1. A glue between client and server parts of application package middleware firmware system software 2. How is access to resources of various machines is done? ftp is not used remote logging using ssh or telnet ftp is used zone are configured for automatic access 3. Process Fail - Stop in process omission faults can be detected in synchronous system. can be detected in synchronous and asynchronous system. can be detected in asynchronous system. can be detected in standalone system. 4. Which address is used to identify a process on a host by the transport layer? specific address logical address physical address port address 5. Distributed pervasive system is also known as ubiquitous computing peer to peer system graphical user interface user interface design 6. change the state of thread from suspe start() yield() destroy() run() 7. Type of cluster computing is load balancing cluster load sharing cluster load replication cluster load holding cluster 8. Which of the following allocates/deallocates buffers rrl stub/skeleton layer networking layer transport layer 9. Absolute time synchronization can be achieved using lamports method ricart-agrawala algorithm christians method vector time stamping method 10. OSI stands for open service internet operating system interface optical serviceimplementation open system interconnection 11. What are the characteristics of computation migration? execute an entire process or parts of it at same site execute an entire process or parts of it at different sites transfer data by entire file or immediate portion required transfer the computation rather than the data 12. Which algorithm requires "1 to 8" messages to enter and leave a critical region? distributed algorithm token ring algorithm centralized algorithm decentralized algorithm 13. The hardware of DS has two types uniprocessor system,multicomputer system multiprocessor system,multicomputer system uniprocessor system,unicomputer system multiprocessor system,unicomputer system 14. Pretransfering also known as precopying premigrating prefiltering postcopying 15. Absolute time ordering of all shared accesses matters in weak consistency sequential consistency casual consistency strict consistency 16. This is not feature of cooperative algorithm complex larger overhead worst stability better stability 17. What are the characteristics of data migration? execute an entire process or parts of it at same site transfer data by entire file or immediate portion required transfer the computation rather than the data execute an entire process or parts of it at different sites 18. Which mutual exclusion algorithm is useful when the membership of the group is unknown? lamports. decentralized algorithm centralized token ring 19. What are the characteristics of process migr execute an entire process or parts of it at different sites transfer the computation rather than the data transfer data by entire file or immediate portion required execute an entire process or parts of it at same site 20. In all reliable multicast group communication response from any of the receiver required response from \m\(1 n\ response expected from the receiver response needed from all the receivers 21. Type of grid computing is process grid system grid collaborative grid channel grid 22. What is the feature of stateful server? simple server design longer server recovery time file operations must be idempotent quick recovery after reboot 23. Distributed syatem consists of set of resour printer processes cd processor 24. Scaling transparency hides system security system failure system collaboration system expansion 25. Which event is concurrent with the vector clock (2, 8, 4)? (4,8,2) (3,9,5) (1,7,3) (3,8,4) 26. Internet provides for remote login. rpc telnet ftp http 27. In Casual consistency model all processes shared accesses in specific order random order sequential order same order 28. The dynamic replication algorithm takes into account schedule process migration to reduce load on server resource sharing files on server can be migrated anywhere 29. replicas are used only to improve access time on data client initiated dynamic permanent server initiated 30. Optimistic logging protocols need to keep track of erroneous state checking points dependencies independencies 31. File Replication is done to increase reliability increase data increase cost increase complexity 32. Processor Consistency model guarantees and conforms that all write accomplished on random memory location in identical sequence all write accomplished on identical memory location in random order all write accomplished on identical memory location in identical sequence. all write accomplished on random memory location in random sequence 33. Staleness deviations relate to the a replica was updated. last time previous time most recent time first time 34. In which of the following consistency model all writes become perceptible to all processes weak strict sequential casual 35. in NFS which funtion is used for creating new file? open() create() null() develope() 36. To resolve the problem of data representation on different systems RPCs define _____________ machine-independent representation of data machine dependent representation of data machine representation of data None of the options 37. which command is used to create a directory rmdir symlink mkdir open 38. In HDFS file System, NameNode is used when the Primary NameNode goes down. primary rack data secondary 39. What is stub? locates the port on the server transmits the message to the server where the server side stub receives the message and invokes procedure on the server side packs the parameters into a form transmittable over the network All of the options 40. What is the full form of RMI? remote method invocation remote method installation remote memory invocation remote memory installation 41. To improve performance, many distributed systems combine check pointing with message logging combine check pointing with distributed commit combine distributed commit with message logging. combine check pointing with recovery oriented computing 42. The remote method invocation __________ allows a process to invoke a method on a remote object allows a thread to invoke a method on a remote object allows a process to invoke memory on a remote object allows a thread to invoke memory on a remote object 43. What is not true about a distributed system? they do not share memory all processors are synchronized it is a collection of processor None of the options 44. In context of HDFS file system, Point out the wrong statement. block report from each datanode contains a list of all the blocks that are stored on that datanode user data is stored on the local file system of datanodes replication factor can be configured at a cluster level (default is set to 3) and also at a file level datanode is aware of the files to which the blocks stored on it belong to 45. In which file system mapreduce function is used? nfs hdfs afs None of the options 46. In HDFS, . is the slave/worker node and holds the user data in the form of Data Blocks. data block datanode namenode replication 47. A process that is based on IPC mechanism which executes on different systems and can communicate with other processes using message based communication, is called ________ inter process communication remote machine invocation remote procedure call local procedure call 48. In distributed file system,XDR stands for? external data recovery external data request external data representation external device request 49. datanodes and namenode are two elements of which file system? None of the options nfs afs hdfs 50. In distributed file system, DNS stands for? domain name system directory name service domain name server disk name system Submit Answers Retake Test More Computer Science Engineering Study Material › Computer Science Engineering Mock Tests with Answers Distributed Computing System Mock Test Software Project Management Mock TestArtificial Intelligence and Robotics Mock TestBasics of Database Management Mock TestC# Programming Mock TestC#.NET Programming Mock TestCloud Computing Mock TestCommunication Network Mock TestComputer Architecture Mock TestComputer Architecture and Organization Mock TestComputer Fundamentals Mock TestComputer Networking Mock TestComputer Networks Mock TestCPP Programming Mock TestData Analysis Mock TestData Communication and Computer Network Mock TestData Compression and Data Retrieval Mock TestData Mining and Business Intelligence Mock TestData Mining and Data Warehouse Mock TestData Structure and Algorithms Mock TestData Structures Mock TestDataBase Management System Mock TestDesign and Analysis of Algorithms Mock TestDigital Electronics and Logic Design Mock TestDigital Logic Circuits Mock TestDigital Principles and System Design Mock TestDiscrete Mathematics Mock TestDiscrete Structure Mock TestDotNet Technology Mock TestEmbedded Real Time Operating System Mock TestGreen Computing Mock TestHigh Performance Computing Mock TestInformation Cyber Security Mock TestInformation and Network Security Mock TestInformation Retrival Techniques Mock TestInformation Systems and Engineering Economics Mock TestMachine Learning Mock TestMicroprocessor and Interfacing Technique Mock TestMicroprocessors Mock TestMuli core Architectures and Pro Mock TestMulti core processors Mock TestNetwork Security Mock TestNeural Networks and Fuzzy Control Object Oriented Programming Mock TestOperating System Architecture Mock TestOperating System Mock TestProblem Solving and Python Programming Mock TestProgramming for Problem Solving Mock TestPython Programming Mock TestSoft Computing Mock TestSoftware Design Modeling Mock TestSoftware Engineering Mock TestSoftware Testing Mock TestSoftware Testing and Quality Assurance Mock TestTheory of Computation and Compiler Design Mock TestTheory of Computation Mock TestUbiquitous Computing System Mock Test Computer Science Engineering Mock Tests