Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Dos PDF

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Que.

Questions
No.

Show the characteristic of a DFS.


a) Fault tolerance
1. b) Scalability
c) Heterogeneity of the system
d) Up gradation
Answer:- d

Show which is not a major component of a file system.


a) Directory service
2. b) Authorization service
c) Shadow service
d) System service
Answer:-c
Show the different ways mounting of the file system.
a) boot mounting
3. b) auto mounting
c) explicit mounting
d) all of the mentioned
Answer:-d

Show the advantage of caching in remote file access.


a) Reduced network traffic by retaining recently accessed disk blocks
4. b) Faster network access
c) Copies of data creates backup automatically
d) None of the mentioned
Answer:-a
Show what a distributed file system should provide.
a) Network Transparency
5. b) High availability
c) Both
d) None of above.
Answer:-c
Show what is used to help in combining files/directories in different systems and
form a single file system structure.
a) Catching
6. b) Mounting
c) Both
d) None of above
Answer:-b
Show what is used to reduce the response time in bringing data from remote
7. machines.
a) Catching
b) Mounting
c) Both
d) None of above
Answer:-a
Show another name of Modify caching.
a) Hints
8. b) Bulk
c) Mounting
d) Catching
Answer:-a
Show a definition for: “Node at which collection of files mounted”.
a) Mounted
9. b) Internal node
c) Mount point
d) None of above
Answer:-c
Show which one is design issue of Distributed File System.
a) Availability
10. b) Scalability
c) Semantics
d) All of them.
Answer:-d
Show which one is the writing policy.
a) Write-through policy
11. b) Delayed writing policy
c) Both
d) None of above
Answer:-c
Show which protocol can be used to update all replicas.
a) Two-phase commit protocol
12. b) Server initiated protocol
c) Client initiated policy
d) None of above
Answer:-a
Show which one is not the advantage of DSM.
a) Data sharing
b) Passing data structure containing pointers is easier
13. c) Moving entire object to user takes advantage of locality difference
d) Serial access to common bus for shared physical memory like in
multiprocessor system.
Answer:-d
Show which is not a coherence protocol.
a) The full replication algorithm
14. b) Write invalidate protocol
c) Write update protocol
d) All of above
Answer:-a
Show which one is a load distribution algorithm.
15. a) Static
b) Dynamic
c) Adaptive
d) All of above
Answer:-d
Show a load distribution algorithm in which decisions are hard-coded into an
algorithm with a priori knowledge of system.
a) Static
16. b) Dynamic
c) Adaptive
d) None of above
Answer:-a
Show a load distribution algorithm which uses system state information such as task
queue length, processor utilization.
a) Static
17. b) Dynamic
c) Adaptive
d) None of above
Answer:-b
Show a load distribution algorithm that adapts the approach based on system state.
a) Static
18. b) Dynamic
c) Adaptive
d) None of above
Answer:-b
Show a load distribution algorithm in which it may stop collecting state information
at high loads.
a) Static
19. b) Dynamic
c) Adaptive
d) None of above
Answer:-c
Show what does a Load balancing technique do.
a) Adjust the load
20. b) Equalize the load
c) Randomize the load
d) None of above
Answer:-b
Show what does a Load sharing technique do.
a) balance
21. b) Reduce burden of an overloaded node
c) Randomize
d) None of above
Answer:-b
Show an algorithm in which task transfer from overloaded nodes to ones that are
likely to become idle/lightly loaded.
a) Preemptive task transfer
22. b) Non-preemptive task transfer
c) Load discharge task transfer
d) Anticipatory task transfer

Answer:-d
Show which one is not a task transfer category.
a) Preemptive task transfer
23. b) Non-preemptive task transfer
c) Load discharge task transfer
d) None of above
Answer:-c
Show a task transfer technique in which partially executed task is transferred.
a) Preemptive task transfer
24. b) Non-preemptive task transfer
c) Load discharge task transfer
d) None of above
Answer:-a
Show which one is a component of distributed scheduling algorithms.
a) Transfer policy
25. b) Selection policy
c) Location policy
d) All of above.
Answer:-d
Show which one is not a component of distributed scheduling algorithms.
a) Information policy
26. b) Randomization policy
c) Location policy
d) Selection policy
Answer:-b
Show which one is a load distributing algorithm.
a) Sender Initiated
27. b) Receiver initiated
c) Symmetric
d) All of above
Answer:-d
What a system is called when it cannot meet its promises.
a) Crashed system
28. b) Faulty system
c) Damage system
d) Failed system
Answer:-d
Which one is not a type of fault?
a) Transient
29. b) Intermittent
c) Permanent
d) None of above
Answer:-d
Which one is a type of failure?
a) Crash
30. b) Omission
c) Timing
d) All of above
Answer:-d
Which one is not a type of failure masking by redundancy?
31.
a) Place redundancy
b) Information redundancy
c) Time Redundancy
d) Physical Redundancy
Answer:-a
What are the important steps followed when recovery from failure happens?
a) Post repairing integration with main system should happen smoothly and
gracefully
32. b) Upon link failure both parties at end must not be notified
c) Fault recovery system must me adjusted
d) Failures are logged systematically
Answer:-a
What are different ways in which distributed system may suffer?
a) Link failure
33. b) Site failure
c) Loss of message
d) All of above
Answer:-d
What are the things transaction coordinator is responsible for?
a) Starting the execution of the transaction
34. b) Breaking transaction into no of sub transaction
c) Coordinating the termination of the transaction
d) All of above
Answer:-d
What is the disadvantage of majority protocol?
a) Complicated implementation
35. b) Deadlock cannot occur easily
c) Bottleneck
d) All of above
Answer:-a
What detects link and site failure in distributed system?
a) Polling
36. b) Handshaking
c) Token passing
d) None of above
Answer:-b
Which one is not an error recovery technique?
a) Backward
37. b) Downward
c) Forward
d) None of above
Answer:-b
Which one is a technique of recovering from system failure?
a) Amnesia
38. b) Pause
c) Halting
d) All of above
Answer:-d
Which one is a type of failure?
39. a) Communication failure
b) Secondary storage failure
c) Process failure
d) All of above
Answer:-d
What is an anomalous physical condition in a system called?
a) Failure
40. b) Error
c) Damage
d) Fault
Answer:-d

You might also like