distributed system mcq bank

Ranjit******

Distributed System – MCQs
1. Winnt.exe shall be used for 
a. 16-bit
b. 32-bit 
c. 8-bit 
d. None 
2. KDC stands for 
a. Key distributor company 
b. Key distributor centre
c. Both 
d. None 
3. Active directory services is a storehouse of information about various type of ________. 
a. Network function 
b. Network object
c. Network protocols 
d. None 
4. DFC stands for 
a. Distributed file system
b. Defragment file system 
c. Both 
d. None
5. Which events are represented as possible loss data or function. 
a. Errors
b. Warning 
c. Both 
d. None 
6. Which events are represent logged by applications or programs. 
a. Application log
b. System log 
c. Security log 
d. None 
7. IP sell stands for 
a. Internet protocols security
b. Internet protocols section 
c. Both 
d. None 
8. IP sell is a set of 
a. Internet standards
b. Internet protocols 
c. Collection of Internet protocols 
d. None 
9. RADIUS means 
a. Remote authentication dial-in user service. b. Radius distribution services 
c. Both d. None
10. RADIUS used for 
a. Centralized management of user authentication 
b. Authorized for remote access servers 
c. Both
d. None 
11. API stand for 
a. Application programming interface
b. Application project interface 
c. Both 
d. None 
12. NTFS is work on. 
a. 16-bit 
b. 32-bit 
c. 64-bit
d. None 
13. Network means-
a. Communication between two computer 
b. Communication between two device 
c. Both
d. None 
14. Windows 2000 professional is worked on 
a. 16 bit 
b. 32 bit
c. 64 bit 
d. None 
15. CPU stand for 
a. Central process unit
b. Central program unit 
c. Both 
d. None 
16. DFS stand for 
a. Distributed files systems
b. Distributed files software 
c. Both 
d. None 
17. TCP stand for-
a. Transmission control protocols
b. Tran formation control protocols 
c. Both 
d. None 
18. TCP stands for 
a. Transmission control protocols
b. Tran formation control protocols 
c. Both 
d. None
19. CPU stand for…………… It is one of the parts of…………
Central process unit, PC
20. DFS stand for-
a. Distributed files systems
b. Distributed files software 
c. Both 
d. None 
21. Example of network 
a. Water pipelines 
b. Communication of two or more than two computers 
c. Both
d. None 
22. Minimum hardware requirement of RADIUS. 
a. CPU-Pentium II 133 MHZ 
b. 64 MB Ram 
c. 128 MB Ram 
d. A and C both
23. Administrator is a person who administrates 
a. Network resources 
b. Groups 4 user accounts 
c. Both
d. None 
24. Within the network we can have a number of computers sharing resources maintained by independent 
administrators, called as 
a. User 
b. Workgroup
c. Both 
d. None 
25. _____ is a record that consists of all the information that defines a user in windows 2000. 
a. User account
b. Group account 
c. Both 
d. None 
26. People who don’t have an actual on the computer. They can use
a. Any account which is present in computer 
b. Guest account
c. Both 
d. None 
27. Which group have all rights in computer 
a. Administrator
b. Power user 
c. Both 
d. None
28. Which member of the group has the backup right. 
a. Administrator 
b. Back up user 
c. Both
d. None 
29. Which group only replicate the data. 
a. Replicator
b. Power user 
c. Both 
d. None 
30. % tan % is used for 
a. It is an identification internet temp folder
b. Identification of any file 
c. Both 
d. None 
31. NTFS is work on. 
a. 16-bit 
b. 32-bit 
c. 64-bit
d. None 
32. System and application logs recognize. 
a. Errors 
b. Warning 
c. Information 
d. All
33. Which events are represented as possible loss data or function. 
a. Errors
b. Warning 
c. Both 
d. None 
34. Which events are represent logged by applications or programs. 
a. Application log
b. System log 
c. Security log 
d. None 
35. RPC stands for 
a. Remote procedure call
b. Remote printer call 
c. Both 
d. None 
36. EMF stands for 
a. Enhanced meta file
b. Enhanced member function 
c. Both 
d. None
37. GDI stands for 
a. Graphics device interface
b. Graphics device interaction 
c. Both 
d. None 
38. Raw are 
a. Ready to print
b. Read and write 
c. Both 
d. None 
39. Printer properties are 
a. General 
b. Sharing 
c. Port 
d. Security
40. To install the modem configuration the following 
a. Install the modem hardware
b. Install the modem software 
c. Configure the installed modem 
d. All of the above 
41. Power options are used for 
a. Reduce the power consumption
b. On and off the power option 
c. Both 
d. None 
42. In regional options common task used for 
a. Change your locale 
b. Add an input locale and keyboard layout 
c. Both
d. None 
43. Device manager is an 
a. Administrative tool 
b. Management tool 
c. Both
d. None 
44. Virtual memory is used for 
a. Temporary storage used by computer
b. Temporary storage used by Ram 
c. Both 
d. None 
45. Registry size up to 
a. 80% size of the page pool b. 70% size of the page pool 
c. Both d. None
46. Windows 2000 provides how many types and disk storage. 
a. 12 types 
b. 2 type
c. 4 type 
d. None 
47. Windows 2000 disk storage type area. 
Basic storage 
b. Dynamic storage 
c. Both
d. None 
48. RAID-5 volume is a 
a. Fault-tolerant volume
b. Not a fault-tolerant volume 
c. Both 
d. None 
49. RAID-5 volume created only 
a. Dynamic and simple volume 
b. Dynamic volume
c. Both 
d. None 
50. To create a RAID-5 volume we need 
a. 2 hard disk 
b. 3 and more hard disk
c. Only 3 hard disk 
d. None 
51. To create a mirrored volume we need at least 
a. 2 hard disk
b. 3 hard disk 
c. 1 hard disk 
d. None 
52. Terminal services are used for 
a. Remote access to server desktop
b. Remote access to printer 
c. Both 
d. None 
53. BDC stands for 
a. Backup domain controllers
b. Basic domain controllers 
c. Both 
d. None 
54. Member server can act as 
a. File server 
b. Print server 
c. Web server 
d. All of the above
55. Member server can act as 
a. Routing and remote access server 
b. The application server, which includes 
i. Component server 
ii. Terminal server 
iii. E-mail server 
c. Both a and b
d. None 
56. HCC stands for 
a. Hardware compatibility list
b. Hardware component list 
c. Both 
d. None 
57. ________ can be used to save the hard disk partition table to a floppy disk. 
a. Window.exe 
b. Windisk.exe
c. Both 
d. None 
58. LPD stands for 
a. Line printer domain
b. Local printer domain 
c. Both 
d. None 
59. IIS stands for 
a. Internet information service
b. Internet interchange service 
c. Both 
d. None 
60. MMC stand for 
a. Microsoft management console
b. Manager management console 
c. Both 
d. None 
61. GUI stands for 
a. Graphical user interface
b. Graphical user interaction 
c. Both 
d. None 
62. SIDS stand for 
a. Security identifiers
b. Service identifiers 
c. Both 
d. None
63. Ram stands for 
a. Read-only memory
b. Readable optional memory 
c. Both 
d. None 
64. A domain trust relationship is characterized by whether it is 
a. One-way 
b. Two-way 
c. Transitive 
d. All of the above
65. MCIS stands for 
a. Transport layer security protocols
b. Transport layer services protocols 
c. Both 
d. None 
66. TLS stands for 
a. Transport layer security protocols
b. Transport layer services protocols 
c. Both 
d. None 
67. Default option to store active directory 
a. C:\winnt\NTDS
b. C:\windows\NTDS 
c. C:\winnt\system32\NTDS 
d. None 
68. Net bios is the name of ________. 
a. Domain
b. System 
c. Both 
d. None 
69. Location for the system folder. 
a. C:\winnt\system
b. C:\winnt\system32\system 
c. Both 
d. None 
70. In MMC have the option. 
a. Console, windows, help
b. Console, windows, edit, help 
c. Console, edit, windows, help 
d. None 

Ranjit2***

 1. what is not true about a distributed system?
A) It is a collection of processor
B) They do not share memory
C) They do not share memory
D) None of the mentioned
Answer: B
2. what are the characteristics of processor in distributed system?
A) They vary in size and function
B) They are same in size and function
C) They are manufactured with single purpose
D) They are real-time device
Answer: A
3. What are the characteristics of a distributed file system?
A) Its users ,servers and storage devices are dispersed
B) Service activity is not carried out across the network
C) They have single centralized data repository
D) They are multiple dependent storage device
Answer: A
4. What is not a major reason for building distributed systems?
A) Resource sharing
B) Computation speedup
C) Reliability
D) Simplicity
Answer: D
5. What are the types of distributed operating system?
A) Network operating system
B) Zone based operating system
C) Level based operating system
D) All of the mentioned
Answer: A
6. What are characteristics of network operating system?
A) Users are aware of multiplicity of machines
B) They are transparent
C) They are simple to use
D) All the mentioned
Answer: A
7. how is access to resources of various machines is done ?
A) remote logging using ssh or telnet 
B) ,zone are configured for automatic access 
C) ,ftp is not used
D) All of the mentioned
Answer: A
8. what are the characteristics of distributed operating system?
A) users are awer of multiplicity of machines 
B) access is the done link local resources
C) user are aware of multiplicity of machine 
D) they have multiple zones to access files 
Answer: B
9. What are the characteristics of data migration ? 
 A) transfer data by entire file or immediate portion required 
B) transfer the computation rather than the data
C) execute an entire process are parts of it at different sites
D) None of the mentioned
10. What are the characteristics of process migration?
A) transfer data by entire file or immediate operation required 
B) transfer the computation rather than the data
C) execute an entire process or parts of it at different sites
D) None of the mentioned
Answer: C
11. In distributed system ,each processor has its own…………
A) Local memory
B) Clock
C) Both local memory and clock
D) None of the mentioned
Answer: C
12. If one site fails in distributed system then………
A) The remaining sites can continue operating
B) All the sites will stop working
C) Directly connected sites will stop working
D) None of the mentioned
Answer: A
13. Network operating system runs on……
A) Server
B) Every system in the network
C) Both server and every system In the network
D) None of the mentioned
14. Which technique is based on compile time program transformation for accessing remote 
data in a distributed memory parallel system?
A) Cache coherence scheme
B) Computation migration 
C) Remote procedure 
D) Message passing
Answer: B
15. Logical extension of computation migration is ……..
A) Process migration
B) System migration
C) Thread migration
D) Data migration
Answer: A
16. Process on the remote systems are identified by………
A) Host id
B) Host name and identifier
C) Identifier
D) Process id
Answer: B
17. The capability of a system to adapt the increased service is called………
A) Scalability
B) Tolerance
C) Capacity
D) None of the mentioned
Answer: A
18. Internet provides ………for remote login.
A) Telnet
B) Http
C) Ftp
D) Rpc
Answer: A
19. Which design features of a communication network are important?
A) Naming and name resolution
B) Routing strategies
C) Connection strategies
D) All the mentioned
Answer: D
20. What are the characteristics of Naming and Name resolution?
A) Name systems in the network
B) Address message with the process id
C) Virtual circuit
D) Message switching
Answer: B
21. What are the common problem found in distributed system?
A) Process synchronization
B) Communication synchronization
C) Deadlock problem
D) Power failure
Answer: C
22. Which layer lies between the transport layer and data link layer?
A) Physical
B) Network
C) Application
D) Session
Answer: B
23. In which OSI layer encryption and decryption happens?
A) Application
B) Presentation
C) Transport
D) Data link
Answer: B
24. What are the different ways in which clients and servers are dispersed across machine?
A) Server may not run on dedicated machines
B) Server and clients can be in same machines
C) Distribution cannot be interposed between a OS and the file system
D) OS cannot be distributed with the file system a part of that distribution
Answer: B
25. What are not the characteristics of a DFS?
A) Login transparency and access transparency
B) Files need not contain information about their physical location
C) No multiplicity of users
D) No multiplicity of files
Answer: C
26. What are the different ways file accesses take place?
A) Sequential access
B) Different access
C) Indexed sequential access
D) All the mentioned
Answer: D
27. What are the advantage of catching in remote file access?
A) Reduced network traffic by retaining recently accessed disk blocks 
B) Faster network access
C) Copies of data creates backup automatically
D) None of the mentioned
Answer: A
28. What is networked virtual memory?
A) Catching
B) Segmentation
C) RAM disk
D) None of the mentioned
Answer: A
29. What are the advantages of file replication?
A) Improves availability & performance
B) Decreases performance
C) They are consistent
D) Improves speed
Answer: A
30. What are the coherency of replicated data?
A) All replicas are identical at all times
B) Replicas are perceived as identical only at some points in time
C) User always read the most recent data in the replicas
D) All the mentioned
Answer: D
31. …………of the distributed file system are dispersed among various machines of distributed 
system
A) Clients
B) Servers
C) Storage devices
D) All of the mentioned
Answer: D
32. ………is not possible in distributed file system.
A) File replication
B) Migration
C) Client interface
D) Remote access
Answer: B
33. Which one of the followings hides the location where in the network the file is stored?
A) Transparent distributed file system
B) Hidden distributed file system
C) Escaped distribution file system
D) Spy distributed file system
Answer: A
34. In a distributed file system ,when a files physical location changes…… …
A) File name need to be changed 
B) File name need not to be changed 
C) Files host name need to be changed
D) Files local name need to be changed
Answer: B
35. In a distributed file system ,…… is mapping between logical and physical objects.
A) Client interfacing
B) Naming
C) Migration
D) Heterogeneity
Answer: B
36. In a distributed file system ,a file is uniquely identified by………
A) Host name
B) Local name
C) The combination of host name and local name
D) None Of the mentioned
Answer: C
37. In distributed file system, file name does not reveal the files ………
A) Local name
B) Physical storage location 
C) Both local name and physical storage location
D) None of the mentioned
Answer: B
38. What are the characteristics of tightly coupled system?
a. Same clock, usually shared memory
b. Communication is via this shared memory
c. Multiprocessors
d. Different clocks
A) A
B) A , B and C
C) B and C 
D) A , C and D
Answer: B
39. What are the characteristics of tightly coupled system?
A) Distributed system
B) Use communication links 
C) Same clock
D) All mentioned
Answer: D
40. What are the disadvantages of majority protocol?
A) Complicated implementation
B) Deadlock cannot occur easily
C) Bottleneck
D) All the mentioned
Answer: A
41. In distributed systems, a logical clock is associated with………
A) Each instruction
B) Each process
C) Each register
D) None of the mentioned
Answer: B
42. For proper synchronization in distributed system………
A) Prevention from the deadlock is must 
B) Prevention from the starvation is must
C) Prevention from the deadlock and starvation is must
D) None of the mentioned
Answer: C
43. In the token passing approach of distributed systems, processes are organized in a ring 
structure?
A) Logically
B) Physically
C) Both logically and physically
D) None of the mentioned
Answer: A
44. Which technique is based on compile time program transformation for accessing remote 
data in a distributed memory parallel system?
A) Cache coherence scheme
B) Computation migration
C) Remote procedure call
D) Message passing
Answer: B
45. What is not true about a distributed system?
A) It is a collection of processor
B) All processors are synchronized
C) They do not shared memory
D) None of the mentioned
Answer: B
46. What is not a major reason for building distributed systems?
A) Resource sharing 
B) Computation speedup
C) Reliability
D) Simplicity
Answer: D
47. What are the types of distributed operating system?
A) Network operating system
B) Zone based operating system
C) Level based operating system
D) All of the mentioned
Answer: A
48. What are characteristic of network operating system?
A) User are aware of multiplicity machines 
B) They are transparent
C) They are simple to use 
D) All the mentioned
Answer: A
49. Which design features of a communication network are important?
A) Naming and name resolution
B) Routing strategies 
C) Connection strategies
D) All of the mentioned
Answer: D
50. How many layers does the internet model ISO consist of? 
A) Four
B) Three
C) Nine
D) Seven
Answer: D
51. Which of the following is an application layer service?
A) Mail service
B) File transfer
C) Remote access
D) All of the mentioned
Answer: D
52. Which is not a major component of a file system?
A) Directory service
B) Authorization service
C) Shadow service
D) System service
Answer: C
53. If timestamps of two events are same , then the events are…………
A) Concurrent
B) Non concurrent 
C) Monotonic 
D) Non monotonic
Answer: A


Abhi bhvankar***

MCQ No - 1
1.Resources and clients transparency that allows movement within a system 
is called ____________________
A) .Mobility transparency
B) Concurrency transparency
C) Replication transparency
D) Performance transparency
Answer
A
MCQ No - 2
2. A distributed system is defined as a collection of autonomous computers 
linked by a network with software designed to produce an integrated 
computing facility. True or False?
A) FALSE
B) TRUE
Answer
B
MCQ No - 3
3. Which amongst the following is not an advantage of Distributed systems?
A) Resource sharing
B) Incremental growth
C) Reliability
D) None of the above
Answer
C
MCQ No - 4
4. If one site fails in distributed system, ___________
A) the remaining sites can continue operating
B) all the sites will stop working
C) directly connected sites will stop working
D) none of the mentioned
Answer
A
MCQ No - 5
5. The capability of a system to adapt the increased service load is called 
_________
A) capacity
B) tolerance
C) scalability
D) none of the mentioned
Answer
C
MCQ No - 6
6.What are characteristic of Network Operating Systems ?
A) Users are aware of multiplicity of machines
B) They are transparent
C) They are simple to use
D) All of the mentioned
Answer
A
MCQ No - 7
7.What is the characteristics of atomicity ?
A) Use communication links
B) One processor as coordinator which handles all requests
C) When responses are received from all processes, then process can enter its Critical Section
D) All operations associated are executed to completion or none are performed

Answer
D
MCQ No - 8
8. Network operating system runs on ___________
A) every system in the network
B) server
C) both server and every system in the network
D) none of the mentioned
Answer
B
MCQ No - 9
The transparency that enables multiple instances of resources to be used, is 
called ____________
A) Performance transparency
B) Scaling transparency
C) Concurrency transparency
D) Replication transparency
Answer
D
MCQ No - 10
A set of highly integrated machines that run the same process in parallel is 
known to be ___________
A) Space based
B) Loosely coupled
C) Tightly coupled
D) Peer-to-Peer
Answer
C
11.RMI stands for?
a) Remote Mail Invocation
b) Remote Message Invocation
c) Remaining Method Invocation
d) Remote Method Invocation
View Answer
Answer: d
12. A remote object is an object whose method can be invoked from another virtual 
environment.
a) True
b) False
View Answer
Answer: a
13. A typical _________ program creates some remote objects, makes references to these 
objects accessible, and waits for clients to invoke methods on these objects.
a) Server
b) Client
c) Thread
d) Concurrent
View Answer
Answer: a
14. A typical __________ program obtains a remote reference to one or more remote 
objects on a server and then invokes methods on them.
a) Server
b) Client
c) Thread
d) Concurrent
View Answer
Answer: b
15. The ___________ layer, which provides the interface that client and server application 
objects use to interact with each other.
a) Increasing
b) Count
c) Bit
d) Stub/skeleton
View Answer
Answer: d
16. A layer which is the binary data protocol layer.
a) stub layer
b) skeleton layer
c) remote layer
d) transport protocol
View Answer
Answer: d
17. A middleware layer between the stub skeleton and transport.
a) remote layer
b) instruction layer
c) reference layer
d) remote reference layer
View Answer
Answer: d
18. An object acting as a gateway for the client side.
a) skeleton
b) stub
c) remote
d) server
View Answer
Answer: b
19. A gateway for the server side object.
a) skeleton
b) stub
c) remote
d) server
View Answer
Answer: a
20. RMI uses stub and skeleton for communication with the ________ object.
a) client
b) remote
c) server
d) any
View Answer
Answer: b
MCQ No - 21
A process is already split into pieces, called________________.
(A) Tasks
(B) Program
(C) Processors
(D) Routines
Answer
A
MCQ No - 22
A process is _________________
(A) program in main memory
(B) Program in cache memory
(C) program in secondary storage
(D) program in execution
Answer
D
MCQ No -23
Processes on the remote systems are identified by _________________
(A) host ID
(B) host name and identifier
(C) identifier
(D) process ID
Answer
B
MCQ No - 24
What are characteristics of processor in distributed system ?
(A) They vary in size and function
(B) They are same in size and function
(C) They are manufactured with single purpose
(D) They are real-time devices
Answer
A
MCQ No - 25
What are characteristics of process migration ?
(A) transfer data by entire file or immediate portion required
(B) transfer the computation rather than the data
(C) execute an entire process or parts of it at different sites
(D) none of the mentioned
Answer
C
MCQ No - 26
What are examples of state information ?
(A) opened files and their clients
(B) file descriptors and file handles
(C) current file position pointers
(D) all of the mentioned
Answer
D
MCQ No - 27
What are the characteristics of stateless server ?
(A) Easier to implement
(B) They are not fault-tolerant upon client or server failures
(C) They store all information file server
(D) They are redundant to keep data safe
Answer
A
MCQ No - 28
There is no need to establish and terminate a connection through open and close 
operation in ___________
(A) stateless file service
(B) stateful file service
(C) both stateless and stateful file service
(D) none of the mentioned
Answer
A
MCQ No - 29
In distributed systems, a logical clock is associated with ______________
(A) each instruction
(B) each process
(C) each register
(D) none of the mentioned
Answer
B
MCQ No - 30
In distributed system, each processor has its own ___________
(A) local memory
(B) clock
(C) both local memory and clock
(D) none of the mentioned
Answer
C
31. The ___________ layer, which provides the interface that client and server 
application objects use to interact with each other.
(A) Increasing
(B) Count
(C) Bit
(D) Stub/skeleton
Answer
D
MCQ No - 32
Desirable features of a good message passing system are _______ I. Simplicity II. 
Uniform Semantics III. Efficiency IV. Correctness
(A) I,II
(B) II, III
(C) I, IV
(D) I,II, III, IV
Answer
D
MCQ No - 33
Remote Procedure Calls are used :
(A) for communication between two processes remotely different from each other on the same system
(B) for communication between two processes on the same system
(C) for communication between two processes on separate systems
(D) None of these
Answer
C
MCQ No - 34
The stub :
(A) transmits the message to the server where the server side stub receives the message and invokes procedure on 
the server side
(B) packs the parameters into a form transmittable over the network
(C) locates the port on the server
(D) all of the mentioned
Answer
D
MCQ No - 35
In Message-Passing Systems ,A message-passing facility provides at least two 
operations:
(A) send(message) and delete(message)
(B) delete(message) and receive (message)
(C) send(message) and receive(message)
(D) write(message) and delete(message)
Answer
C
MCQ No - 36
A process that is based on IPC mechanism which executes on different systems and 
can communicate with other processes using message based communication, is 
called ________.
(A) Local Procedure Call
(B) Inter Process Communication
(C) Remote Procedure Call
(D) Remote Machine Invocation
Answer
C
MCQ No - 37
The local operating system on the server machine passes the incoming packets to the 
_________
(A) server stub
(B) client stub
(C) client operating system
(D) none of the above
Answer
A
MCQ No - 38
Machine that places the request to access the data is generally called as __________.
(A) Server Machine
(B) Client Machine
(C) Request Machine
(D) None of the above
Answer
B
MCQ No - 39
An RPC (remote procedure call) is initiated by the ________
(A) server
(B) client
(C) both (a) and (b)
(D) none of the mentioned
Answer
B
MCQ No - 40
The applications of the Client and Server Model are ___________
(A) World Wide Web
(B) Network Printing
(C) Email
(D) All of the mentioned
Answer
D
MCQ No - 41
The TCP/IP reference model has 4 layers. Choose the correct layers.
(A) Host-to-network layer; network or IP (Internet Protocol) layer; transport or TCP (Transmission Control Protocol) 
layer; application layer
(B) Host-to-host layer; network or IP (Intranet Protocol) layer; transport or TCP (Transmission Control Protocol) layer; 
application layer
(C) Network-to-network layer; network or IP (Internet Protocol) layer; transport or TCP (Transmission Control 
Protocol) layer; application layer
(D) Network-to-host layer; FTP (File Transfer Protocol) layer; transport or TCP (Transmission Control Protocol) layer; 
application layer
Answer
A
MCQ No - 42
Which layer is responsible for The process-to-process delivery ?
(A) Network
(B) Transport
(C) Application
(D) Physical
Answer
B
MCQ No - 43
In remote procedure call, the client program must be bound with a small library 
procedure called __________
(A) Server stub
(B) Marshalling
(C) Local Procedure Call
(D) Client hub
Answer
D
MCQ No - 44
Internet provides _______ for remote login.
(A) telnet
(B) http
(C) ftp
(D) RPC
Answer
A
MCQ No - 45
The header usually consists of the following elements in IPC I. Sequence number II. 
Structural information III. Address IV. File mode(Read/ Write
(A) I,III, IV
(B) I,II, III
(C) I, II, IV
(D) none of the mentioned
Answer
B
MCQ No - 46
_____________ manage the name spaces and binds an object to its location.
(A) Name Server
(B) Name agent
(C) Context
(D) Name resolution
Answer
A
MCQ No - 47
______________ is an integral part of the naming facility, maps an object's name to 
the object's location in a distributed system
(A) Naming facility
(B) Locating facility
(C) both (a) and (b)
(D) none of the mentioned
Answer
B
MCQ No - 48
________________means that the name of an object should not reveal any hint as to 
the physical location of the object.
(A) Location transparency
(B) Location independency
(C) Scalability.
(D) Meaningful names
Answer
A
MCQ No - 49
________________ means that the name of an object need not be changed when the 
object's location changes
(A) Location independency
(B) Location transparency
(C) Scalability.
(D) Meaningful names
Answer
A
MCQ No - 50
A naming system should allow many different objects to be identified by the same 
name"" is known as __________________
(A) Scalability
(B) Location transparency
(C) Group naming
(D) none of the mentioned
Answer
C
MCQ No - 51
Name spaces are managed by ____________
(A) name machine
(B) name agent
(C) name servers
(D) none of the mentioned
Answer
C
MCQ No - 52
The name servers that store the information about an object are called the 
_______________ of that object
(A) authoritative name clients
(B) authoritative name agent
(C) authoritative name servers
(D) none of the mentioned
Answer
C
MCQ No - 53
____________ name spaces are easier to manage efficiently as compared to 
__________ name spaces
(A) Flat, partitioned
(B) Partitioned, flat
(C) Mahine, flat
(D) none of the mentioned
Answer
B
MCQ No - 54
___________ is act between name servers and their clients.
(A) Name machine
(B) Context
(C) Name agents
(D) Main servers
Answer
C
MCQ No - 55
A _______________ is structured as a set of subroutines that are linked to the client 
program
(A) private name agent
(B) public name agent
(C) private name server
(D) public name server
Answer
A
MCQ No - 56
What is common problem found in distributed system ?
(A) Process Synchronization
(B) Communication synchronization
(C) Deadlock problem
(D) Power failure
Answer
C
MCQ No - 57
If timestamps of two events are same, then the events are ___________________
(A) concurrent
(B) non-concurrent
(C) monotonic
(D) non-monotonic
Answer
A
MCQ No - 58
If a process is executing in its critical section, ____________________
(A) any other process can also execute in its critical section
(B) no other process can execute in its critical section
(C) one more process can execute in its critical section
(D) none of the mentioned
Answer
B
MCQ No - 59
A process can enter into its critical section __________________
(A) anytime
(B) when it receives a reply message from its parent process
(C) when it receives a reply message from all other processes in the system
(D) none of the mentioned
Answer
C
MCQ No - 60
For proper synchronization in distributed systems ____________
(A) prevention from the deadlock is must
(B) prevention from the starvation is must
(C) prevention from the deadlock & starvation is must
(D) none of the mentioned
Answer
C
MCQ No - 61
In the token passing approach of distributed systems, processes are organized in a 
ring structure _______________
(A) logically
(B) physically
(C) both logically and physically
(D) none of the mentioned
Answer
A
MCQ No - 62
In case of failure, a new transaction coordinator can be elected by ____________
(A) Cristian's Algorithm
(B) Bully algorithm
(C) Both bully and Cristian's algorithm
(D) None of the mentioned
Answer
B
MCQ No - 63
In distributed systems, election algorithms assumes that __________________
(A) a unique priority number is associated with each active process in system
(B) there is no priority number associated with any process
(C) priority of the processes is not required
(D) none of the mentioned
Answer
A
MCQ No - 64
According to the ring algorithm, links between processes are 
______________________
(A) Bidirectional
(B) Unidirectional
(C) Both bidirectional and unidirectional
(D) None of the mentioned
Answer
B
MCQ No - 65
What are the characteristics of mutual exclusion using centralized approach ?
(A) One processor as coordinator which handles all requests
(B) It requires request,reply and release per critical section entry
(C) The method is free from starvation
(D) All of the mentioned
Answer
D


Arti******

Chapter 1st  introduction to distributed systems

1)      What are the advantages of distributed system over independent Pc ?

A)      Data Sharing

B)      Resource sharing

C)      Communication

D)     All of the above

Answer: D

2)      The characteristics of distributed systems are :

A)      Resource sharing

B)      Scalability

C)      Concurrency

D)     All of the mentioned

Answer: D

3)      Data canters and centralised computing coves many and ?

A)      Microcomputer

B)      Minicomputers

C)      Mainframe computer

D)     Super computer

Answer: D

4)      A distributed systems is a collection of independent computers that appears to user as single coherent system true or false

A)      True

B)      False

Answer: A

5)      What is not a major reason for building distributed system ?

A)      Resource sharing

B)      Computation speedup

C)      Reliability

D)     Simplicity

Answer D

6)      Resource and client tranapercy that allows movement within a system is called

A)      Mobility tranapercy

B)      Concurrency transparency

C)      Replication Transparency

D)     Performance transparency

Answer: A

7)      A set of highly integrated machine that run the same process in parallel is known to be?

A)      Space based

B)      Loosely coupled

C)      Tightly coupled

D)     Peer to peer

Answer: C

8)      The tranapercy that enable the multiple instances of resources to be  used is called?

A)      Performance transparency

B)      Scaling tranapercy

C)      Concurrency transparency

D)     Replication Transparency

Answer: D

9)      The capacity of a system to adapt the increased service load is called

A)      Capacity

B)      Tolerance

C)      Scalability

D)     Non of the mentioned

Answer: C

10)   What is not true about the distributed system

A)      It is collection of processor

B)      All processors are synchronised

C)      They do not share the memory

D)     Non of the mentioned

Answer: B

Chapter 2nd architecture style

1)      What is correct about data centralised architecture ?

A)      It is Modifiable with respect to changing the functionality of any particular client as other clients will not be affected

B)      It is non-modifiable with respect to changing the functionality of any particular client as other clients will not be affected

C)      Coupling among the client will lessen the effect of data Centered Architecture

D)     All of the mentioned

Answer: D

2)      In which following style new clients can be added easily ?

A)      Data flow architecture

B)      Call and return Architecture

C)      Data Centered Architecture

D)     Non of the mentioned

Answer: C

3)      Which of the following are the types of call and return Architecture

A)      Main Program and Subroutine Architecture

B)      Remote procedure call system

C)      Object oriented or abstract data type system

D)     All of the mentioned

Answer: D

4)      What is batch sequential style

A)      A batch sequential components are independent programs

B)      Assumption is that each step run to completion before the next step start

C)      All of the mentioned

D)     Non of the mentioned

Answer: C

 

5)      Which architecture style goal is to achieve integrablity ?

A)      Data flow architecture

B)      Call and return Architecture

C)      Data Centered Architecture

D)     Non of the mentioned

Answer : C

6)      Remote procedure call system type has the main goal to achieve ?

A)      Performance

B)      Modifiability

C)      Integrability

D)     Non of the mentioned

Answer: A

7)      Which of the architecture style is subdivided into batch sequential and pipes and filters

A)      Call and return Architecture

B)      Data flow architecture

C)      Data Centered Architecture

D)     Non of the mentioned

Answer: B

8)      Repository and blackboard are the subtypes of which architecture?

A)      Data Centered Architecture

B)      Data flow architecture

C)      Call and return Architecture

D)     Non of the mentioned

Answer: A

9)      Data Centered Architecture Style is main goal to achieve ?

A)      Modifiability

B)      Integrability

C)      Performance

D)     Non of the mentioned

Answer: B

10)   Architecture Styles is composed of which of the followings.

A)      A set of component types that perform some function at run time

B)      A topological layout of these components indicating their run time inter relationship

C)      A set of semantic constraint

D)     None of the mentioned

Answer: C

 

 

 

 

 

Chapter 3rd Processes

1)      Threads are building blocks of ?

A)      Processes

B)      Operating system

C)      Clients

D)     Non of the mentioned

Answer: A

2)      A process is already split into pieces called ?

A)      Task

B)      Programme

C)      Processes

D)     Routine

Answer: A

3)      A. Process is ?

A)      Programme in main memory

B)      Programme in cache memory

C)      Programme in secondary storage

D)     Programme in execution

Answer: D

4)      What are characteristics of the process Migration ?

A)      Transfers data by entire file or immediate portion required

B)      Transfers the computation rather than the data

C)      Execute the entire process or parts of it at different sites

D)     Non of the mentioned

Answer: C

5)      Processes on the remote systems are identified by ?

A)      Host ID

B)      Host name and identifier

C)      Identifier

D)     Process ID

Answer: B

6)      In distributed systems a logical clock is associated with

A)      Local memory

B)      Clock

C)      Both local memory and clock

D)     Non of the mentioned

Answer: C

7)      ____ is the relocation of a process from its current location to another node

A)      Process Migration

B)      Load balancing

C)      RPC

D)     None of the mentioned

Answer: A

 

8)      Process Migration involves ?

A)      Selection of process to be migrated

B)      Selection of destination system or node

C)      Actual transfer of the selected process to the destination system or node

D)     All A,B,C

Answer: D

9)      Termination of the process terminates

A)      First thread of process

B)      First two threads of process

C)      All threads with the process

D)     No threads of the process

Answer: B

10)   ____ are implemented by the users

A)      Kernal threads

B)      User threads

C)       Both A and B

D)     Non of the mentioned

Answer: B

 

Chapter 4th communication

1)      In distributed systems information is exchange through ?

A)      Memory sharing

B)      Message passing

C)      Both A and B

D)     None of the mentioned

Answer: B

2)      RPC initiated by the ?

A)      Server

B)      Client

C)      Both A and B

D)     None of the mentioned

Answer: C

3)      How many layers does internet model ISO consist of ?

A)      Three

B)      Five

C)      Six

D)     Seven

Answer: D

4)      Remote procedure call are used

A)      For communication between two processes remotely different from each other on the same system

B)      For communication between two processes on the same system

C)      For communication between two processes on separate system

D)     Non of these

Answer: C

5)      In message passing system a message passing facility provides at least two operation:

A)      Send message and delete message

B)      Delete message and  receive message

C)      Send and receive message

D)     Write and delete message

Answer: C

6)      Machine that places the requested to access the data is generally called as ?

A)      Server machine

B)      Client machine

C)      Request machine

D)     Non of the mentioned 

Answer: B

7)      RPC provides an ____ on the client side a separate one for each remote procedure

A)      Stub

B)      Identifier

C)      Name

D)     Process identifier

Answer:. A

8)      RPC connectors and message queues are mechanism for ?

A)      Message retrieving

B)      Message passing

C)      Message delivering

D)     Message deleting

Answer: B

9)      A global system of interconnected computer network is known as ?

A)      Internet

B)      Ethernet

C)      Intranet

D)     Non of the mentioned

Answer': A

10)   Desirable feature of good message passing are ?

A)      Simplicity

B)      Uniform Semantics

C)      Efficiency

D)     All of the above

Answer: D

 

 

 

Chapter 5th Naming

1)      A ___ in a distributed systems is a string of bits or characters that is used to refer to an entity.

A)      Name

B)      Attributes

C)      Identifiers

D)     Addresses

Answer: A

2)      DNS stands for

A)      Direct name system

B)      Domain name system

C)      Direct network system

D)     Domain network system

Answer: B

3)      A naming system should be efficient in the sense that the number of messages is exchange in a name mapping operation should be as ______ as possible

A)      Big

B)      Small

Answer: B

4)      ____ name is generally a character string that is meaningful to its user

A)      System oriented

B)      Human oriented

C)      Mapping

D)     Non of the mentioned

Answer : B

5)      Flat name do not have any structure true or false?

A)      True

B)      False

Answer: B

6)      Name spaces are managed by ?

A)      Name machine

B)      Name agent

C)      Name servers

D)     Non of the mentioned

Answer: C

7)      ____ name spaces are  easier to manage efficiently as compared to _____ name spaces

A)      Flat and partitioned

B)      Partitioned ,flat

C)      Machine and flat

D)     Non of the mentioned

Answer: B

8)      ____ is act between Name server and their clients

A)      Name machine

B)      Context

C)      Name agents

D)     Main servers

Answer: C

9)      _____ is a structured as a set of subroutines that are linked to the client program

A)      Private Name agent

B)      Public Name agent

C)      Private Name server

D)     Public Name client

Answer: A

10)    What are the characteristics of the naming and name resolution ?

A)      Name system in the network

B)      Address messages with the process

C)      Virtual circuit

D)     Message switching

Answer: B

 

Chapter 6th Synchronisation

1)      What is common problem in distributed systems?

A)      Process synchronisation

B)      Communication synchronisation

C)      Deadlock problem

D)     Non of the mentioned

Answer: C

2)      According to the ring algorithm links between process are?

A)      Bidirectional

B)      Unidirectional

C)      Both A and B

D)     Non of the mentioned

Answer : B

3)      What are the characteristics of  mutual exclusion using centralised approach?

A)      One processer as coordinator which handles all requests

B)      It requires request, reply and release per critical section entry

C)      The method is free from starvation

D)     All of the mentioned

Answer: D

4)      In Cristian’s algorithm the time server is?

A)      Active

B)      Passive

C)      Both A and B

D)     None of the mentioned

Answer: B

5)      What is UTC ?

A)      Universal centralised time

B)      Universal coordinate time

C)      Unique centralised time

D)     Non of the mentioned

Answer: B

6)      Cristian’s algorithm is ___?

A)      Passive time server algorithm

B)      Active time server algorithm

C)      Both A and B

D)     Answer: A

7)      In case of failure new transaction coordinator can be elected by?

A)      Cristian’s algorithm

B)      Bully algorithm

C)      Both A and B

D)     None of the mentioned

Answer: B

8)      For proper synchronisation in distributed systems ___

A)      Prevention from the deadlock is most

B)      Prevention from the starvation is most

C)      Prevention from the deadlock and starvation is most

D)     Non of the mentioned

Answer: C

9)      The _____ is used to keep track of the oscillation of the quartz crystal ?

A)      Counter register

B)      Quartz register

C)      Constant register

D)     Non of the mentioned

Answer: A

10)   The value in the counter register is ______  by one for each oscillation of the quartz crystal

A)      Incremental

B)      Decrement

Answer: B


 Shinde*****


Distributed Computing System.      

1)      A distributed system is a collection of independent computers that appears to user a  single coherent  systems . True or false

A)      True

B)      False

Answer : A

2)      Distributed System have ?

A)      High security.

B)      Better resource sharing.

C)      Better system utilisation

D)     Low system overhead

Answer: B

3)      Which amongst the following is not an advantages of distributed system

A)      Resource Sharing

B)      Incremental growth

C)      Reliability

D)     Non of the above

Answer : C

4)      Distributed systems should ?

       A)  high security

       B)  have better resource Sharing

       C)  better system utilisation

       D)  low system overhead

                 Answer : B

5)      Which of the following is true distributed system

A)      Tightly- coupled software on loosely-coupled  hardware

B)      Loosely-coupled software on tightly-coupled hardware

C)      Tightly- coupled software on tightly-coupled hardware

D)      Loosely-coupled software on loosely- coupled hardware

Answer : A

6)      In the distributed system all the resources are ?

A)      Easily accessible to the user

B)      Not easy to accessible to the user

C)      Reliably

D)     Non of the above

Answer : A

7)      Scalability of a system can be measured along at least ?

A)      Two dimensions

B)      Three dimensions

C)      One dimensions

D)     Four dimensions

Answer : B

 

 

8)       If one site is fail in distributed systems ?

A)      The remaining side can continue  operating

B)      All the sites will stop working

C)      Directly connected sides will stop working

D)     Non of the mentioned

  Answer : A

9)      The capability of a system to adapt the increased service load is called ?

A)      Capability

B)      Tolerance

C)      Scalability

D)     Non of the mentioned

Answer : C

10)   The tranapercy that enable multiple instances of resources to be used is called

A)      Performance transparency

B)      Scaling tranapercy

C)      Concurrency transparency

D)     Replication Transparency

Answer: D

 2 : Architecture Style

1)      Architecture style is composed of which of the following ?

A)      A set of component types that perform some function at run time

B)      A topological layout of these components indicating their run time inter relationship

C)      A set of semantic  constraint

D)     All of the mentioned

Answer : C

2)      In which of the following style new clients can be added easily ?

A)      Data flow architecture

B)      Call and return Architecture

C)      Data Cantered Architecture

D)     Non of the above

           Answer : C

3)      Architecture Styles is composed of which of the following?

A)      A. Set of component types that perform some function at run time

B)      A topological layout of these components indicating their run time inter relationship

C)      A set of semantic constraint

D)     All of the mentioned

Answer :  C

4)      Which architecture style goal to achieve Modiablity and scalability ?

A)      Data flow architecture

B)      Call and return Architecture

C)      Virtual machine Architecture

D)     Non of the mentioned

Answer : B

5)      Which of the following  are types of call and return Architecture?

A)      Main Program and Subroutine Architecture .

B)      Remote procedure call system

C)      Object oriented or abstract data type system

D)     All of the mentioned

Answer : D

6)      Data Centered Architecture is subdivided into which of the following sub types

A)      Repository and  blackboard

B)      Batch sequential , pipes and filters

C)      All of the mentioned

D)     Non of the mentioned

Answer : A

7)      Which architecture style goal is to achieve  portability

A)      Data flow architecture

B)      Call and return Architecture

C)      Virtual machine Architecture

D)     Non of the mentioned

Answer : C

8)      In which architecture style goal to achieve Modfialblity  with reuse ?

A)      Data flow architecture

B)      Call and return Architecture

C)      Virtual machine architecture

D)     None of the mentioned

Answer: A

9)      Which of the following are types of call and return Architecture ?

A)      Main Program and Subroutine Architecture

B)      Remote procedure call system

C)      Object oriented or  abstract data system

D)     All of the mentioned

Answer : D

10)   Which of the following type has the main goal to achieve performance ?

A)      Main Program and Subroutine Architecture

B)      Remote procedure call system

C)      Object oriented or abstract data system

D)     All of the mentioned

Answer : B

Chapter 3rd  Processes

1)      A process can be ?

A)      Single threaded

B)      Multithreaded

C)      Both single threaded and multithreaded

D)     Non of the above

Answer : C

2)      A thread is also called ?

A)      Light weight process

B)      Heavy weight process

C)      Process

D)     None of the mentioned

Answer : A

3)      Process Migration involves ?

A)      Selection of processes to be migrated

B)      Selection of destination system or node  

C)      Actual transfer of the selected process to the destination system or node

D)     All A,B and C

Answer : D

4)      What are the characteristics of processes migration?

A)      Transfers data by entire file or immediate portion required

B)      Transfers the computation rather than the data

C)      Execute the entire process or parts of it at different sites

D)     Non of the mentioned

Answer : C

5)      Termination of the process terminates ?

A)      First thread of process

B)      First two threads of the process

C)      All threads within the process

D)     No threads within the process

Answer : B

6)      Threads are the building blocks of ?

A)      Processes

B)      Clients

C)      Operating system

D)     Non of the mentioned

Answer : A

7)      In distributed system a logical clock is associated with?

A)      Each instructions

B)      Each process

C)      Each register

D)     Non of the mentioned

Answer : B

            

8)      ________ is the relocation of a process from its current location into another node?

A)      Process Migration

B)      Local balancing

C)      RPC

D)     None of the mentioned

Answer : A

 

 

 

 

4th chapter Communication

1)      ______ provides programmers a familiar programing model by extending the local procedure call to a distributed environment

A)      Disturbed environment

B)      Permanent procedure call

C)      Process and file

D)     Remote procedure call

Answer : D   

2)      An architecture where clients first communicate the server for data then format and display it to the user, is known as ?

A)      Clients server architecture

B)      Three-tire architecture

C)      Two tire architecture

D)     Peer to peer architecture

Answer : A

3)      In a distributed systems information is exchange through ?

A)      Memory sharing

B)      Memory passing

C)      Local balancing

D)     Non of the mentioned

Answer : B

4)      In message passing system A message passing facility provides at least two operation :

A)      Send message And delete message

B)      Delete message and receive message

C)      Send message and receive message

D)     Write message and delete message

Answer : C

5)      The stub :

A)      Transmit the message to the server where the server side stub receives the message and invokes procedure on the server side?

B)      Packs the parameters into a form transmittable over the network

C)      Locates the port on the number

D)     All of the mentioned

Answer : D

6)      Remote procedure calls are used :

A)      For communication between two processes remotely different from each other

On the same System .

B)      For communication between two processes on the same System

C)      For communication between two processes on separate system

D)     Non of these

Answer : C

7)      Desirable feature of a good message passing system are ?

A)      Simplicity

B)      Uniform Semantics

C)      Efficiency

D)     All of the above

Answer : D

8)      The RPC initiated by ?

A)      Server

B)      Client

C)      Both a and b

D)     Non of the mentioned

Answer : B

9)      In RPC the client program must be bound with the small library procedure called

A)      Server stub

B)      Marshalling

C)      Local procedure call

D)     Client hub

Answer : D

10)   Internet provides _____ for remote log in ?

A)      Telnet

B)      http

C)      ftp

D)     RPC

Answer : A

 

 

 

 

Chapter 5th  Naming

1)      What are the characteristics of naming and name resolution ?

A)      Name system in the network

B)      Address messages with the process

C)      Virtual circuit

D)     Message switching

Answers : B

2)      In distributed file  systems _______ is mapping between logical and physical objects

A)      Client interfacing

B)      Naming

C)      Migration

D)     Heterogeneity

Answer : B

3)      A _______ in a distributed systems is a string of bits or characters that is used to refer to an entity ?

A)      Name

B)      Attributes

C)      Identifiers

D)     Addresses

Answer : A

4)      ____ manages the name spaces and binds an object to its location ?

A)      Name server

B)      Name agent

C)      Context

D)     Name resolution

Answer : A

5)      ____ is an integral part of the meaning facility , maps an object name to the object location in a distributed systems ?

A)      Naming facility

B)      Locating facility

C)      Both a and b

D)     Non of the mentioned

Answer : B

6)      _____ means that the name of an object should not reveal any hint as to the physical location to the object

A)      Location transperency 

B)      Location independency

C)      Scalability

D)     Meaningful names

Answer: A

7)      A naming system should support the use of ____  of the same object in a user transperent  manner

A)      Multiple copies

B)      Single copy

Answer : A

 

8)      Flat names do not have any structure true or false ?

A)      False

B)      True

Answer : B

9)      Each partition of a ____ name spaces is called a domain of the name spaces

A)      Partitioned

B)      Machine

C)      Flat

D)     Non of the mentioned

Answer : A

10)   _____ name is a generally a character string that is meaningful to its user

A)      System oriented

B)      Human oriented

C)      Mapping

D)     Non of the mentioned

Answer : B

6th chapter synchronisation

1)      For proper synchronisation in distributed systems  ____

A)      Prevention from the deadlock is must

B)      Prevention from the starvation is most

C)      Prevention from the deadlock & starvation is most

D)     None of the above

Answer : C

2)      What is common problem found in distributed systems ___

A)      Process synchronisation

B)      Communication synchronisation

C)      Deadlock problem

D)     Power failure

Answer : C

3)      If a process is executing in its critical section ___

A)      Any other process can also execute in its critical section

B)      No other process can execute in its critical section

C)      One more process can execute in its critical section

D)     Non of the mentioned

Answer : B

4)      A process cam enter into a critical section ____

A)      Anytime

B)      When it’s receive a reply message from all other processes in the system

C)      When it’s receive a reply message from it patents process

D)     Non of the mentioned

Answer : B

5)      In a token passing approach of distributed systems process are organised in a ring structure ___

A)      Logically

B)      Physically

C)      Both logically and physically

D)     Non of the mentioned

Answer: A

6)      In case of failure a new transaction coordinator can be elected by ?

A)      Christian's algorithm

B)      Bully algorithm

C)      Both bully and Christian's algorithm

D)     Non of the mentioned

Answer: B

7)      In distributed systems election algorithm assumes that?

A)      A unique priority number is  associated with each active process in system

B)      There is no priority number associated with any process

C)      Priority of the processes us not required

D)     Non of the mentioned

Answer: A

8)      According to the ring algorithm , links between process are ?

A)      Bidirectional

B)      Unidirectional

C)      Both Bidirectional and unidirectional

D)     Non of the mentioned

Answer : B

9)      What are the characteristics of the mutual exclusion using centralised approach

A)      One process as coordinator which handle all requests

B)      It requires request/reply and release per critical section entry

C)      The method is free from starvation

D)     All of the mentioned

Answer : D

10)   In Cristian's algorithm the time server is

A)      Passive

B)      Active

C)      Some internal passive some internal active

D)     Non of the mentioned

Answer : A

 


A) that may adversely affect scalability

B) that may adversely affect concurrency

C) that may adversely affect location transparency

D) that may adversely affect migration transparency 

Answer: A

2) connecting users and resources also makes it easier to __

A) to protect ourselves using special information 

B) to collaborate and exchange information 

C) to build up a performance of a specific user

D) to hide the fact that its processes and resources are physically distributed.

Answer: B

3) __ deals with hiding differences in data representation and the way that resources can be 

accessed by the user 

A) Access transparency

B) failure transparency

C) replication transparency

D) concurrent transparency 

Answer: A

4) __ refers to the fact that user can not tell where a resource a physically located in the 

system

A) access transparency

B) migration transparency

C) replication transparency

D) location transparency

Answer: D

5) following is the underlining hardware consist of a collection of similar workstation

A) grid computing 

B) cloud computing 

C) cluster computing

D) distributed computing

Answer: C

1) what is the serious drawback of replication

6) distributed system is a collection of dependent computers that appears to its user a single 

coherent system

A) true

B) false

Answer: B

7) DPS stands for__ 

A) distributed processing system

B) distributed performing system

C) distributed personal system

D) distributed pervasive system

Answer: D

8) DNS stands for

A) dynamic name system

B) divided name system

C) domain numbering system

D) domain name system

Answer: D

9) in which architecture style goal to achieve portability

A) Data flow architecture

B) call and return architecture

C) virtual machine architecture

D) none of the mentioned

Answer: C

10) in layered architecture style communication by the __ 

A) object based architecture

B) client server architecture

C) component based architecture

D) layer to layer based architecture

Answer: D

11) in __ communication happens by using remote procedure called mechanism 

A) layered based architecture

B) object based architecture

C) database architecture 

D) event based architecture

Answer: B

12) data centralized architecture is divided into which of the following subtypes

A) repository and blackboard

B) back sequential pipes and filters 

C) all of the above

D) none of the above

Answer: A

13) Which of the followings are the types of call and return architecture?

A) main programme and subroutine architecture

B) remote procedure call 

C) object oriented or abstract data type

D) all of the above

Answer: D

14) main advantage of event based architecture is that ___ 

A) processes are tightly coupled

B) the computers are tightly coupled

C) resources are loosely coupled

D) that processes are loosely coupled 

Answer: D

15) centralised architecture is a example of ___

A) client server model

B) request response behaviour

C) both above

D) none of the above 

Answer: C

16) when an operation can be repeated multiple times without harm, It is said to __

A) proper communication done 

B) no any kinds of communication

C) idempotent

D) none of the above

Answer: C

17) there is in structured peer to peer network architecture the processes are organised 

through ___

A) data hash table(DHT)

B) distributed hash table(DHT)

C) both mentioned above

D) none of above

Answer: D

18) there is in distributed hash table the items are assigned a random key from a large identifier 

space , such as___

A) 132 bit or 190 bit identifier

B) 232 bit or 290 bit identifier 

C) 32 bit or 60 bit identifier

D) 128 bit or 160 bit identifier

Answer: D

19) there is in super peer system architecture data is organised in___

A) one node holds the address of other node

B) require peer or super peer architectural style

C) all nodes maintain the list of neighbours 

D) none of above 

Answer: A

20) ISP stands for ___

A) internet security provider

B) internet service provider 

C) internet service procedure 

D) none of the above

Answer: B

21) virtualisation introduced in ___ 

A) 1960

B) 1966

C) 1975

D) 1970

Answer: D

22) there is in ___ processes are moved from heavily _loaded machine to lightly _loaded 

machine

A) virtualisation 

B) client server

C) code migration 

D) none of the above

Answer: C

23) MOM stands for and RPC stands for

A) message oriented middleware

B) remote procedure call 

C) all of the above

D) none of the above

Answer: C

24) Berkeley sockets interface as introduced in as ___ 

A) 1970s in Berkeley UNIX

B) 1960s in Berkeley UNIX

C) 1975s in Berkeley UNIX

D) 1985s in Berkeley UNIX

Answer: A

25) XTI stands for ___

A) X/open transport interface

B) x-ray transport interface

C) x-open telecommunication interface

D) none of the above 

Answer: A 

26) followings are the primitives of socket

A) send

B) receive

C) closed

D) all of the above 

Answer: D

27) RMI stands for

A) remote migration interface

B) remote method interface

C) remote method invocation

D) none of the above 

Answer: C

28) MPI stands for -------------

A) manage protocol interface 

B) message passing interface 

C) message processing interface 

D) none of the above 

Answer: B

29) Message oriented persistent communication support for___________

A) persistent asynchronous communication 

B) persistent synchronous communication

C) all of the above 

D) none of above 

Answer: A

30) following is not the primitive of message queuing system 

A) put 

B) poll

C) send 

D) notify 

Answer: C

31) MPEG stand for___________ 

A) mapping opening expert group 

B) motion picture expert group 

C) mapping picture expert group 

D) none of above 

Answer: B

32) __________ is the communication model where data can receives to multiple receiver 

A) broadcast communication 

B) multiple cast communication 

C) all of above 

D) none of above 

Answer: B

33) A name in a distributed system is a string of bits or character that is used to ---------

A) refer an entity 

B) refer as object 

C) refer as attribute 

D) none of above 

Answer: A

34) The name of an access point is called _________

A) entity 

B) attribute 

C) address 

D) none of above 

Answer: C

35) ARP stands for__________

A) address result protocol 

B) address resource protocol 

C) address resolution protocol 

D) none of above 

Answer: C

36) computer resources includes ______

A) file 

B) data 

C) processer 

D) none of above 

Answer: C

37) what are the aspects of distributed transparency 

A) location 

B) migration 

C) replication 

D) all of the above 

Answer: D

38) Location transparency allows for which of the following?

A) user to treat the data as if it is at one location 

B) programmers to treat the data as if it is at one location 

C) managers to treat the data as if it is at one location 

D) all of the above 

Answer: D

39) all the resources are shared and integrated within OS , in the computing paradigm named 

________

A) distributed computing 

B) centralized computing 

C) cloud computing 

D) parallel computing 

Answer: B

40) threads are also as_______

A) process

B) small part of process

C) all of above

D) none of above

 Answer: B

41) a thread executes it’s own piece of code____________

A) independently

B) dependently 

C) properly

D) none of above

Answer: A

42) what are the approaches of a thread?

A) first is that to construct a thread library that is executes entirely in user mode 

B) second is to have the kernel beware of thread and schedules them 

C) all of above 

D) none of above 

Answer: C

43) OSI stands for________

A) open security implementation 

B) open system interconnection 

C) only system interconnection 

D) none of above 

Answer: B

44) the role of sharing information from one network to another is called 

A) communication 

B) connection 

C) protocol 

D) none of above 

Answer: C

45) name play an important role in all computer system cause _______

A) they used to share resource to uniquely identify an entity 

B) they used to share network over the internet 

C) they used to share information over the internet 

D) none of above 

Answer: A

46) what are the solutions provided to locate an entity____________

A) broadcasting 

B) multicasting 

C) both above 

D) none of above 

Answer: C

47) broadcasting & multicasting both are applicable for _____________

A) WAN 

B) MAN

C) LAN

D) none of above 

Answer: C

48) attribute based naming also known as)__________

A) directory service 

B) direct servers

C) indirect service 

D) none of above 

Answer: A

49) most computers have a special battery-backed up -----------that the date & time need not to 

be entered on subsequent boots 

A) stored battery 

B) CMOS RAM 

C) MOS battery 

D) none of above 

Answer: B

50) since there are 24 hours in a day, each containing ____________ seconds

A) 3660 seconds

B) 3760 seconds

C) 3500 seconds 

D) 3600 seconds

Answer: D

51) GPS launched

A) 1977

B) 1978

C) 1998

D) 1975

Answer: B

52) TAI stands for 

A) international /atomic time

B) international accessible time 

C) all of above 

D) none of above 

Answer: A

53) GPS is a based system on _________

A) satellite based system 

B) network based system 

C) all of above 

D) none of above 

Answer: A


Comments

Popular posts from this blog