mutual exclusion using centralized approach?
Correct : D. all of the mentioned
9. What are the advantages of token(with rings) passing approach?
i) One processor as coordinator which handles all requests
ii) No starvation if the ring is unidirectional
iii) There are many messages passed per section entered if few users want to get in section
iv) One processor as coordinator which handles all requests
v) Only one message/entry if everyone wants to get in
Correct : D. i, ii and iv
10. What are the characteristics of atomicity?
Correct : A. all operations associated are executed to completion or none are performed
11. What things are the transaction coordinator is responsible for?
Correct : D. all of the mentioned
12. Which of the following advantages follows the single coordinator approach?
Correct : D. all of the mentioned
13. Which of the following disadvantages follows the single coordinator approach?
Correct : A. bottleneck
14. What are the parts of a global unique identifier?
Correct : A. local unique timestamp
15. In distributed systems, a logical clock is associated with ______________
Correct : B. each process
16. If timestamps of two events are same, then the events are ____________
Correct : A. concurrent
17. If a process is executing in its critical section ____________
Correct : B. no other process can execute in its critical section
18. A process can enter into its critical section ____________
Correct : C. when it receives a reply message from all other processes in the system
19. For proper synchronization in distributed systems ____________
Correct : C. prevention from the deadlock & starvation is must
20. In the token passing approach of distributed systems, processes are organized in a ring structure ____________
Correct : A. logically
21. In distributed systems, what will the transaction coordinator do?
Correct : D. all of the mentioned
22. In case of failure, a new transaction coordinator can be elected by ____________
Correct : C. both bully and ring algorithm
23. In distributed systems, election algorithms assumes that ____________
Correct : A. a unique priority number is associated with each active process in system
24. According to the ring algorithm, links between processes are ____________
Correct : B. unidirectional
25. What are the different ways distributed may suffer?
Correct : D. all of the mentioned
26. What are design issues in distributed system structure?
Correct : D. all of the mentioned
27. What is not true about a distributed system?
Correct : B. all processors are synchronized
28. What are the characteristics of processor in distributed system?
Correct : A. they vary in size and function
29. ______ is a unique tag, usually a number identifies the file within the file system.
Correct : A. file identifier
30. To create a file ____________
Correct : C. allocate the space in file system & make an entry for new file in directory
31. By using the specific system call, we can ____________
Correct : D. all of the mentioned
32. What is the mounting of file system?
Correct : C. attaching portion of the file system into a directory structure
33. Mapping of file is managed by ____________
Correct : A. file metadata
34. Mapping of network file system protocol to local file system is done by ____________
Correct : A. network file system
35. Which one of the following explains the sequential file access method?
Correct : B. read bytes one at a time, in order
36. Which of the following are the two parts of the file name?
Correct : C. extension & name
37. What is the mount point?
Correct : A. an empty directory at which the mounted file system will be attached
38. When a file system is mounted over a directory that is not empty then _____________
Correct : C. the system may allow the mount and the directory’s existing files will then be made obscure
39. In distributed file system ________________ directories are visible from the local machine.
Correct : D. remote
40. In the world wide web, a ____ is needed to gain access to the remote files, and separate operations are used to transfer files.
Correct : C. browser
41. Distributed naming services/Distributed information systems have been devised to _____________
Correct : B. provide unified access to the information needed for remote computing
42. Domain name system provides _____________
Correct : A. host-name-to-network-address translations for the entire internet
43. What is multimedia file?
Correct : B. must be accessed at specific rate
44. In which type of streaming multimedia file is delivered to the client, but not shared?
Correct : A. real-time streaming
45. Which one of the following is the characteristic of a multimedia system?
Correct : C. both high storage and high data rates
46. The delay that occur during the playback of a stream is called ___________
Correct : C. jitter
47. Multimedia system require hard real time scheduling ___________
Correct : A. to ensure critical tasks will be serviced within timing deadlines
48. The three general methods for delivering content from a server to a client across a network are ___________
Correct : D. all of the mentioned
49. Unicasting delivers the content to ___________
Correct : A. a single client
50. Broadcasting delivers the content to ___________
Correct : B. all clients, regardless whether they want the content or not
51. Multicasting delivers the content to ___________
Correct : C. a group of receivers who indicate they wish to receive the content
52. HTTP is __________
Correct : D. a stateless protocol that does not maintain the status of its connection with the client
53. The problem with unicast delivery is that the ___________
Correct : B. server must establish a separate unicast session for each client
54. The difficulty with multicasting from a practical point of view is ___________
Correct : C. the routers must support multicasting
55. To let a client have random access to a media stream with ___________
Correct : A. the protocol used must not be stateless
56. An RPC (remote procedure call) is initiated by the:
Correct : B. client
57. RPC works between two processes. These processes may be:
Correct : C. both (a) and (b)
58. _____is a framework for distributed objects on the Microsoft platform.
Correct : B. DCOM
59. ___ is a framework for distributed components using a messaging paradigm.