DCS MCQs Unit 1to4 Sir

Download as pdf or txt
Download as pdf or txt
You are on page 1of 20

Department of Information Technology

Subject: DCS Multiple Choice Questions


Unit 1: FUNDAMENTALS AND ARCHITECTURES
1. In distributed system each processor has its own
a) local memory
b) clock
c) both local memory and clock
d) none of the mentioned
Answer - c

2. If one site fails in distributed system


a) the remaining sites can continue operating
b) all the sites will stop working
c) directly connected sites will stop working
d) none of the mentioned
Answer - a

3. Network operating system runs on


a) server
b) every system in the network
c) both server and every system in the network
d) none of the mentioned
Answer-a

4. Which technique is based on compile-time program transformation for accessing remote data
in a distributed-memory parallel system.
a) cache coherence scheme
b) computation migration
c) remote procedure call
d) message passing
Answer-b

5. Logical extension of computation migration is


a) process migration
b) system migration
c) thread migration
d) data migration
Answer- a

6. Processes on the remote systems are identified by


a) host ID
b) host name and identifier
c) identifier
d) process ID

Answer- b

7. Which routing technique is used in distributed system?


a) fixed routing
b) virtual routing
c) dynamic routing
d) all of the mentioned
Answer-d

8. In distributed systems, link and site failure is detected by


a) polling
b) handshaking
c) token passing
d) none of the mentioned
Answer-b

9. The capability of a system to adapt the increased service load is called


a) scalability
b) tolerance
c) capacity
d) none of the mentioned
Answer-a

10. Internet provides _______ for remote login.


a) telnet
b) http
c) ftp
d) RPC

Answer-a
Unit 2: COMMUNICATION AND COORDINATION
1. An RPC (remote procedure call) is initiated by the
a) server
b) client
c) both server and client
d) none of the mentioned

Answer: b

2. In RPC, while a server is processing the call, the client is blocked


a) unless the client sends an asynchronous request to the server
b) unless the call processing is complete
c) for the complete duration of the connection
d) none of the mentioned

Answer: a

3. Remote procedure calls is


a) inter-process communication
b) a single process
c) a single thread
d) none of the mentioned
Answer: a

4. RPC allows a computer program to cause a subroutine to execute in


a) its own address space
b) another address space
c) both its own address space and another address space
d) none of the mentioned

Answer: b

5. RPC works between two processes. These processes must be


a) on the same computer
b) on different computers connected with a network
c) both on the same computer and on different computers connected with
a network
d) none of the mentioned

Answer: c

6. A remote procedure is uniquely identified by


a) program number
b) version number
c) procedure number
d) all of the mentioned
Answer: d

7. An RPC application requires


a) specific protocol for client server communication
b) a client program
c) a server program
d) all of the mentioned

Answer: d

8. RPC is used to
a) establish a server on remote machine that can respond to queries
b) retrieve information by calling a query
c) both establish a server on remote machine that can respond to queries
and retrieve information by calling a query
d) none of the mentioned

Answer: c

9. RPC is a
a) synchronous operation
b) asynchronous operation
c) time independent operation
d) none of the mentioned
Answer: a

10. The local operating system on the server machine passes the
incoming packets to the
a) server stub
b) client stub
c) client operating system
d) none of the mentioned

Answer: a

11. Remote Procedure Calls are used :


a) for communication between two processes remotely different from
each other on the same system
b) for communication between two processes on the same system
c) for communication between two processes on separate systems
d) None of the mentioned

Answer: c
.
12. To differentiate the many network services a system supports
______ are used.
a) Variables
b) Sockets
c) Ports
d) Service names

Answer: c
.
13. RPC provides a(an) _____ on the client side, a separate one for each
remote procedure.
a) stub
b) identifier
c) name
d) process identifier

Answer: a

14. The stub :


a) transmits the message to the server where the server side stub receives
the message and invokes procedure on the server side
b) packs the parameters into a form transmittable over the network
c) locates the port on the server
d) all of the mentioned

Answer: d
15. To resolve the problem of data representation on different systems
RPCs define _____________
a) machine dependent representation of data
b) machine representation of data
c) machine-independent representation of data
d) none of the mentioned

Answer: c

16. The full form of RMI :


a) Remote Memory Installation
b) Remote Memory Invocation
c) Remote Method Installation
d) Remote Method Invocation

Answer: d

17. The remote method invocation :


a) allows a process to invoke memory on a remote object
b) allows a thread to invoke a method on a remote object
c) allows a thread to invoke memory on a remote object
d) allows a process to invoke a method on a remote object

Answer: b
18. In distributed systems, a logical clock is associated with
a) each instruction
b) each process
c) each register
d) none of the mentioned

Answer: b

19. If timestamps of two events are same, then the events are
a) concurrent
b) non-concurrent
c) monotonic
d) non-monotonic

Answer: a

20. If a process is executing in its critical section


a) any other process can also execute in its critical section
b) no other process can execute in its critical section
c) one more process can execute in its critical section
d) none of the mentioned
Answer: b

.
21. A process can enter into its critical section
a) anytime
b) when it receives a reply message from its parent process
c) when it receives a reply message from all other processes in the
system
d) none of the mentioned
Answer: c

22. For proper synchronization in distributed systems


a) prevention from the deadlock is must
b) prevention from the starvation is must
c) prevention from the deadlock & starvation is must
d) none of the mentioned

Answer: c

23. In the token passing approach of distributed systems, processes are


organized in a ring structure
a) logically
b) physically
c) both logically and physically
d) none of the mentioned
Answer: a

24. In distributed systems, transaction coordinator


a) starts the execution of transaction
b) breaks the transaction into number of sub transactions
c) coordinates the termination of the transaction
d) all of the mentioned
Answer: d

25. In case of failure, a new transaction coordinator can be elected by


a) bully algorithm
b) ring algorithm
c) both bully and ring algorithm
d) none of the mentioned
Answer: c.

26. In distributed systems, election algorithms assumes that


a) a unique priority number is associated with each active process in
system
b) there is no priority number associated with any process
c) priority of the processes is not required
d) none of the mentioned
Answer: a

27. According to the ring algorithm, links between processes are


a) bidirectional
b) unidirectional
c) both bidirectional and unidirectional
d) none of the mentioned
Answer: b

Unit 3: REPLICATION AND FAULT TOLERANCE


1] ___________ is a set of technologies for copying and distributing data and database
objects from one database to another.
a) Replication
b) Database Mirroring
c) Log Shipping
d) None of the mentioned

2] A replica set member becomes _________ when its replication process falls so far behind
that the primary overwrites oplog entries the member has not yet replicated.
a) stale
b) state
c) dead
d) secondary
3] For most replica sets, the hostnames in the _________ field never change.
a) tag
b) host
c) rs
d) none of the mentioned

4] How many types of replication is provided by SQL Server?


a) 2
b) 3
c) 4
d) 5

5] Point out the wrong statement :


a) Log shipping and mirroring allows to maintain complete database redundancy
b) Replication allows to maintain some part of the database (a set of required objects) at users
location
c) Replication is object level low availability feature
d) All of the mentioned

6] Which of the following is disadvantage of replication?


a) Improved performance
b) To move data closer to the user
c) Easy maintenance
d) None of the mentioned

9] Which of the following makes data available for replication?


a) Article
b) Publisher
c) Distributor
d) Subscription

10] What type of fault remains in the system for some period and then disappears?
a) Permanent
b) Transient
c) Intermittent
d) All of the mentioned

11] All fault-tolerant techniques rely on


a) Integrity
b) Dependability
c) Redundancy
d) None of the mentioned

12] It is imperative for a communicating processes to reach consistent recovery points to


avoid the _________ effect, with backward error recovery mechanism.
a) Static
b) Dynamic
c) Domino
d) Whirlpool

13] A fault creates one or more

A. Latent error
B. Mistake
C. Failure
D. None of above

14] “A client is assigned all user presentation tasks and the processes associated with data
entry”.Which option supports the client’s situation?
a) Distributed logic
b) Distributed presentation
c) Remote presentation
d) All of the mentioned

15] The architecture of a replica set affects the set’s _________ and capability.
a) scalability
b) capacity
c) performance
d) all of the mentioned

16] _________ for a replica set is the number of members that can become unavailable and
still leave enough members in the set to elect a primary.
a) Fault tolerance
b) Reliability
c) Security
d) None of the mentioned

17] _________ sets also allow the routing of read operations to specific machines.
a) Field
b) Read
c) Tag
d) All of the mentioned

18] The common mechanism used to find latent failure in memory modules:
a) Sniffing
b) Scrubbing
c) Swapping
d) Paging

19] Which one of the property is NOT a requirement for Fault Tolerance?
a) Fault Containments
b) Fault Isolation
c) Dynamic Recovery
d) Fail Safe

20] Replication should be used when which of the following exist?

a) When transmission speeds and capacity in a network prohibit frequent refreshing of large
tables.

b) When using many nodes with different operating systems and DBMSs and database designs.
c) The application's data can be somewhat out-of-date.

d) All of the above.

Unit 4: DISTRIBUTED FILES AND MULTIMEDIA SYSTEMS


1] A multimedia file
a) is same as any other regular file.
b) must be accessed at specific rate.
c) stored on remote server can not be delivered to its client.
d) none of the mentioned.

2] In which type of streaming multimedia file is delivered to the client, but not shared?
a) real-time streaming.
b) progressive download.
c) compression.
d) none of the mentioned.

3] Which one of the following is the characteristic of a multimedia system?


a) high storage.
b) high data rates
c) both high storage and high data rates
d) none of the mentioned

4]Multimedia system require hard real time scheduling


a) to ensure critical tasks will be serviced within timing deadlines
b) to deliver the media file to the client
c) to minimize the delay
d) for security

5] Which of the following is not a potential advantage of an active directory domain?

A. Centralized user management

B. Cross-platform compatibility

C. Enhanced security management

D. Ability to deploy software and settings on a large scale

6] Which of the following groups can always login to a server via Directory Services
Restore Mode?

A. Administrators only

B.Administrators and Power Users

C. Administrators and Backup Operators

D. Power Users and Backup Operators


7] ______ is a unique tag, usually a number, identifies the file within the file system.
a) File identifier
b) File name
c) File type
d) None of the mentioned

8] File type can be represented by


a) file name
b) file extension
c) file identifier
d) none of the mentioned

9] . file system fragmentation occurs when


a) unused space or single file are not contiguous
b) used space is not contiguous
c) unused space is non-contiguous
d) multiple files are non-contiguous

10] Which one of the following explains the sequential file access method?
a) random access according to the given byte number
b) read bytes one at a time, in order
c) read/write sequentially by record
d) read/write randomly by record

11] A DNS client is called


a) DNS updater
b) DNS resolver
c) DNS handler
d) none of the mentioned

12] DNS database contains


a) name server records
b) hostname-to-address records
c) hostname aliases
d) all of the mentioned

13]The right to use a domain name is delegated by domain name registers which are
accredited by
a) internet architecture board
b) internet society
c) internet research task force
d) internet corporation for assigned names and numbers

14] Which one of the following is not true?


a) multiple hostnames may correspond to a single IP address
b) a single hostname may correspond to many IP addresses
c) a single hostname may correspond to a single IP address
d) none of the mentioned

15] When using HDFS, what occurs when a file is deleted from the command line?
A.It is permanently deleted if trash is enabled.
B.It is placed into a trash directory common to all users for that cluster.
C.It is permanently deleted and the file attributes are recorded in a log file.
D.It is moved into the trash directory of the user who deleted it if trash is enabled

16] Under HDFS federation

A - Each namenode manages metadata of the entire filesystem.

B - Each namenode manages metadata of a portion of the filesystem.

C - Failure of one namenode causes loss of some metadata availability from the entire
filesystem.

D - Each datanode registers with each namenode.

17] The file once create cannot be changed is called


a) immutable file
b)mutexfile
c)mutablefile
d) none of the mentioned

17] In distributed file system, _______ is mapping between logical and physical objects.
a)client interfacing
b) naming
c) migration
d) heterogeneity

18] Which one of the following is a distributed file system?


a) andrew file system
b) network file system
c) novel network
d) all of the mentioned.

19] In distributed file system, when a file’s physical storage location changes
a) file name need to be changed
b) file name need not to be changed
c) file’s host name need to be changed
d) file’s local name need to be changed

20] What are the different ways in which clients and servers are dispersed across
machines ?
a) Servers may not run on dedicated machines
b) Servers and clients can be on same machines
c) Distribution cannot be interposed between a OS and the file system
d) OS cannot be distributed with the file system a part of that distribution

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy