Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Dcs Mcqs

Download as pdf or txt
Download as pdf or txt
You are on page 1of 31

UNIT I - FUNDAMENTALS AND ARCHITECTURES

Q1. Scalability of a system can be measured along ____________.


A) Size
B) Geographical Distance
C) Administration
D) All of the above
Answer D
Q2. Resources can be moved from one location to another location without affecting how
those resources can be accessed. This is _______________.
A) Access Transparency
B) Location Transparency
C) Migration Transparency
D) Failure Transparency
Answer C
Q3. ________ hides the failure and recovery of a resource.
A) Access Transparency
B) Location Transparency
C) Migration Transparency
D) Failure Transparency
Answer D
Q4. Important goals for developing the distributed system is/are
A) Transparency
B) Openness
C) Scalability
D) All of the above
Answer D
Q5 _________ plays an important role in order to process data or information between client and
server.
A) Middleware
B) Workstation
C) Both A & B
D) None of the mrntioned
Answer A
Q6 Scalability of the system should remain efficient even with a significant increase in the number of
users and resources connected.
A) TRUE
B) FALSE
Answer A
Q7 What is not true about a distributed system?
A) It is a collection of processors
B) All processors are synchronized
C) They do not share memory
D) None of the mentioned
Answer B
Q8 Which of the following is /are the advantage(s) of client-server architectures?
A) They are scalable
B) They can support different types of systems
C) It is easy to separate different logic functions
D) All of the above
Answer D
Q9 The transparency that enables multiple instance of resources to be used is called ___________.
A) Access Transparency
B) Location Transparency
C) Migration Transparency
D) Replication Transparency
Answer D
Q10 A paradigm of multiple autonomous computers, having private memory, communication through
computer network is known as_________.
A) Distributed Computing
B) Cloud Computing
C) Centralized Computing
D) Parallel Computing
Answer A
Q11 _______is variation in the time taken to deliver a series of message.
A) Jitter
B) Bandwidth
C) Latency
D) None of the mentioned
Answer A
Q12 The arbitrary failure is used in order to describe the worst failures.
A) TRUE
B) FALSE
Answer A
Q13 Splitting up server’s functionality over multiple computers is _________________.
A) Vertical Distribution
B) Horizontal Distribution
C) Parallel Distribution
D) Serial Distribution
Answer A
Q14 What involves replicating or copying a servers functionality over multiple computers?
A) Vertical Distribution
B) Horizontal Distribution
C) Parallel Distribution
D) Serial Distribution
Answer B
Q15 In data centered architecture each component is connected through remote procedure call
mechanism.
A) TRUE
B) FALSE
Answer B
Q16 In Loosely Couple systems _______________________.
A) the processors do not share memory
B) Process can share memory
C) Process can partially share memory
D) None of the mentioned
Answer A
Q17 Basic idea of layered architecture is ______________.
A) Components is connected through a RPC
B) Components are organized in layered manner
C) Process basically connect through the transmission of events
D) All of the above
Answer B
Q18 The global system of interconnected computer network is called as ____________________.
A) Ethernet
B) Intranet
C) Internet
D) Ultranet
Answer C
Q19 Which ACID property support this - once a transaction commits, the changes are permanent.
A) Atomic
B) Consistent
C) Isolated
D) Durable
Answer D
Q20 The characteristics of a distributed system are :
A) Resource sharing, heterogeneity, openness, security
B) Scalability, fault handling
C) Concurrency, transparency
D) All of the mentioned
Answer D
Q21 A distributed system is defined as a collection of autonomous computers linked by a network with
software designed to produce an integrated computing facility.
A) TRUE
B) FALSE
Answer A
Q22 Collection of nodes that communicate through wireless links are called as _________________.
A) Sensor Networks
B) Mesh Networks
C) Grid Systems
D) None of the mentioned
Answer B
Q23 Which primitive kills the transaction and restores the old values?
A) WRITE
B) ABORT_TRANSACTION
C) END_TRANSACTION
D) READ
Answer B
Q24 Which ACID property handles “invariants” in data?
A) Atomic
B) Isolation
C) Durable
D) Consistent
Answer D
Q25 This component allows an application to access multiple databases.
A) Client Application
B) Server
C) TP Monitor
D) None of the mentioned
Answer C
Q26 Which communication middleware allows calls to remote objects?
A) RPC
B) RMI
C) MOM
D) All of the mentioned
Answer B
Q27 Which system of network is small, mobile, battery powered and part of our surrounding?
A) Sensor Network
B) Home Systems
C) Electronic Health Care System
D) All of the mentioned
Answer D
Q28 Embrace contextual changes is requirement of which system?
A) Sensor Network
B) Home Systems
C) Electronic Health Care System
D) All of the mentioned
Answer D
Q29 Which type of failure is used to describe the worst failure?
A) Omission failure
B) Byzantine failure
C) Timing failure
D) All of the mentioned
Answer B
Q30 Which of the following failure of the process is to crack or to crash?
A) Omission failure
B) Arbitrary failure
C) Timing failure
D) All of the mentioned
Answer A
Q31 ___________ distributed system is essentially a system that offers components that can easily be
used by, or integrated into other systems.
A) Transperent
B) Scalable
C) Open
D) None of the mentioned
Answer C
Q32 The communication in which a client is blocked until a reply is received from the server
implementing the service is _________________.
A) asynchronous communication
B) synchronous communication
C) persistent communication
D) None of the mentioned
Answer B
Q33 Which of the following assumptions, made while developing a distributed application, are true?
1. The network is reliable.
2. The network is heterogeneous.
3. The network is not secure.
4. Bandwidth is infinite.
A) 1, 2 and 3
B) 2 and 3
C) 2, 3 and 4
D) 1 and 4
Answer B
Q34 In Grid computing, the underlying hardware consists of a collection of similar workstations or PCs,
closely connected by means of a high-speed local-area network.
A) TRUE
B) FALSE
Answer B
Q35 In Grid computing systems, ______________ layer provides interfaces to local resources at a
specific site.
A) connectivity
B) fabric
C) resource
D) application
Answer B
Q36 RMI operates on objects, whereas RPC operates on functions.
A) TRUE
B) FALSE
Answer A
Q37 The dtawback of RPCs is that caller and callee need to be up and running at the same time in order
for the call to succeed.
A) TRUE
B) FALSE
Answer A
Q38 Which of the following are the core requirements for a ubiquitous computing system?
1. Context awareness
2. Autonomy
3. Distribution
4. Intelligence
A) 1, 2 and 3
B) 1, 3 and 4
C) 2, 3 and 4
D) 1, 2, 3 and 4
Answer D
UNIT II - COMMUNICATION AND COORDINATION

Q1. According to the ring algorithm, links between processes are _____________.
A) Bidirectional
B) Unidirectional
C) both bidirectional and unidirectional
D) None of the mentioned
Answer B
Q2. In distributed systems, election algorithms assumes that ____________.
A) a unique priority number is associated with each active process in system
B) there is no priority number associated with any process
C) priority of the processes is not required
D) None of the mentioned
Answer A
Q3. In case of failure, a new transaction coordinator can be elected by ____________.
A) bully algorithm
B) ring algorithm
C) both bully and ring algorithm
D) None of the mentioned
Answer C
Q4 In the token passing approach of distributed systems, processes are organized in a ring structure
____________.
A) logically
B) physically
C) both logically and physically
D) None of the mentioned
Answer A
Q5 A process can enter into its critical section ____________.
A) anytime
B) when it receives a reply message from its parent process
C) when it receives a reply message from all other processes in the system
D) None of the mentioned
Answer C
Q6 If a process is executing in its critical section ____________.
A) any other process can also execute in its critical section
B) no other process can execute in its critical section
C) one more process can execute in its critical section
D) none of the mentioned
Answer B
Q7 Remote Procedure Calls are used ____________.
for communication between two processes remotely different from each other on the same
A)
system
B) for communication between two processes on the same system
C) for communication between two processes on separate systems
D) none of the mentioned
Answer C
Q8 RPC provides a(an) _____ on the client side, a separate one for each remote procedure.
A) Stub
B) Identifier
C) Name
D) process identifier
Answer A
Q9 What is stub?
transmits the message to the server where the server side stub receives the message and
A)
invokes procedure on the server side
B) packs the parameters into a form transmittable over the network
C) locates the port on the server
D) All of the mentioned
Answer D
Q10 What is the full form of RMI?
A) Remote Memory Installation
B) Remote Memory Invocation
C) Remote Method Installation
D) Remote Method Invocation
Answer D
Q11 A process that is based on IPC mechanism which executes on different systems and can
communicate with other processes using message based communication, is called ________.
A) Local Procedure Call
B) Inter Process Communication
C) Remote Procedure Call
D) Remote Machine Invocation
Answer C
Q12 The remote method invocation __________.
A) allows a process to invoke memory on a remote object
B) allows a thread to invoke a method on a remote object
C) allows a thread to invoke memory on a remote object
D) allows a process to invoke a method on a remote object
Answer B
Q13 With persistent communication a message that has been submitted for transmission is stored by
the communication middleware as long as it takes to deliver it to the receiver
A) TRUE
B) FALSE
Answer A
Q14 With Synchronous communication the sender is blocked until its request is known to be accepted.
A) TRUE
B) FALSE
Answer A
Q15 With Asynchronous communication the sender is blocked until its request is known to be accepted
A) TRUE
B) FALSE
Answer B
Q16 Copy sharing in interprocess communication is also known as _____________.
A) Shared-data approach
B) Message-passing approach
C) Original Sharing
D) All of the above
Answer B
Q17 What are the characteristics of interprocess communication?
A) Reliability
B) Ordering
C) Both A and B
D) none of the mentioned
Answer C
Q18 Electronic mail system is an example of _______________.
A) Transient Communication
B) Persistent Communication
C) Ordering
D) Message Destinations
Answer B
Q19 This characteristic enables delivery of same message to the members of a set of processes.
A) Reliability
B) Ordering
C) Asynchronous Communication
D) Message Destinations
Answer D
Q20 Which socket primitive for TCP/IP Blocks caller until a connection request arrives?
A) Listen
B) Receive
C) Accept
D) Bind
Answer C
Q21 Which socket primitive for TCP/IP Actively attempts to establish a connection?
A) Connect
B) Socket
C) Listen
D) Receive
Answer A
Q22 Original data types are organized into a binary format in which data representation?
A) Java’s object serialization
B) CDR
C) XML
D) All of the above
Answer B
Q23 Which of the following is NOT the type of overlay networks?
A) Multicast
B) Resilience
C) Distributed hash tables
D) Consistent
Answer D
Q24 Which overlay network offers tailored routing protocols?
A) Disruption-tolerant
B) Content Distribution
C) Distributed hash tables
D) Wireless ad-hoc
Answer D
Q25 Which overlay network works on obtainability or accessibility of internet paths?
A) Disruption-tolerant
B) Content Distribution
C) Resilience
D) Multicast
Answer C
Q26 Which of the following is NOT the feature of MPI?
A) Reliability
B) Correctness
C) Security
D) Parallelism
Answer D
Q27 Piggybacking is one of the optimizations assumed for ______________ feature of MPI.
A) Reliability
B) Efficiency
C) Security
D) Uniform Semantics
Answer B
Q28 Atomicity, Ordered delivery and Survivability are the issues related to _____________.
A) Reliability
B) Correctness
C) Security
D) Flexibility
Answer B
Q29 Can Remote Procedure used as an IPC mechanism to communicate between different processes?
A) YES
B) NO
Answer A
Q30 Categories of Request-Reply protocols are:
A) Request/Reply/Acknowledge-Reply
B) Request
C) Both A and B
D) None of the mentioned
Answer C
Q31 Which of the following is NOT an element of program for executing RPC mechanism?
A) RPC Runtime
B) Server stub
C) Server
D) Database
Answer D
Q32 Stubs cab be generated ___________-.
A) Manually
B) Automatically
C) Both A and B
D) None of the mentioned
Answer
Q33 e-mail protocols, Web access protocols, file-transfer protocols are implemented at _____________
layer.
A) Presentation layer
B) Application layer
C) Transport layer
D) Session layer
Answer B
Q34 A ____________ is a communication end point to which an application can write data that are to
be sent out over the underlying network, and from which incoming data can be read.
A) Message Passing Interface
B) Socket
C) Message-Oriented Middleware
D) None of the mentioned
Answer B
Q35 _____________ is designed for parallel applications and is tailored to transient communication.
A) Message Passing Interface
B) socket
C) Message-Oriented Middleware
D) None of the mentioned
Answer A
Q36 Which of the following desceibes the MPI messaging operation MPI_ssend.
A) Send a message and wait until copied to local or remote buffer
B) Send a message and wait for reply
C) Send a message and wait until transmission starts
D) None of the mentioned
Answer C
Q37 In MPI, which of the following operations is used to append outgoing message to a local send
buffer?
A) MPI_isend
B) MPI_bsend
C) MPI_ssend
D) MPI_send
Answer B
Q38 MPI_sendrecv is the strongest form of synchronous communication.
A) TRUE
B) FALSE
Answer A
Q39 _______________ provide extensive support for persistent asynchronous communication.
A) socket
B) Message-queuing systems
C) Message Passing Interface
D) None of the mentioned
Answer B
Q40 Clock synchronization is to keep the clocks precise (internal synchronization) or accurate (external
synchronization).
A) TRUE
B) FALSE
Answer A
Q41 The goal of the Berkeley algorithm is to achieve synchronization by getting all processes to set
their clocks to the average of all the clocks in the system.
A) TRUE
B) FALSE
Answer A
Q42 The Berkeley algorithm is ____________ clock synchronization algorithm.
A) external
B) internal
C) Both A and B
D) None of the mentioned
Answer B
Q43 __________________ algorithm forces a resequencing of timestamps to ensure that the relation
“→” (happens-before relation) is properly preserved throughout a system of processes.
A) Berkeley
B) Lamport
C) Both A and B
D) None of the mentioned
Answer B
Q44 In distributed systems, a logical clock is associated with ______________
A) each instruction
B) each process
C) each register
D) None of the mentioned
Answer B
Q45 Distributed mutual exclusion algorithms can be classified into token-based solutions and
permission-based approach
A) TRUE
B) FALSE
Answer A
Q46 Ricart and Agrawala, token-ring algorithm are used for _____________.
A) deadlock prevention
B) mutual exclusion
C) clock synchronization
D) None of the mentioned
Answer B
UNIT III - REPLICATION AND FAULT TOLERANCE

Q1 What is/are the Reasons for replication?


A) Reliability
B) Performance
C) Both A& B
D) None of the above
Answer C
Q2 What is/are the difference between replication and caching?
A) Replica deals with server, whereas a cached copy is normally associated with client
B) In comparison to cached copy a replica is more persistent
C) Replica is more secured , complete accurate than cached
D) All of the above
Answer D
Q3 _________defines a property that a system is ready to be used instantaneously.
A) Availability
B) Relaibiltiy
C) Maintainability
D) Safety
Answer A
Q4 ________is property that a system can run without failure.
A) Availability
B) Relaibiltiy
C) Maintainability
D) Safety
Answer B
Q5 _________refers to the situation that when a system temporarily fails to operate correctly,
nothing catastrophic happens.
A) Availability
B) Relaibiltiy
C) Maintainability
D) Safety
Answer D
Q6 __________refers to how easy a failed system can be repaired.
A) Availability
B) Reliability
C) Maintainability
D) Safety
Answer C
Q7 In contrast to availability, reliability is defined in terms of time interval instead of instant in
time.
A) TRUE
B) FALSE
Answer A
Q8 A server halts, but is working correctly until it halt. This type of failure is known as _________.
A) Crash failure
B) Omission failure
C) Receive omission
D) Send omission
Answer A
Q9 A server fails to respond to incoming message. This type of failure is known as _________.
A) Crash failure
B) Send Omission failure
C) Receive omission failure
D) Timing failure
Answer C
Q10 The occurrence of failure can be hidden from other processes using ________.
A) Redundancy
B) Replication
C) Caching
D) None of the mentioned
Answer A
Q11 The key technique for masking faults is to use ______________.
A) Redundancy
B) Replication
C) Caching
D) None of the mentioned
Answer A
Q12 With__________, extra bits are added to allow recovery from garbled bits.
A) Information redundancy
B) Time redundancy
C) Physical redundancy
D) None of the mentioned
Answer A
Q13 Hamming code is an example of ___________.
A) Information redundancy
B) Time redundancy
C) Physical redundancy
D) None of the mentioned
Answer A
Q14 ________is especially helpful when the faults are transient or intermittent.
A) Information redundancy
B) Time redundancy
C) Physical redundancy
D) None of the mentioned
Answer B
Q15 With ________extra equipment or processes are added to make it possible for the system as a
whole to tolerate the loss or malfunctioning of some components.
A) Information redundancy
B) Time redundancy
C) Physical redundancy
D) None of the mentioned
Answer C
Q16 Process group may be _______________.
A) Dynamic
B) Static
C) Both A & B
D) None of the mentioned
Answer A
Q17 _______is symmetrical and has no single point of failure.
A) Flat group
B) Hierarchical group
C) Dynamic group
D) None of the mentioned
Answer A
Q18 What is reliable multicasting?
A) Message that is sent to a process group should be delivered to each member of that group
Message that is sent to a process group should not be delivered to each member of that
B)
group
Message that is sent to a process group should be delivered to only one member of that
C)
group
D) None of the mentioned
Answer A
Q19 Two phase commit protocol is also called as blocking protocol.
A) TRUE
B) FALSE
Answer A
Q20 Three phase commit protocol avoids blocking processes in the presence of fail-stop crash.
A) TRUE
B) FALSE
Answer A
Q21 In ___________when the system has entered an erroneous state, instead of moving back to
previous check pointed state, an attempt is made to bring the system in a correct new state from
which it can continue to execute.
A) Forward recovery
B) Backward recovery
C) Both A & B
D) None of the mentioned
Answer A
Q22 Erasure correction is typical example of _______________.
A) Forward Recovery
B) Backward recovery
C) Horizontal Recovery
D) Vertical Recovery
Answer A
Q23 When processes take local checkpoints independent of each other, it is referred to as
independent checkpointing.
A) TRUE
B) FALSE
Answer A
Q24 When process take local checkpoint independent of each other, it is known as Co-ordinate
checkpointing.
A) TRUE
B) FALSE
Answer B
Q25 _______ may occur in the form of duplicate message resulting from the fact that in a computer
network messages may be buffered for long time and are reinjected into the network after the
original sender has already issued a retransmission.
A) Arbitrary Failures
B) Crash failure
C) Omission failure
D) All of the above
Answer A
Q26 In the fault tolerant distributed system backward error recovery requires that a system
regularly saves its state on to stable storage.
A) TRUE
B) FALSE
Answer A
Q27 _______is the robust form of memory coherence and is having the utmost rigorous consistency
requirement.
A) Sequential Consistency model
B) Strict consistency model
C) Causal consistency model
D) Processor consistency model
Answer B
Q28 A three phase commit protocol cannot efficiently handle the failure of the Co-Ordinator.
A) TRUE
B) FALSE
Answer B
Q29 Distributed Commit is often established by means of ___________.
A) Participant
B) Co-Ordinator
C) Both A& B
D) None of the mentioned
Answer B
Q30 Erasure correction is a method in which a missing packet is constructed from other, successfully
delivered packets.
A) TRUE
B) FALSE
Answer A
Q31 Forward recovery can be integrated into the middleware layer of a distributed system as a
general-purpose service.
A) TRUE
B) FALSE
Answer B
Q32 The following two conditions are necessary and sufficient for a commit protocol to be non-
blocking.
1. There is no single state from which it is possible to make a transition directly to either a COMMIT
or an ABORT state.
2. There is no state in which it is not possible to make a final decision, and from which a transition to
a COMMIT state can be made.
A) TRUE
B) FALSE
Answer A
Q33 An active computation with no parent waiting for the result is called ____________ .
A) NULL
B) Void
C) orphan
D) None of the mentioned
Answer C
Q34 A communication channel may exhibit __________ failure(s).
A) crash
B) omission
C) timing
D) All of the mentioned
Answer D
Q35 An operating system that comes to a grinding halt, and for which there is no other solution
than rebooting it is an example of _________________.
A) Arbitary failure
B) Omission failure
C) Crash failure
D) None of the mentioned
Answer C
Q36 Rreplication of data may lead to consistency problems.
A) TRUE
B) FALSE
Answer A
Q37 If a read operation performed on any replicated copy returns different results, then the
collection of copies is consistent.
A) TRUE
B) FALSE
Answer B
Q38 A data store may be physically distributed across multiple machines.
A) TRUE
B) FALSE
Answer A
Q39 A conit specifies the unit over which concurrency is to be measured.
A) TRUE
B) FALSE
Answer B
Q40 A ______________ model describes what can be expected with respect to a set when multiple
processes concurrently operate on it's data.
A) coherence
B) consistency
C) data
D) None of the mentioned
Answer B
Q41 An autonomous system can best be viewed as a network in which the nodes all run the same
routing protocol and which is managed by a single organization.
A) TRUE
B) FALSE
Answer A
Q42 ____________ replicas are the initial set of replicas that constitute a distributed data store.
A) Server-initiated
B) Client-initiated
C) Permanent
D) None of the mentioned
Answer C
Q43 Which of the following statements are true?
1. Server-initiated replicas are more commonly known as caches.
2. Client caches are used only to improve access times to data.
3. Client cache could be located on the client’s machine, or on a separate machine in the same local-
area network as the client.
A) 1 and 2
B) 2 and 3
C) 1, 2 and 3
D) None of the mentioned
Answer B
Q44 In a ____________ approach, updates are propagated to other replicas without those replicas
even asking for the updates.
A) pull-based
B) push-based
C) both
D) None of the mentioned
Answer B
Q45 In a ___________ approach, a server or client requests another server to send it any updates.
A) pull-based
B) push-based
C) both
D) None of the mentioned
Answer A
Q46 In a Content Delivery Networks (CDN), ____________ metrics tell us to what extent a replica is
deviating from its master copy.
A) Latency
B) Spatial
C) Consistency
D) None of the mentioned
Answer C
Q47 In a Content Delivery Networks (CDN), ____________ metrics measures the distance
between nodes in terms of the number of network-level routing hops.
A) Latency
B) Spatial
C) Consistency
D) None of the mentioned
Answer B
Q48 When building reliable communication channels, the focus is on masking crash and omission
failures.
A) TRUE
B) FALSE
Answer A
Q49 The goal of RPC is to hide communication by making remote procedure calls look just like local
ones.
A) TRUE
B) FALSE
Answer A
Q50 ______________ guarantees that the RPC has been carried out at most one time, but possibly
not at all.
A) at-least-once semantics
B) exactly-once semantics
C) at-most-once semantics
D) None of the mentioned
Answer C
UNIT IV - DISTRIBUTED FILES AND MULTIMEDIA SYSTEMS

Q1 Which of the following is true for a distributed file system?


a. Allows easy sharing of data among clients.
b. Involves multiple client machines and one or a few servers.
c. Provides security, i.e. one must only secure the servers to secure data.
A) a Only
B) a and b
C) a, b and c
D) b and c
Answer C
Q2 Stateless protocols are designed so as to not store any state information in the server.
A) TRUE
B) FALSE
Answer A
Q3 If a server crash happens, the client would simply have to retry the request. This is true for ______
A) stateless protocol
B) statefull protocol
Answer A
Q4. Client-side caching reduces the time taken for subsequent client accesses and helps improve
efficiency.
A) TRUE
B) FALSE
Answer A
Q5 HDFS is designed on principle of ______________
A) write-once and read-once
B) write-once and read-many-times
C) write-many-times and read-many-times
D) write-many-times and read-once
Answer B
Q6 Which of the following are true for a MasterNode in HDFS cluster?
a. Manages all the slave nodes and assign work to them.
b. It executes filesystem namespace operations like opening, closing, renaming files and directories.
c. It should be deployed on commodity hardware
A) a Only
B) a, b and c
C) a and b
D) a and c
Answer C
Q7 In HDFS, the blocks on data nodes are replicated to achieve _____________.
A) Transparency
B) Scalability
C) Openness
D) Fault tolerance
Answer D
Q8 The Domain Name Service translates the IP address into the corresponding domain name.
A) TRUE
B) FALSE
Answer B
Q9 The DNS database contains _______
A) name server records
B) hostname-to-address records
C) hostname aliases
D) all of the mentioned
Answer D
Q10 If a server has no clue about where to find the address for a hostname then _______
A) server asks to the root server
B) server asks to its adjacent server
C) request is not processed
D) none of the mentioned
Answer A
Q11 The domain name system is maintained by _______
A) a single computer
B) a single server
C) distributed database system
D) none of the mentioned
Answer C
Q12 A _____________is a hierarchical arrangement of objects which are structured in a way that
makes access easy.
A) Domain Name System (DNS)
B) directory service
C) site
D) None of the mentioned
Answer B
Q13 ___________________ is the collection of interrelated data that includes text, graphics (sketches,
drawings), images, animations, video, audio etc.
A) Hirerchical Database
B) Relational Database
C) Multimedia Database
D) Object Oriented Database
Answer C
Q14 Which of the following is / are the area(s) where multimedia database is applied?
a. Documents and record management
b. Knowledge dissemination
c. Education and training
d. Real-time control and monitoring
A) a, b and d
B) b, c and d
C) a, c and d
D) a, b, c and d
Answer D
Q15 MIDI stands for:
A) Musical Instrument Digital Interface
B) Musical Instrument Digital Instruction
C) MP3 Instrument Digital Interface
D) Multimedia Instrument Digital Interface
Answer A
Q16 Multimedia system require hard real time scheduling
A) To ensure critical tasks will be serviced within timing deadlines
B) To deliver the media file to the client
C) To minimize the delay
D) For security
Answer A
Q17 What are characteristic of a DFS
A) Transparency
B) User mobility
C) High Availability
D) All of the above
Answer D
Q18 In distributed file system, when a file’s physical storage location changes
A) file name need to be changed
B) file name need not to be changed
C) file’s host name need to be changed
D) file’s local name need to be changed
Answer B
Q19 In distributed file system multiple processes share data in a________ mode over a long time
period.
A) secure and reliable
B) reliable and public
C) secure and public
D) None of the mentioned
Answer A
Q20 User mobility implies that a user has flexibility to work on different nodes at different times and
should not be restricted to work on a particular node only.
A) TRUE
B) FALSE
Answer A
Q21 _______ is also known as block service which allocates disk space in units of fixed size blocks.
A) True File services
B) Name service
C) Storage services
D) None of the mentioned
Answer C
Q22 _______implements a mapping between text names for files and references files.
A) True File services
B) Name service
C) Storage services
D) None of the mentioned
Answer B
Q23 _________is related to the actual operation on individual files such creation of files, deletion of
files, accessing and modifying the information or data in files.
A) True File services
B) Name service
C) Storage services
D) None of the mentioned
Answer A
Q24 In distributed file system, file name does not reveal the file’s _____________.
A) Local Name
B) Physical storage location
C) Both local name and physical storage location
D) None of the mentioned
Answer B
Q25 In NFSv3 and NFsv4___________ operation is used to delete files.
A) Delete
B) Remove
C) rmdir
D) None of the mentioned
Answer B
Q26 In NFSv3 and NFsv4_________is used to create special file such as device files, sockets and
named pipes.
A) mkdir
B) mknode
C) create
D) symlink
Answer B
Q27 Symlink is used to create Symbolic Link .
A) TRUE
B) FALSE
Answer A
Q28 In NFSv3 and NFsv4_________operation is used for alteration or transformation of the name of
an existing file.
A) Alter
B) Modify
C) Rename
D) All of the mentioned
Answer C
Q29 Which one of the following is a distributed file system?
A) andrew file system
B) network file system
C) novel network
D) All of the mentioned
Answer D
Q30 What is true about organization of a Google cluster of server?
A) A GFS cluster consists of a single master along with multiple chunk servers
B) GFS file divided into chunks of 64 MB each and chunks distributed across chunk servers
GFS master contacted for metadata (file name and chunk index), returning a contact address
C)
for the chunk
D) All of the Above
Answer D
Q31 NFS design consists of -
A) The protocol
B) The server side
C) Client side
D) All of the above
Answer D
Q32 The NFS protocol, makes use of the sun Remote Procedure Call (RPC) mechanism.
A) TRUE
B) FALSE
Answer A
Q33 Objectives of HDFS are -
A) Streaming data access
B) Heterogeneity
C) Failure of hardware
D) All of the above
Answer D
Q34 HDFS basically consists of _______ .
A) Datanode
B) Namenode
C) Both A& B
D) None of the mentioned
Answer C
Q35 Namenode acts as a master server.
A) TRUE
B) FALSE
Answer A
Q36 Datanode acts as a master server.
A) TRUE
B) FALSE
Answer B
Q37 A ________ serves as the master and there is only one NameNode per cluster.
A) DataNode
B) NameNode
C) Data block
D) Replication
Answer B
Q38 Identify the correct statement.
A) DataNode is the slave/worker node and holds the user data in the form of Data Blocks
B) Each incoming file is broken into 32 MB by default
Data blocks are replicated across different nodes in the cluster to ensure a low degree of fault
C)
tolerance
D) None of the mentioned
Answer A
Q39 HDFS works in a __________ fashion.
A) master-slave
B) worker/slave
C) Both A & B
D) None of the mentioned
Answer A
Q40 ________ NameNode is used when the Primary NameNode goes down.
A) Reserved
B) Data
C) Secondary
D) None of the mentioned
Answer C
Q41 What are the characteristics of good naming system?
A) Location independency
B) Location transparency
C) Scalability
D) All of the above
Answer D
Q42 Location independency means whenever a particular object changes its location, it is always
necessary to change the names of respective objects.
A) TRUE
B) FALSE
Answer B
Q43 In a distributed system name space is represented as a labeled directed graph with two types of
nodes _____________.
A) Name node & data node
B) Leaf node & directory node
C) Parent node and child node
D) All of the above
Answer B
Q44 Multimedia system can be categorized on the basis of which of the following parameters?
A) Storage, presentation, manipulation
B) Computer controlled generation
C) Communication of discrete media and continuous media
D) All of the above
Answer D
Q45 Distributed Multimedia System basically consists of -
A) Information server
B) Multimedia client
C) WAN
D) All of the above
Answer D
Q46 Which of the following is offered as a service by distributed multimedia systems?
A) Messaging
B) Timely broadcasting
C) Interactive broadcasting
D) All of the above
Answer D
Q47 _______________ is a peer-to-peer download system designed to support very large multimedia
files.
A) The Tiger video file server
B) End System Multicast
C) BitTorrent
D) None of the mentioned
Answer C
Q48 Which of the following metadata is held by the .torrent file?
1. The name and length of the file;
2. The location of a tracker
3. A checksum associated with each chunk.
A) Only 1
B) 1 and 2
C) 2 and 3
D) 1, 2 and 3
Answer D
Q49 Any peer with a complete version of a file is known as a __________ in BitTorrent terminology.
A) leecher
B) seeder
C) chunk
D) tracker
Answer B
Q50 _____________ is a structured peer-to-peer solution for the real-time multicasting of video over
the Internet.
A) The Tiger video file server
B) End System Multicast
C) BitTorrent
D) None of the mentioned
Answer B

You might also like