Professional Documents
Culture Documents
MCQ Mu DC Sem 8 Sample Questions
MCQ Mu DC Sem 8 Sample Questions
MCQ Mu DC Sem 8 Sample Questions
TOPPER’S SOLUTIONS
….In Search of Another Topper
There are many existing paper solution available in market, but Topper’s Solution is the one which
students will always prefer if they refer… ;) Topper’s Solutions is not just paper solutions, it includes many
other important questions which are important from examination point of view. Topper’s Solutions are
the solution written by the Toppers for the students to be the upcoming Topper of the Semester.
It has been said that “Action Speaks Louder than Words” So Topper’s Solutions Team works on same
principle. Diagrammatic representation of answer is considered to be easy & quicker to understand. So
our major focus is on diagrams & representation how answers should be answered in examinations.
“Education is Free…. But its Technology used & Efforts utilized which
we charge”
It takes lot of efforts for searching out each & every question and transforming it into Short & Simple
Language. Entire Community is working out for betterment of students, do help us.
Syllabus:
# Module Details Contents
1. Introduction to 1. Characterization of Distributed Systems: Issues, Goals, and Types of
Distributed Systems distributed systems, Distributed System Models, Hardware
concepts, Software Concept.
2. Middleware: Models of Middleware, Services offered by middleware,
Client Server model
Note: We have tried to cover almost every important question(s) listed in syllabus. If you feel any
other question is important and it is not cover in this solution then do mail the question on
Support@BackkBenchers.com or Whatsapp us on +91-9930038388 / +91-7507531198
All rights reserved. No part of this publication may be reproduced, distributed, or transmitted in
any form or by any means, including photocopying, recording, or other electronic or mechanical
methods, without the prior written permission of the publisher, except in the case of brief
quotations embodied in critical reviews and certain other noncommercial uses permitted by
copyright law. For permission requests, write to the publisher, addressed “Attention:
Permissions Coordinator,” at the address below.
2. The distributed software that drives the distributed system, while providing transparency of
heterogeneity at the platform level is _______________
a. Firmware
b. Middleware
c. Distributed application
d. None of these
4. _____________ is a protocol that one program can use to request a service from a program located in
another computer on a network without having to understand the network's details
a. Remote Method invocation(RMI)
b. Stub
c. Driver
d. Remote Procedure Call (RPC)
5. Below are the advantages of distributed system. Check one which you find incorrect.
a. Reliability
b. Inherent distribution
c. Modular expandability
d. Data redundancy
10. ____________ models consider the types of computers and devices that constitute a system and their
interconnectivity, without details of specific technologies.
a. Fault tolerant
b. Fundamental
c. Physical
d. Architectural
11. _______________ and ___________ are two of the most commonly used forms of architectural model for
distributed systems.
a. Master-slave, Peer-to-peer
b. Peer-to-peer, Client-server
c. Multi- tier, Peer-to-peer
d. Multi-slave, Multi-tier
12. Distributed approach based objects are accessed via interfaces, with an associated _________
providing a specification of the methods defined on an object.
a. Interface definition language (or IDL)
b. Interface manipulation language (or IML)
c. Distributed definition language
d. Distributed manipulation language
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 3 of 71
lOMoARcPSD|36008826
14. The ___________ approach is prevalent – the Web and other Internet services such as FTP, news and
mail as well as web services and the DNS are based on this model, as are filing and other local
services.
a. Multi-tier
b. Peer-to-peer
c. 3-Tier
d. client-server
15. We have ten computers in the lab, we have ten processors with memories available for process an
application and why not we use them as a single system to process an application. – Internet.
This is an example of ___________ system.
a. multicomputer
b. multiprocessor
c. single computer
d. single processor
18. The client ____________ marshal the arguments in invocation requests and unmarshal exceptions
and results in replies.
a. stub
b. driver
c. pointer
d. process
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 4 of 71
lOMoARcPSD|36008826
20. _____________ consist of computer having multiple processors and memory that are connected
through a high speed back plane over the mother board or a simple configuration is to have a high
speed mother board into which CPU and memory cards can be inserted.
a. Multicomputer system
b. Singlecomputer system
c. Singleprocessor system
d. Multiprocessor system
22. The concept of multiple autonomous computers, having a private memory, communicating
through a communication network is called as ------------------
a. Parallel Computing
b. Distributed Computing
c. Cloud Computing
d. None of these
23. The _________ model is a distributed application structure that partitions task or workload between
the providers of a resource or service, called servers, and service requesters called clients.
a. Peer-to-peer
b. Client-server
c. Hybrid
d. None of these
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 5 of 71
lOMoARcPSD|36008826
25. In _____________ computing, the underlying hardware consists of a collection of similar workstations
closely connected by means of high speed LAN.
a. Grid
b. Network
c. Cube
d. Cluster
28. Distributed ___________ system is a set of information systems physically distributed over multiple
sites, which are connected with some kind of communication network.
a. Computing
b. Pervasive
c. Networking
d. Information
30. ____________________ is a concept that involves the passing of data between applications using a
communication channel that carries self-contained units of information (messages).
a. Message Oriented Middleware
b. RPC
c. Connection Oriented Middleware
d. Connectionless Oriented Middleware
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 6 of 71
lOMoARcPSD|36008826
31. _____________ are central to the implementation of the asynchronous interaction model within MOM
a. Stacks
b. RPC
c. LAN
d. Queues
32. A reference model developed to deal with all the communication issues using various levels is ------
______________
a. ISO
b. OSI
c. MOM
d. client-server
33. The standard rules that govern the format, contents, meaning of the messages sent and delivered
are collectively termed as ________________
a. Communication rules
b. Connection-oriented
c. Communication-oriented
d. Communication protocols
35. Dropping a letter in mailbox is an example of making use of ____________ communication service.
a. Connection-oriented
b. Communication rules
c. Communication protocols
d. Connectionless
36. Specific parameters of the communication protocol is negotiated when using __________- service.
a. Connection-oriented
b. Connectionless
c. Communication rules
d. Communication protocol
37. Each layer in the OSI model provides a/an ___________ to the layer above it.
a. Interface
b. Protocol
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 7 of 71
lOMoARcPSD|36008826
c. Network
d. Data link
38. The __________ consists of a set of operations that together define the service a layer is prepared to
offer.
a. Interface
b. Protocol
c. Data link
d. Network
40. The ____________ layer deals with standardizing how two computers are connected and the
representation of binary levels.
a. Data link
b. Network
c. Physical
d. Presentation
41. The application layer software adds an header to the front of the message and passes the resulting
message across the interface to the _______________ layer.
a. Transport
b. Session
c. Network
d. Presentation
42. __________________ layer of OSI model is responsible for real time streaming of data in various
applications.
a. Data Link
b. Transport
c. Network
d. Application
43. ___________ layer of OSI model provides the means to detect and possibly correct transmission errors
to keep a sender and receiver in the same pace.
a. Data Link
b. Transport
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 8 of 71
lOMoARcPSD|36008826
c. Network
d. Application
44. _____________ layer of OSI model contains the protocols to route the message for handling
congestion.
a. Data Link
b. Transport
c. Network
d. Application
45. ______________ layer is one of the lower level protocols in OSI model.
a. session
b. Transport
c. Network
d. Application
46. The transfer units used in physical layer of OSI model is ------------
a. Frames.
b. Units
c. Headers
d. Bits
47. Grouping of bits into frames is done by ----------- layer in OSI model.
a. Application
b. Transport
c. Network
d. Data Link
49. The process of choosing the best path to deliver the message from the sender to the receiver is
called _____________
a. Hoping
b. Path selection
c. Network
d. Routing
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 9 of 71
lOMoARcPSD|36008826
50. Upon receiving the message from application layer, the __________ layer breaks it into pieces for
transmission, assigns each one a sequence number and the sends them all.
a. Application
b. Transport
c. Network
d. Data Link
51. Providing the end to end communication without changing the original order is taken care by
_________ layer of OSI model.
a. Application
b. Transport
c. Network
d. Data Link
52. Internet protocol suite supports a connectionless transport protocol called ________.
a. Transmission Control Protocol.
b. Streaming Control Transfer Protocol.
c. Real-Time Transfer Protocol
d. Universal Datagram Protocol.
54. User programs which do not need connection-oriented protocol uses ------
a. Transmission Control Protocol.
b. Streaming Control Transfer Protocol.
c. Real-Time Transfer Protocol
d. Universal Datagram Protocol.
55. ________________ is a framework protocol in the sense that it specifies packet formats for real time
data without providing the actual mechanisms of guaranteeing data delivery.
a. Transmission Control Protocol.
b. Universal Datagram Protocol.
c. Real-time Transfer Protocol.
d. Streaming Control Transport protocol
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 10 of 71
lOMoARcPSD|36008826
61. Internet ______________ protocol defines the protocol for transferring files between client and server
machine.
a. Transmission Control
b. HyperText Transfer
c. File Transmission
d. File Transfer
62. _______________ is designed to remotely manage and handle transfer of web pages.
a. FTP
b. HTTP
c. TCP
d. TCP/IP
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 11 of 71
lOMoARcPSD|36008826
63. ______________ is a distributed service that is used to lookup a network address associated with a
name like ‘www.backbenchers.com’
a. Detailed Naming System
b. Domain Name System.
c. Domain Nomenclature System
d. None of these
66. With ____________ communication, a message that has been submitted for transmission is stored by
the communication middleware as long as it takes to deliver it to receiver.
a. Transient
b. Efficient
c. Consistent
d. Persistent
67. With ____________ communication, a message is stored by the communication system as long as the
sending and receiving applications are executing.
a. Transient
b. Persistent
c. Consistent
d. Efficient
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 12 of 71
lOMoARcPSD|36008826
69. With ____________ communication, the sender is blocked until its request is known to be accepted.
a. asynchronous
b. synchronous
70. RPC provides a/an ____________ on the client side, a separate one for each remote procedure.
a. Stub
b. Identifier
c. Name
d. Process identifier
71. A process that is based on IPC mechanism which executes on different systems and can
communicate with other processes using message-based communication, is called ____________
a. Local Procedure Call
b. Inter Process Communication
c. Remote Procedure Call
d. Remote Machine Invocation
73. To resolve the problem of data representation on different systems, RPC define ____________
a. Machine dependent data representation
b. Machine independent data representation
c. Stub dependent data representation
d. Stub independent data representation
74. With __________ RPC, the server, in principle, immediately sends a reply back to the client the
moment the RPC request is received.
a. Synchronous
b. Asynchronous
c. Code
d. None
75. ________________ is a user defined function that is invoked when a special event happens, such as an
incoming message.
a. Stub
b. Method
c. Service
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 13 of 71
lOMoARcPSD|36008826
d. Callback
76. In order to automatically start a process to fetch messages from an input queue, a ---------- is often
used that monitors the input queue.
a. daemon
b. stub
c. method
d. service
77. The ____________ stub contains the procedures called by the runtime system on the server machine
when an incoming message arrives.
a. client
b. server
c. daemon
d. service
79. A ___________ is a communication endpoint to which an application can write data that are to be
sent over an underlying network, and from which an incoming data can be read.
a. primitive
b. socket
c. stub
d. deamon
80. The listen operation of TCP/IP is called only in case of ________ communication.
a. Connection Oriented
b. Connectionless
c. Process Oriented
d. None
81. The ___________ operation of TCP/IP blocks the caller until a connection request arrives.
a. bind
b. listen
c. accept
d. close
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 14 of 71
lOMoARcPSD|36008826
82. The need to be hardware and platform independent eventually lead to the definition of a standard
for message passing simply called the ___________
a. Message Passing Interface (MPI)
b. RMI
c. RPC
d. None of these
84. _____________ measures the variation in packet delay, or the time it takes for a packet to reach its
destination.
a. Jitter
b. Bandwidth
c. Stream
d. None of these
87. Web access protocols fall under ____________ layer of OSI model.
a. Transport
b. Network
c. Application
d. None of these
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 15 of 71
lOMoARcPSD|36008826
c. Parameter marshalling
d. None of these
89. _______________ call semantic can be implemented by retransmission of the (call) request message
on time-out.
a. Maybe
b. Atleast once
c. Atmost once
d. None of these
92. ___________ Synchronization deals with understanding the temporal ordering of events produced by
concurrent processes.
a. Clock
b. Process
c. Data
d. None of these
93. We define the relation ‘->’ __________________ on the set of events of a system.
a. happened-after
b. happened-once
c. assignment
d. happened-before
94. A ________________ clock is a way of assigning a number to an event, where the number is thought
of as the time at which the event occurred.
a. logical
b. physical
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 16 of 71
lOMoARcPSD|36008826
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 17 of 71
lOMoARcPSD|36008826
101. Suppose that two processes detect the demise of the coordinator simultaneously and both decide
to hold an election using the bully algorithm. In this case, each of the higher-numbered processes
will get two ELECTION messages, but will ignore the second one. The election will proceed as usual.
a. The statement is True
b. The statement is False.
c. Cannot be determined.
102. If timestamps of two events are same, then the events are _______________
a. concurrent
b. non-concurrent
c. monotonic
d. non-monotonic
104. According to the ring algorithm, links between processes are ________________
a. bidirectional
b. unidirectional
c. both bidirectional and unidirectional
d. none of the above
107. In the token passing approach of distributed systems, processes are organized in a ring structure
____________
a. logically
b. physically
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 18 of 71
lOMoARcPSD|36008826
108. In single CPU systems, critical regions, mutual exclusion, and other synchronization problems are
solved using methods such as ------------
a. semaphores
b. deamons
c. clocks
d. None of the above
110. For algorithms where only internal consistency of clocks matters (not whether clocks are close to
real time), we speak of ________________ clocks.
a. Logical
b. Physical
c. Synchronous
d. Asynchronous
111. For algorithms where clocks must not only be the same, but also must not deviate from real-time,
we speak of ____________ clocks.
a. Logical
b. Physical
c. Synchronous
d. Asynchronous
112. ________________ is an active time server approach where the time server periodically broadcasts its
clock time and the other nodes receive the message to correct their own clocks.
a. Berkeley algorithm
b. Christian algorithm
c. Token ring algorithm
d. None of these
113. _______________ synchronization is a method of synchronizing clock values of any two nodes in a
distributed system with the use of external reference clock or internal clock value of the node.
a. Clock
b. Process
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 19 of 71
lOMoARcPSD|36008826
c. Data
d. None of these
114. ____________ algorithm overcomes limitation of faulty clock and malicious interference in passive
time server and also overcomes limitation of active time server algorithm.
a. Berkeley’s
b. Christian’s
c. Round Robin
d. Token
115. _______________ clock synchronization algorithm overcomes issue of scalability and single point of
failure as there is no common or global clock required.
a. Centralized
b. Distributed
c. Token Based
d. Ring Based
116. _______________ clock synchronization is the one in which each node shares its time with other nodes
and all the nodes set and adjust their times accordingly.
a. Internal
b. External
118. _______________ is used to provide a partial ordering of events with minimal overhead.
a. Lamport algorithm
b. Passive time server algorithm
c. Token Based algorithm
d. Ring Based algorithm
120. The ______________ algorithm makes no assumptions on the accuracy of each clock and does not
require a remote time server
a. Lamport
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 20 of 71
lOMoARcPSD|36008826
b. Berkeley
c. Christian
d. None of these
121. In ___________ mutual exclusion is achieved by passing a special message called token between the
processes.
a. Token based algorithm
b. Physical clock algorithm
c. Passive clock algorithm
d. Active clock algorithm
122. In the worst case, the Raymond’s tree-based algorithm requires ______ message invocation per
critical section entry.
a. 2 * ( Longest path length of the tree )
b. Longest path length of the tree +1
c. 2* Number of nodes – 1
d. None of these
123. Synchronization delay for Raymond’s tree based algorithm is ________ with N being number of nodes
in the tree and T being the maximum message transmission time.
a. (T * log N )/ 2
b. (T * log N-1 )/ 2
c. (T * log N )
124. If sd is synchronization delay, E the average CS(critical section)execution time then system
throughput = _____________
a. 1 / (sd + E).
b. 1 / (sd - E).
c. (sd + E).
d. None of these
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 21 of 71
lOMoARcPSD|36008826
d. None of these
129. In Low to moderate loads, average message traffic is ------- messages for Singhal heuristic approach.
a. N-1
b. N/2
c. N(N-1)/2
d. N*2
130. In high loads, message traffic is ------- messages for Singhal heuristic approach.
a. N-1
b. N/2
c. N(N-1)
d. N
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 22 of 71
lOMoARcPSD|36008826
c. 2TlogN+E
d. T(logN)+E
137. A process can be thought as three segments namely _____________, ________, _____________
a. data, code, extra
b. data, extra, execution
c. code, resource, execution
d. resource, execution, data
139. External assets (printer, etc) needed by the program is referenced in ----------- segment of the
process.
a. Execution
b. Code
c. Resource
d. Extra
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 23 of 71
lOMoARcPSD|36008826
142. ___________ migration is the relocation of process from its source node to another destination node.
a. Process
b. Code
143. A _____________ is basically either a Software or Hardware device used to evenly distribute and tack
the load of multiple processes on a Server.
a. load balancer
b. load scheduler
144. Imagine you are to compare reading a file using a single-threaded file server and a multithreaded
server. It takes 15 msec to get a request for work, dispatch it, and do the rest of the necessary
processing, assuming that the data needed are in a cache in main memory. If a disk operation is
needed, as is the case one-third of the time, an additional 75 msec is required, during which time
the thread sleeps. How many requests/sec can the server handle if it is single threaded?
a. 75
b. 66
c. 25
d. 50
146. Authentication and registration of the client at the server is often required in case of ________
migration approach.
a. sender-initiated
b. receiver-initiated
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 24 of 71
lOMoARcPSD|36008826
148. ___________ yields an exact copy of the original process on a different machine for an instance.
a. Migration
b. Cloning
149. A _____________ server maintains clients state information from one remote procedure call to the
next call.
a. stateless
b. stateful
151. ______________ server does not maintain any client state information.
a. stateless
b. stateful
152. _______________ is a technique to migrate the established TCP state from the original node to the
new node, so that the new node can send packets to the other TCP endpoint directly.
a. TCP handoff
b. TCP handshake
c. TCP/IP protocol
d. None of these
153. The _______________ provides the same interface as available at the server, but hides the possible
differences in machine architectures, as well as the actual communication.
a. proxy
b. stub
c. daemon
d. cookie
154. A ____________ is a computer that runs from resources stored on a central server instead of a localized
hard drive.
a. virtual machine
b. proxy
c. thin client
d. None of these
155. Load --------- approach attempts to avoid idle nodes while processes wait for being processed.
a. Assignment
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 25 of 71
lOMoARcPSD|36008826
b. Sharing
c. Balancing
d. Scheduling
162. _____ is the command for name resolution and reverse resolution.
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 26 of 71
lOMoARcPSD|36008826
a. Port
b. dig
c. host
d. DNS
163. _____ is the command to query DNS servers for arbitrary info.
a. nslookup
b. Arbi
c. DNS
d. host
167. What are the different ways in which clients and servers are dispersed across machines?
a. Servers may not run on dedicated machines
b. Servers and clients can be on same machines
c. Distribution cannot be interposed between a OS and the file system
d. OS cannot be distributed with the file system a part of that distribution
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 27 of 71
lOMoARcPSD|36008826
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 28 of 71
lOMoARcPSD|36008826
177. Which technique is based on compile-time program transformation for accessing remote data in a
distributed- memory parallel system?
a. cache coherence scheme
b. computation migration
c. remote procedure call
d. message passing
181. The capability of a system to adapt the increased service load is called
a. scalability
b. tolerance
c. capacity
d. none of the mentioned
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 29 of 71
lOMoARcPSD|36008826
d. RPC
184. A paradigm of multiple autonomous computers, having a private memory, communicating through
a computer network, is known as
a. Distributed computing
b. Cloud computing
c. Centralized computing
d. Parallel computing
189. Connections that grows exponentially into a new dynamic network of networks, is known as
a. Dynamic
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 30 of 71
lOMoARcPSD|36008826
b. Static
c. Transparent
d. Opaque
194. Which technique is based on compile-time program transformation for accessing remote data in a
distributed-memory parallel system.
a. Cache coherence scheme
b. computation migration
c. remote procedure call
d. message passing
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 31 of 71
lOMoARcPSD|36008826
196. The capability of a system to adapt the increased service load is called
a. scalability
b. tolerance
c. capacity
d. none of the mentioned
198. A system which is the result of interaction between computational processes and the physical
world’s known as
a. Cyber-processing system
b. Controlled-processing system
c. Controlled-physical system
d. Cyber-physical system
202. A dynamic connection that grows into dynamic networks of networks, is called
a. Cyber cycle
b. Internet of things
c. Cyber-physical system
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 32 of 71
lOMoARcPSD|36008826
203. The ability of distributed systems to run well in HPC and HTC applications, is known to be its
a. Efficiency
b. Flexibility
c. Dependability
d. Adaptation
205. The market-oriented high-end computing systems is derived from a strategic change from an HPC
to
a. HTC paradigm
b. SOA paradigm
c. MPP paradigm
d. Virtualization
207. An architecture in which no special machines manage the network resources is known as
a. A. Space based
b. Tightly coupled
c. Loosely coupled
d. Peer-to-Peer
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 33 of 71
lOMoARcPSD|36008826
b. 1 Client machine
c. Many Client machines
d. Many Server machines
211. An architecture that creates virtualization of one single address space, is called
a. Peer-to-Peer
b. Space based
c. Tightly coupled
d. Loosely coupled
212. The transparency that enables multiple instances of resources to be used, is called
a. Replication transparency
b. Scaling transparency
c. Concurrency transparency
d. Performance transparency
213. A paradigm of multiple autonomous computers, having a private memory, communicating through
a computer network, is known as
a. Distributed computing
b. Cloud computing
c. Centralized computing
d. Parallel computing
214. Cloud computing and web service platforms are focused on applications like
a. HPC
b. HTC
c. HCC
d. HRC
215. The type of architecture that is considered responsible for the success of
a. Two-tier architecture
b. Three-tier architecture
c. n-tier architecture
d. Peer-to-Peer architecture
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 34 of 71
lOMoARcPSD|36008826
218. The connections that grows exponentially into a new dynamic network of networks, is known as
a. Dynamic
b. Static
c. Transparent
d. Opaque
221. An architecture that move the client's query to a middle tier so that stateless clients can be used is
called
a. Peer-to-Peer architecture
b. Master/slave architecture
c. Client/Server architecture
d. Three-tier architecture
222. One of the first uses of grid computing was the breaking of a
a. Critical computed code
b. Tabulated code
c. Cryptographic code
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 35 of 71
lOMoARcPSD|36008826
d. Decryptographic code
224. All the resources are shared and integrated within one OS, in the computing paradigm named
a. Distributed computing
b. Parallel computing
c. Cloud computing
d. Centralized computing
226. All the resources are tightly coupled in the computing paradigm of
a. Cloud computing
b. Centralized computing
c. Distributed computing
d. Parallel computing
227. A set of highly integrated machines that run the same process in parallel is known to be
a. Tightly coupled
b. Loosely coupled
c. Space based
d. Peer-to-Peer
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 36 of 71
lOMoARcPSD|36008826
d. Singleframe computer
232. A model in which components of a software system are shared among multiple computers is known
as
a. Centralized computing
b. Parallel computing
c. Distributed computing
d. Decentralized computing
233. The applications that run on any available servers in some edge networks are known to be
a. Parallel cloud
b. Distributed cloud
c. Virtualized cloud
d. Centralized cloud
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 37 of 71
lOMoARcPSD|36008826
236. Providing Quality of Service (QoS) assurance, even tinder failure conditions, is the responsibility of
Dependability
a. Adaptation
b. Flexibility
c. Efficiency
d. Dependability
238. An architecture where clients first communicate the server for data then format and display it to the
users, is known as
a. Client/Server architecture
b. Three-tier architecture
c. Two-tier architecture
d. Peer-to-Peer architecture
241. A computing paradigm in which all computer resources are centralized in one physical system is
known to be
a. Centralized computing
b. Parallel computing
c. Distributed computing
d. Cloud computing
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 38 of 71
lOMoARcPSD|36008826
242. The transparency that enables accessing local and remote resources using identical operations is
called
a. Concurrency transparency
b. Access transparency
c. Performance transparency
d. Scaling transparency
246. The processors are either loosely coupled with distributed memory or tightly coupled with
centralized shared memory in the paradigm
a. Cloud computing
b. Distributed computing
c. Centralized computing
d. Parallel computing
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 39 of 71
lOMoARcPSD|36008826
248. The reliability and self-management from the chip to the system and application levels are the
measures of
a. Dependability
b. Flexibility
c. Adaptation
d. Efficiency
250. A computing model of a distributed architecture of large numbers of computers connected to solve
a complex problem is called
a. Linear computing
b. Grid computing
c. Layout computing
d. Compound computing
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 40 of 71
lOMoARcPSD|36008826
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 41 of 71
lOMoARcPSD|36008826
266. What are the different ways in which clients and servers are dispersed across machines?
a. Servers may not run on dedicated machines machines
b. Servers and clients can be on same machines
c. Distribution cannot be interposed between a OS and the file system
d. OS cannot be distributed with the file system a part of that distribution
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 42 of 71
lOMoARcPSD|36008826
268. What are the different ways file accesses take place?
a. sequential access
b. direct access
c. indexed sequential access
d. all of the mentioned
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 43 of 71
lOMoARcPSD|36008826
275. _____of the distributed file system are dispersed among various machines of distributed system.
a. Clients
b. Servers
c. Storage devices
d. All of the mentioned
277. Which one of the following hides the location where in the transparent network the file is stored?
a. transparent distributed file system
b. hidden distributed file system
c. escaped distribution file system
d. spy distributed file system
278. In distributed file system, when a file's physical storage location changes
a. file name needs to be changed
b. file name need not to be changed
c. file's host name needs to be changed
d. file's local name needs to be changed
279. In distributed file system, ______is mapping between naming logical and physical objects.
a. client interfacing
b. naming
c. migration
d. heterogeneity
280. In distributed file system, a file is uniquely identified by the combination of _____
a. host name
b. local name
c. the combination of host name and local name
d. none of the mentioned
281. There is no need to establish and terminate a connection through open and close operation in
a. stateless file service
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 44 of 71
lOMoARcPSD|36008826
282. In distributed file system, file name does not reveal the file's location
a. local name
b. physical storage location
c. both local name and physical storage location
d. none of the mentioned
285. Which are the two complementary deadlock-prevention schemes using time stamps?
a. The wait-die & wound-wait scheme
b. The wait-n-watch scheme
c. The wound-wait scheme
d. The wait-wound & wound-wait scheme
287. If timestamps of two events are same, then the events are ______
a. concurrent
b. non-concurrent
c. monotonic
d. non-monotonic
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 45 of 71
lOMoARcPSD|36008826
291. In the token passing approach of distributed systems, _____ processes are organized in a ring
structure
a. logically
b. physically
c. both logically and physically
d. none of the mentioned
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 46 of 71
lOMoARcPSD|36008826
300. The transparency that allows movement of resources and clients within a system is called
a. Concurrency transparency
b. Performance transparency
c. Replication transparency
d. Mobility transparency
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 47 of 71
lOMoARcPSD|36008826
c. Distributed computing
d. Distributed program
302. The market-oriented high-end computing systems is derived from a strategic change from an HPC
to
a. HTC paradigm
b. SOA paradigm
c. MPP paradigm
d. Virtualization
304. An architecture in which no special machines manage the network resources is known as
a. Space based
b. Tightly coupled
c. Loosely coupled
d. Peer-to-Peer
305. All the resources are shared and integrated within one OS, in the computing paradigm named
a. Distributed computing
b. Parallel computing
c. Cloud computing
d. Centralized computing
307. All the resources are tightly coupled in the computing paradigm of
a. Cloud computing
b. Centralized computing
c. Distributed computing
d. Parallel computing
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 48 of 71
lOMoARcPSD|36008826
308. A set of highly integrated machines that run the same process in parallel is known to be
a. Tightly coupled
b. Loosely coupled
c. Space based
d. Peer-to-Peer
310. A dynamic connection that grows into dynamic networks of networks, is called
a. Cyber cycle
b. Internet of things
c. Cyber-physical system
d. Multithreading
314. How it deals with failures like message loss, network partitioning, etc. is represented as ____
a. Fault Tolerance
b. Scalability
c. Openness
d. Transparency
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 49 of 71
lOMoARcPSD|36008826
a. Layered Architecture
b. Object-based Architecture
c. Data-Centered Architecture
d. Event-Based Architecture
a. Layered Architecture
b. Object-based Architecture
c. Data-Centered Architecture
d. Event-Based Architecture
a. Layered Architecture
b. Object-based Architecture
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 50 of 71
lOMoARcPSD|36008826
c. Data-Centered Architecture
d. Event-Based Architecture
a. Layered Architecture
b. Object-based Architecture
c. Data-Centered Architecture
d. Event-Based Architecture
319. _____________ model is a representation of the underlying hardware elements of a distributed system
a. Physical
b. Architectural
c. Fundamental
d. Security
320. __________ model defines the way in which the components of the system interact with each other
and the way in which they are mapped onto an underlying network of computers\
a. Physical
b. Architectural
c. Fundamental
d. Security
321. The purpose of ___________ model is to make explicit all relevant assumptions about the system we
are modeling.
a. Physical
b. Architectural
c. Fundamental
d. Security
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 51 of 71
lOMoARcPSD|36008826
322. ________ model is based on establishing the trustworthiness and role of each component such as
trusted users, trusted servers, trusted administrators and client
a. Physical
b. Architectural
c. Fundamental
d. Security
323. ________ model deals with performance and are used for handling time in distributed systems i.e. for
process execution, message delivery, clock drifts etc
a. Interaction
b. Architectural
c. Fundamental
d. Security
324. ____________ ensures that the distributed system should be perceived as the single entity by the
users
a. Transparency
b. Reliability
c. Failure Handling
d. Flexibility
325. The __________ of distributed system is determined primarily by the degree to which new resource-
sharing services can be added and be made available for use by a variety of client programs
a. Openness
b. Resource Sharing
c. Transparency
d. Scalability
326. Hide differences in data representation and how a resource is accessed is known as ___________
transparency
a. Access
b. Location
c. Migration
d. Relocation
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 52 of 71
lOMoARcPSD|36008826
328. Hide that a resource may move to another location is known as ___________ transparency
a. Access
b. Location
c. Migration
d. Relocation
329. Hide that a resource may be moved to another location while in use is known as ___________
transparency
a. Access
b. Location
c. Migration
d. Relocation
331. Hide that a resource may be shared by several competitive users is known as ___________
transparency
a. Concurrency
b. Location
c. Migration
d. Relocation
332. Hide the failure and recovery of a resource is known as ___________ transparency
a. Failure
b. Location
c. Migration
d. Relocation
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 53 of 71
lOMoARcPSD|36008826
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 54 of 71
lOMoARcPSD|36008826
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 55 of 71
lOMoARcPSD|36008826
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 56 of 71
lOMoARcPSD|36008826
a. Mini computer
b. Workstation
c. Workstation server
d. Processor pool
a. Mini computer
b. Workstation
c. Workstation server
d. Processor pool
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 57 of 71
lOMoARcPSD|36008826
a. Mini computer
b. Workstation
c. Workstation server
d. Processor pool
a. Mini computer
b. Workstation
c. Workstation server
d. Processor pool
349. _____ model is used when large amount of computing power is required for a short time
a. Mini computer
b. Workstation
c. Workstation server
d. Processor pool
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 58 of 71
lOMoARcPSD|36008826
353. In ___________ a timeout mechanism is used that prevents the caller from waiting indefinitely for a
response from the callee.
a. Possibly or May-Be Call Semantics
b. Last-Once Call Semantics
c. Last-of-Many Call Semantics
d. At-Least-Once Call Semantics
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 59 of 71
lOMoARcPSD|36008826
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 60 of 71
lOMoARcPSD|36008826
a. No Ordering
b. Absolute Ordering
c. Consistent Ordering
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 61 of 71
lOMoARcPSD|36008826
d. Casual Ordering
a. No Ordering
b. Absolute Ordering
c. Consistent Ordering
d. Casual Ordering
a. No Ordering
b. Absolute Ordering
c. Consistent Ordering
d. Casual Ordering
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 62 of 71
lOMoARcPSD|36008826
a. No Ordering
b. Absolute Ordering
c. Consistent Ordering
d. Casual Ordering
365. ________________ is a clock synchronization algorithm is used to synchronize time with a time server
by client processes
a. Cristian’s Algorithm
b. Berkeley algorithm
c. Network Time Protocol
d. None
366. The ___________ is a method of clock synchronization in distributed computing which assumes no
machine has an accurate time source
a. Cristian’s Algorithm
b. Berkeley algorithm
c. Network Time Protocol
d. None
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 63 of 71
lOMoARcPSD|36008826
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 64 of 71
lOMoARcPSD|36008826
a. Monotonic Read
b. Monotonic Write
c. Read Your Write
d. Writes Follow Read
a. Monotonic Read
b. Monotonic Write
c. Read Your Write
d. Writes Follow Read
372. Below figure is an example of ______________
a. Monotonic Read
b. Monotonic Write
c. Read Your Write
d. Writes Follow Read
a. Monotonic Read
b. Monotonic Write
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 65 of 71
lOMoARcPSD|36008826
374. In __________ all processes see only those memory reference operations in the correct order that are
potentially causally related
a. Casual Consistency
b. FIFO Consistency
c. Sequential Consistency
d. Release Consistency
375. __________ model tells whether a process is entering or exiting from a critical section so that the
system performs either of the operations when a synchronization variable is accessed by a process
a. Casual Consistency
b. FIFO Consistency
c. Sequential Consistency
d. Release Consistency
376. In ____________ every shared data item is associated with a synchronization variable
a. Entry consistency
b. FIFO Consistency
c. Sequential Consistency
d. Release Consistency
377. ____________ refers to the ability to roll back to the previous stable and consistent state when an
operation on a file is aborted by the client
a. Recoverability
b. Robustness
c. Availability
d. None
378. ____________ refers to power to survive crashes of the storage files and storage decays of the storage
medium on which it is stored
a. Recoverability
b. Robustness
c. Availability
d. None
379. ____________ refers to the fraction of time for which the file is available for use.
a. Recoverability
b. Robustness
c. Availability
d. None
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 66 of 71
lOMoARcPSD|36008826
382. ___________ is a series of computer networking standards covering electronic directory services
a. X.500
b. DNS
c. AFS
d. None
385. ________ is a platform independent remote file system technology created by Sun
Microsystems (Sun) in 1984
a. NFS
b. GFS
c. VFS
d. None
386. __________ is a very large scale distributed table indexed by row, column and timestamp (built on top
of GFS and Chubby
a. Bigtable
b. MapReduce
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 67 of 71
lOMoARcPSD|36008826
c. NFS
d. None
387. ___________ DFS provide the flexibility to the users to use different computer platforms for different
applications
a. Heterogeneous
b. Homogeneous
c. Multi-Processor
d. Multicomputer
388. _______ is the average amount of time required to satisfy the client requests
a. Performance
b. User Mobility
c. Scalability
d. None
389. In _________ migration, an entire process has to be moved from one machine to another
a. Process
b. Code
c. Both Process & Code
d. None
390. _____________ is the process of allocating system resources to many different tasks
a. Job scheduling
b. Code Migration
c. Process Migration
d. None
391. __________ Algorithms in ___________ class use the processor and process characteristics to allocate
processes to nodes
a. Deterministic
b. Probabilistic
c. Both Probabilistic and Deterministic
d. None
392. Algorithms in __________ class use information regarding static attributes of the system such as
number of nodes, processing capability, etc
a. Deterministic
b. Probabilistic
c. Both Probabilistic and Deterministic
d. None
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 68 of 71
lOMoARcPSD|36008826
393. In ________ method, nodes contain managers to send processes and contractors to receive processes
a. Bidding
b. Pairing
c. Shortest
d. Threshold
394. _____________ policy selects a random node and checks whether the node is able to receive the
process then it transfers the process. If the node rejects the transfer then another node is selected
randomly
a. Bidding
b. Pairing
c. Shortest
d. Threshold
396. The threshold value for a node is dynamically decided in ______ Policy
a. Static
b. Dynamic
c. Both Static and Dynamic
d. None
399. Token Ring Centralized mutual exclusion algorithm is used for _________
a. General allocation
b. Small group processes that does not change group membership
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 69 of 71
lOMoARcPSD|36008826
400. Delay for message is ____ message for Centralized mutual exclusion algorithm
a. 2
b. 2(n-1)
c. 0 to n-1
d. 3(n-1)
401. Delay for message is ____ message for Distributed mutual exclusion algorithm
a. 2
b. 2(n-1)
c. 0 to n-1
d. 3(n-1)
402. Delay for message is ____ token for Token Ring mutual exclusion algorithm
a. 2
b. 2(n-1)
c. 0 to n-1
d. 3(n-1)
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 70 of 71
lOMoARcPSD|36008826
Join BackkBenchers Community & become the Student Ambassador to represent your college & earn
15% Discount.
---------------------------------------------------------------------------------------------------------------------------------------
Be the Technical Content Writer with BackkBenchers and earn upto 100 Rs. per 10 Marks Questions.
---------------------------------------------------------------------------------------------------------------------------------------
Buy & Sell Final Year Projects with BackkBenchers. Project Charge upto 10,000.
---------------------------------------------------------------------------------------------------------------------------------------
Follow us on Social Media Profiles to get notified
---------------------------------------------------------------------------------------------------------------------------------------
❤ Handcrafted by BackkBenchers
DownloadedCommunity
by Shubham Gupta (iamguptashubham00@gmail.com) Page 71 of 71
lOMoARcPSD|36008826
Q.19) In isochronous transmission mode, it is necessary that data units are 2 points
transferred on efficiency
transferred on time
transferred on availability
transferred on network
Clear selection
token based
quoram based
Clear selection
tree to reduce
network traffic
message complexity
Synchronization delay
Clear selection
https://docs.google.com/forms/d/e/1FAIpQLSfJ_ToCzYAFpMff7BTvWX64asaFWDruNSe9Nnow8Frcu9TfmQ/formResponse 2/9
Downloaded by Shubham Gupta (iamguptashubham00@gmail.com)
lOMoARcPSD|36008826
Q.20) Lamport distributed mutual exclusion algorithm are executed in the 2 points
order of their
quoram
token
timestamp
clock
Clear selection
Liveness property
Safety property
Synchronization delay
Fairness
Clear selection
Client
server
Clear selection
https://docs.google.com/forms/d/e/1FAIpQLSfJ_ToCzYAFpMff7BTvWX64asaFWDruNSe9Nnow8Frcu9TfmQ/formResponse 3/9
Downloaded by Shubham Gupta (iamguptashubham00@gmail.com)
lOMoARcPSD|36008826
referred to as _____________
load balancing
load scheduling
load performing
network traffic
Clear selection
___________
handshaking
polling
token passing
messaging
Clear selection
network traffic
message complexity
Synchronisation delay
Clear selection
https://docs.google.com/forms/d/e/1FAIpQLSfJ_ToCzYAFpMff7BTvWX64asaFWDruNSe9Nnow8Frcu9TfmQ/formResponse 4/9
Downloaded by Shubham Gupta (iamguptashubham00@gmail.com)
lOMoARcPSD|36008826
Transparencies
shared memory
Mutual exclusion
distributed nature
Clear selection
http
telnet
rpc
ftp
Clear selection
Transport Layer
Application Layer
Session Layer
Presentation Layer
Clear selection
https://docs.google.com/forms/d/e/1FAIpQLSfJ_ToCzYAFpMff7BTvWX64asaFWDruNSe9Nnow8Frcu9TfmQ/formResponse 5/9
Downloaded by Shubham Gupta (iamguptashubham00@gmail.com)
lOMoARcPSD|36008826
Token-based approach
timestamp based
Non-token-based approach
Quorum-based approach
Clear selection
group processes
processes
Clear selection
fixed routing
virtual routing
dynamic routing
Clear selection
https://docs.google.com/forms/d/e/1FAIpQLSfJ_ToCzYAFpMff7BTvWX64asaFWDruNSe9Nnow8Frcu9TfmQ/formResponse 6/9
Downloaded by Shubham Gupta (iamguptashubham00@gmail.com)
lOMoARcPSD|36008826
Q.8) Remote procedure calls and remote object invocations contribute to 2 points
enhance
Network Transparency
Transparency
Naming Transparency
Access Transparency
Clear selection
Q.7) In distributed system, each processor has its own ___________ 2 points
local memory
clock
shared memory
Clear selection
Nelson
Clear selection
https://docs.google.com/forms/d/e/1FAIpQLSfJ_ToCzYAFpMff7BTvWX64asaFWDruNSe9Nnow8Frcu9TfmQ/formResponse 7/9
Downloaded by Shubham Gupta (iamguptashubham00@gmail.com)
lOMoARcPSD|36008826
Maekawa’s algorithm
Lamport algorithm
Ricart–Agrawala algorithm
Clear selection
Shared RAM
Cache memory
Clear selection
Lamport algorithm
Ricart–Agrawala algorithm
Maekawa’s algorithm
Clear selection
https://docs.google.com/forms/d/e/1FAIpQLSfJ_ToCzYAFpMff7BTvWX64asaFWDruNSe9Nnow8Frcu9TfmQ/formResponse 8/9
Downloaded by Shubham Gupta (iamguptashubham00@gmail.com)
lOMoARcPSD|36008826
host ID
process ID
identifier
Clear selection
text
graph
movie
data
Clear selection
Back Submit
This form was created inside of Mahatma Education Society. Report Abuse
Forms
https://docs.google.com/forms/d/e/1FAIpQLSfJ_ToCzYAFpMff7BTvWX64asaFWDruNSe9Nnow8Frcu9TfmQ/formResponse 9/9
Downloaded by Shubham Gupta (iamguptashubham00@gmail.com)
lOMoARcPSD|36008826
Question Question
No
1. Token based algorithms require 2 or more successive rounds of message exchanges among the
sites
a. TRUE
b. FALSE
2. Synchronization delay is
a. The time interval a request waits for its CS execution to be over after its request messages
have been sent out.
b. The time required after a site leaves the CS and before the next site enters the CS
c. The rate at which the system executes requests for the CS.
d. None of the above
3. The response time is
a. The rate at which the system executes requests for the CS.
b. The time required after a site leaves the CS and before the next site enters the CS.
c. The time interval a request waits for its CS execution to be over after its request
messages have been sent out
d. None of the above
4. System Throughput is
a. The rate at which the system executes requests for the CS
b. The time required after a site leaves the CS and before the next site enters the CS.
c. The time interval a request waits for its CS execution to be over after its request messages
have been sent out.
d. None of the above
5. Lamport's algorithm for mutual exclusion requires
a. 4(n-1) messages per CS invocation
b. (n-1) messages per CS invocation
c. n messages per CS invocation
d. 3(n-1)messages per CS invocation
6. Ricart and Agrawala’s algorithm for mutual exclusion requires
a. (n-1) messages per CS invocation
b. n messages per CS invocation
c. 2(n-1) messages per CS invocation
d. None of the above
7. In which algorithm the execution of a CS requires √N REQUEST, √N REPLY and √N
RELEASE messages in
a. Ring Algorithm
b. Maekawa algorithm
c. Lamport's algorithm
d.Ricart and Agrawala’s algorithm
a. Si cannot grant Sj’s request because it has currently granted permission to a site with a
higher priority request.
b. Si would like to find out from Sj ,if it has succeeded in locking all sites in its request set.
c. Si is returning the permission to Sj
d. None of the above
An inquire message from Si to Sj indicates that
10. a. Si cannot grant Sj’s request because it has currently granted permission to a site with a
higher priority request.
b. Si would like to find out from Sj ,if it has succeeded in locking all sites in its request set
c. Si is returning the permission to Sj.
d. None of the above
Communication in distributed systems is based on
11.
a. High level message passing
b. Low level message passing
c. Middleware message passing
d. Layered protocol
12. In distributed systems which of the following models are used for communication
a. Message -oriented RPC
b. Remote Procedure call
c. Data Streaming
d. All of the above
c. a server program
d. all of the mentioned
16. The local operating system on the server machine passes the incoming packets to the
a. Server stub
b. client stub
c. client operating system
d. none of the above
17. Which RPC is useful when a reply will be returned but client is not prepared to wait for it
and do nothing in meantime?
a. Synchronous RPC
b. Asynchronous RPC
c. One-way RPC
d. Deferred RPC
18. There are number of services that form part of DCE(Distributed Computing
Environment) itself. Which service provides a transparent way of accessing any file in the
system in the same way worldwide.
a. Directory Service
b. Security Service
c. Distributed File Service
d. Distributed time Service
19. Language-level objects, from which proxy and skeletons are automatically generated.
Depends on the particular language are called as
a. Transient objects
b. Compile time objects
c. Runtime objects
d. Persistent Objects
A client binds to a distributed object: an implementation of the object’s interface,
20. called a , is loaded into the client’s address space.
a. Skeleton
b. Proxy
c. Client stub
d. Server Stub
21. The data stores in client centric consistency models have
a. No simultaneous updates
b. Very strong consistency models
c. Inconsistencies that cannot be hidden
d. None of the above
Eventual consistency essentially requires only that updates are guaranteed to propagate
22. to all replicas
a. True
b. False
23. Eventual consistent data store provides better performance when no of replicas accessed is
limited to
a. 2^no. of clients
b. 2^no. of clients-1
c. One
d. Both a and b
24. If a process has seen a value of X at time t, then it will never see an older version of X at a
later time. This consistency model is
a. Monotonic writes
b. Monotonic reads
c. Monotonic writes and reads
d. None of the above
25. A write operation is always completed before a successive read operation by the same
process, no matter where that read operation takes place. This consistency model is
a. Read after writes
b. Writes after reads
c. Read your writes
d. Writes your reads
26. In writes follow reads consistency models, the updates are propagated as a result of
previous read operations
a. True
b. False
c. Selectively true
d. Selectively false
27. If no updates take place for a long time, all replicas will gradually become consistent. This
form of consistency is called
a. Local consistency
b. Strict local consistency
c. Eventual consistency
Question Questions
Number
1 The transperancy that enables multiple instances of resources to be used is
called -----
Options Replication transperancy b. location transperancy c. Migration
transperancy d. scaling transperancy
2 Which of the following is not a part of grid computing architecture
Options Fabric layer b.Collective layer c. connectivity layer d. Presentation layer
3 The key feature of cluster computing is
Options Serial Computing b. Homogenity c. Hardware Independence d. None of the
above
4 In grid computing, the grid middlware layer consists of the following-
Options Collective Layer b. Connectivity layer c. Resource layer d. All of the above
5 In earlier enterprise middleware systems was a component that helped in
providing a logical division of work and allows accessing of multiple
servers/databases.
Options Cluster b. TP monitor c. Middleware c. Web server
6 Remote Procedure call (RPC) operates at _ level
Options Object b. Application c. Middleware d. Database
7 Which of the following is not a goal of distributed system
Options Openness b. resource accessibility c. security d. Scalability
8 In RPC, while a server is processing the call, the client is blocked