Distributed System
1. In distributed system each processor has its own
a) local memory
b) clock
c) both (a) and (b)
d) none of the mentioned
a) local memory
b) clock
c) both (a) and (b)
d) none of the mentioned
Answer:c
Explanation:None.
Explanation:None.
2. If one site fails in distributed system
a) the remaining sites can continue operating
b) all the sites will stop working
c) directly connected sites will stop working
d) none of the mentioned
a) the remaining sites can continue operating
b) all the sites will stop working
c) directly connected sites will stop working
d) none of the mentioned
Answer:a
Explanation:None.
Explanation:None.
3. Network operating system runs on
a) server
b) every system in the network
c) both (a) and (b)
d) none of the mentioned
a) server
b) every system in the network
c) both (a) and (b)
d) none of the mentioned
Answer:a
Explanation:None.
Explanation:None.
4. Which technique is based on compile-time program transformation for accessing remote data in a distributed-memory parallel system.
a) cache coherence scheme
b) computation migration
c) remote procedure call
d) message passing
a) cache coherence scheme
b) computation migration
c) remote procedure call
d) message passing
Answer:b
Explanation:None.
Explanation:None.
5. Logical extension of computation migration is
a) process migration
b) system migration
c) thread migration
d) data migration
a) process migration
b) system migration
c) thread migration
d) data migration
Answer:a
Explanation:None.
Explanation:None.
6. Processes on the remote systems are identified by
a) host ID
b) host name and identifier
c) identifier
d) process ID
a) host ID
b) host name and identifier
c) identifier
d) process ID
Answer:b
Explanation:None.
Explanation:None.
7. Which routing technique is used in distributed system?
a) fixed routing
b) virtual routing
c) dynamic routing
d) all of the mentioned
a) fixed routing
b) virtual routing
c) dynamic routing
d) all of the mentioned
Answer:d
Explanation:None.
Explanation:None.
8. In distributed systems, link and site failure is detected by
a) polling
b) handshaking
c) token passing
d) none of the mentioned
a) polling
b) handshaking
c) token passing
d) none of the mentioned
Answer:b
Explanation:None.
9. The capability of a system to adapt the increased service load is called
a) scalability
b) tolerance
c) capacity
d) none of the mentioned
a) scalability
b) tolerance
c) capacity
d) none of the mentioned
Answer:a
Explanation:None.
10. Internet provides _______ for remote login.
a) telnet
b) http
c) ftp
d) RPC
a) telnet
b) http
c) ftp
d) RPC
Answer:a
Explanation:None.
No comments:
Post a Comment