DCS MCQs Unit 1to4 Sir
DCS MCQs Unit 1to4 Sir
DCS MCQs Unit 1to4 Sir
4. Which technique is based on compile-time program transformation for accessing remote data
in a distributed-memory parallel system.
a) cache coherence scheme
b) computation migration
c) remote procedure call
d) message passing
Answer-b
Answer- b
Answer-a
Unit 2: COMMUNICATION AND COORDINATION
1. An RPC (remote procedure call) is initiated by the
a) server
b) client
c) both server and client
d) none of the mentioned
Answer: b
Answer: a
Answer: b
Answer: c
Answer: d
8. RPC is used to
a) establish a server on remote machine that can respond to queries
b) retrieve information by calling a query
c) both establish a server on remote machine that can respond to queries
and retrieve information by calling a query
d) none of the mentioned
Answer: c
9. RPC is a
a) synchronous operation
b) asynchronous operation
c) time independent operation
d) none of the mentioned
Answer: a
10. The local operating system on the server machine passes the
incoming packets to the
a) server stub
b) client stub
c) client operating system
d) none of the mentioned
Answer: a
Answer: c
.
12. To differentiate the many network services a system supports
______ are used.
a) Variables
b) Sockets
c) Ports
d) Service names
Answer: c
.
13. RPC provides a(an) _____ on the client side, a separate one for each
remote procedure.
a) stub
b) identifier
c) name
d) process identifier
Answer: a
Answer: d
15. To resolve the problem of data representation on different systems
RPCs define _____________
a) machine dependent representation of data
b) machine representation of data
c) machine-independent representation of data
d) none of the mentioned
Answer: c
Answer: d
Answer: b
18. In distributed systems, a logical clock is associated with
a) each instruction
b) each process
c) each register
d) none of the mentioned
Answer: b
19. If timestamps of two events are same, then the events are
a) concurrent
b) non-concurrent
c) monotonic
d) non-monotonic
Answer: a
.
21. A process can enter into its critical section
a) anytime
b) when it receives a reply message from its parent process
c) when it receives a reply message from all other processes in the
system
d) none of the mentioned
Answer: c
Answer: c
2] A replica set member becomes _________ when its replication process falls so far behind
that the primary overwrites oplog entries the member has not yet replicated.
a) stale
b) state
c) dead
d) secondary
3] For most replica sets, the hostnames in the _________ field never change.
a) tag
b) host
c) rs
d) none of the mentioned
10] What type of fault remains in the system for some period and then disappears?
a) Permanent
b) Transient
c) Intermittent
d) All of the mentioned
A. Latent error
B. Mistake
C. Failure
D. None of above
14] “A client is assigned all user presentation tasks and the processes associated with data
entry”.Which option supports the client’s situation?
a) Distributed logic
b) Distributed presentation
c) Remote presentation
d) All of the mentioned
15] The architecture of a replica set affects the set’s _________ and capability.
a) scalability
b) capacity
c) performance
d) all of the mentioned
16] _________ for a replica set is the number of members that can become unavailable and
still leave enough members in the set to elect a primary.
a) Fault tolerance
b) Reliability
c) Security
d) None of the mentioned
17] _________ sets also allow the routing of read operations to specific machines.
a) Field
b) Read
c) Tag
d) All of the mentioned
18] The common mechanism used to find latent failure in memory modules:
a) Sniffing
b) Scrubbing
c) Swapping
d) Paging
19] Which one of the property is NOT a requirement for Fault Tolerance?
a) Fault Containments
b) Fault Isolation
c) Dynamic Recovery
d) Fail Safe
a) When transmission speeds and capacity in a network prohibit frequent refreshing of large
tables.
b) When using many nodes with different operating systems and DBMSs and database designs.
c) The application's data can be somewhat out-of-date.
2] In which type of streaming multimedia file is delivered to the client, but not shared?
a) real-time streaming.
b) progressive download.
c) compression.
d) none of the mentioned.
B. Cross-platform compatibility
6] Which of the following groups can always login to a server via Directory Services
Restore Mode?
A. Administrators only
10] Which one of the following explains the sequential file access method?
a) random access according to the given byte number
b) read bytes one at a time, in order
c) read/write sequentially by record
d) read/write randomly by record
13]The right to use a domain name is delegated by domain name registers which are
accredited by
a) internet architecture board
b) internet society
c) internet research task force
d) internet corporation for assigned names and numbers
15] When using HDFS, what occurs when a file is deleted from the command line?
A.It is permanently deleted if trash is enabled.
B.It is placed into a trash directory common to all users for that cluster.
C.It is permanently deleted and the file attributes are recorded in a log file.
D.It is moved into the trash directory of the user who deleted it if trash is enabled
C - Failure of one namenode causes loss of some metadata availability from the entire
filesystem.
17] In distributed file system, _______ is mapping between logical and physical objects.
a)client interfacing
b) naming
c) migration
d) heterogeneity
19] In distributed file system, when a file’s physical storage location changes
a) file name need to be changed
b) file name need not to be changed
c) file’s host name need to be changed
d) file’s local name need to be changed
20] What are the different ways in which clients and servers are dispersed across
machines ?
a) Servers may not run on dedicated machines
b) Servers and clients can be on same machines
c) Distribution cannot be interposed between a OS and the file system
d) OS cannot be distributed with the file system a part of that distribution