Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Parallel and Distributed Computing MCQs

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 89

Parallel and Distributed Computing MCQs – Questions Answers Test

Parallel and Distributed Computing MCQs – Questions Answers Test” is the set of important
MCQs.
1: Computer system of a parallel computer is capable of
A. Decentralized computing
B. Parallel computing
C. Centralized computing
D. Decentralized computing
E. Distributed computing
F. All of these
G. None of these
Answer - Click Here:
A
2: Writing parallel programs is referred to as
A. Parallel computation
B. Parallel processes
C. Parallel development
D. Parallel programming
E. Parallel computation
F. All of these
G. None of these
Answer - Click Here:
D
3: Simplifies application’s of three-tier architecture is ____________.
A. Maintenance
B. Initiation
C.Implementation
D. Deployment
E. All of these
F. None of these
Answer - Click Here:
D
4: Dynamic networks of networks, is a dynamic connection that grows  is  called
A. Multithreading
B. Cyber cycle
C. Internet of things
D. Cyber-physical system
E. All of these
F. None of these
Answer - Click Here:
C
5: In which application system Distributed systems can run well?
A. HPC
D. HTC
C. HRC
D. Both A and B
E. All of these
F. None of these
Answer - Click Here:
D
6: In which systems desire  HPC and HTC.
A. Adaptivity
B. Transparency
C. Dependency
D. Secretive
E. Adaptivity
F. All of these
G. None of these
Answer - Click Here:
B
 
7: No special machines manage the network of  architecture in which resources are known as
A. Peer-to-Peer
B. Space based
C. Tightly coupled
D. Loosely coupled
E. All of these
F. None of these
Answer - Click Here:
A
8: Significant characteristics  of Distributed systems have of
A. 5 types
B. 2 types
C. 3 types
D. 4 types
E. All of these
F. None of these
Answer - Click Here:
C
 9: Built of  Peer machines are over
A. Many Server machines
B. 1 Server machine
C. 1 Client machine
D. Many Client machines
E. All of these
F. None of these
Answer - Click Here:
D
10: Type HTC applications are
A. Business
B. Engineering
C. Science
D. Media mass
E. All of these
F. None of these
Answer - Click Here:
A
11: Virtualization that creates one single address space architecture that of, is called
A. Loosely coupled
B. Peer-to-Peer
C. Space-based
D. Tightly coupled
E. Loosely coupled
F. All of these
G. None of these
Answer - Click Here:
C
12: We have an internet cloud of resources In cloud computing to form
A. Centralized computing
B. Decentralized computing
C. Parallel computing
D. Both A and B
E. All of these
F. None of these
Answer - Click Here:
E
13: Data access and storage are elements of  Job throughput, of __________.
A. Flexibility
B. Adaptation
C. Efficiency
D. Dependability
E. All of these
F. None of these
Answer - Click Here:
C
14: Billions of job requests is over massive data sets, ability to support known as
A. Efficiency
B. Dependability
C. Adaptation
D. Flexibility
E. All of these
F. None of these
Answer - Click Here:
C
15: Broader concept offers Cloud computing .to select which of the following.
A. Parallel computing
B. Centralized computing
C. Utility computing
D. Decentralized computing
E. Parallel computing
F. All of these
G. None of these
Answer - Click Here:
C
16: Resources and clients transparency that allows movement within a system is called
A.Mobility transparency
B. Concurrency transparency
C. Performance transparency
D. Replication transparency
E. All of these
F. None of these
Answer - Click Here:
A
 17: Distributed program in a distributed computer running a is known as
A. Distributed process
B. Distributed program
C. Distributed application
D. Distributed computing
E. All of these
F. None of these
Answer - Click Here:
B
18: Uniprocessor computing devices  is called__________.
A. Grid computing
B. Centralized computing
C. Parallel computing
D. Distributed computing
E. All of these
F. None of these
Answer - Click Here:
B
19: Utility computing focuses on a______________ model.
A. Data
B. Cloud
C. Scalable
D. Business
E. All of these
F. None of these
Answer - Click Here:
D
20: what is a CPS merges technologies
A. 5C
B. 2C
C. 3C
D. 4C
E. All of these
F. None of these
Answer - Click Here:
C
21: Aberavationn of HPC
A. High-peak computing
B. High-peripheral computing
C. High-performance computing
D. Highly-parallel computing
E. All of these
F. None of these
Answer - Click Here:
C
 
22: Peer-to-Peer leads to the development of  technologies like
A. Norming grids
B. Data grids
C. Computational grids
D. Both A and B
E. All of these
F. None of these
Answer - Click Here:
D
23: Type of HPC applications of.
A. Management
B. Media mass
C. Business
D. Science
E. All of these
F.None of these
Answer - Click Here:
D
24:  The development generations of  Computer technology has gone through
A. 6
B. 3
C. 4
D. 5
E. All of these
F. None of these
Answer - Click Here:
D
 
25: Utilization rate of resources in an execution model is known to be its
A. Adaptation
B. Efficiency
C. Dependability
D. Flexibility
E. All of these
F. None of these
Answer - Click Here:
B
 26: Even under failure conditions Providing Quality of Service (QoS) assurance is the
responsibility of
A. Dependability
B. Adaptation
C. Flexibility
D. Efficiency
E. All of these
F. None of these
Answer - Click Here:
A
27: Interprocessor communication that takes place
A. Centralized memory
B. Shared memory
C. Message passing
D. Both A and B
E. All of these
F. None of these
Answer - Click Here:
D
 
28: Data centers and centralized computing covers many and
A. Microcomputers
B. Minicomputers
C. Mainframe computers
D. Supercomputers
E. All of these
F. None of these
Answer - Click Here:
D
29: Which of the following is an primary goal of HTC paradigm___________.
A. High ratio Identification
B. Low-flux computing
C. High-flux computing
D. Computer utilities
E. All of these
F. None of these
Answer - Click Here:
C
30: The  high-throughput service provided is measures taken by
A. Flexibility
B. Efficiency
D. Adaptation
E. Dependability
F. All of these
G. None of these
Answer - Click Here:
D

Parallel Processing MCQs


By: Prof. Fazal Rehman Shamil

 
A modem is very helpful to link up two computers with the help of?
(A). telephone line
(B). dedicated line
(C). All of these
(D). None of these
MCQ Answer: (C)
A whole micro-computer system consists of which of the following?
(A). microprocessor
(B). memory
(C). peripheral equipment
(D). all of these
(E). None of these
MCQ Answer: (D).
Which of the following program is a  micro-program written in  0 and 1?
(A). binary micro-program
(B). binary microinstruction
(C). symbolic microinstruction
(D). Symbolic microinstruction
(E). None of these
MCQ Answer: A
A pipeline is similar to which of the following?
(A). a gas line
(B). house pipeline
(C). both a and b
(D). an automobile assembly line
(E). None of these
MCQ Answer: D
A processor performing fetching or decoding of instructions during the execution of another instruction is
commonly known as?
(A). Super-scaling
(B). Parallel Computation
(C). Pipe-lining
(D). None of these
MCQ Answer: D
An optimizing compiler performs which of the following?
(A). Better compilation of the given code.
(B). better memory management.
(C). Takes the benefit of processor type and decreases its process time.
(D). Both a and c
(E). None of these
MCQ Answer: C
Which of the following wires is a collection of lines that connects several devices?
(A). internal wires
(B). peripheral connection wires
(C). Both a and b
(D). bus
(E). None of these
MCQ Answer:  (D).
Which of the following is an instruction to give a small delay in the program?
(A). NOP
(B). LDA
(C). BEA
(D). None of these
MCQ Answer: A
How to define a peripheral?
(A). any physical device connected to the computer
(B). tape drive connected to a computer
(C). any drives installed in the computer
(D). None of these
MCQ Answer: A

MCQ No - 1
Resources and clients transparency that allows movement within a system is
called ____________________
(A) Mobility transparency
(B) Concurrency transparency
(C) Replication transparency
(D) Performance transparency

Answer
A
MCQ No - 2
A distributed system is defined as a collection of autonomous computers linked
by a network with software designed to produce an integrated computing facility.
True or False?
(A) FALSE
(B) TRUE

Answer
B
MCQ No - 3
Which amongst the following is not an advantage of Distributed systems?
(A) Resource sharing
(B) Incremental growth
(C) Reliability
(D) None of the above

Answer
C
MCQ No - 4
If one site fails in distributed system, ___________
(A) the remaining sites can continue operating
(B) all the sites will stop working
(C) directly connected sites will stop working
(D) none of the mentioned

Answer
A
MCQ No - 5
The capability of a system to adapt the increased service load is called
_________
(A) capacity
(B) tolerance
(C) scalability
(D) none of the mentioned

Answer
C
MCQ No - 6
What are characteristic of Network Operating Systems ?
(A) Users are aware of multiplicity of machines
(B) They are transparent
(C) They are simple to use
(D) All of the mentioned

Answer
A
MCQ No - 7
What is the characteristics of atomicity ?
(A) Use communication links
(B) One processor as coordinator which handles all requests
(C) When responses are received from all processes, then process can enter its Critical Section
(D) All operations associated are executed to completion or none are performed

Answer
D
MCQ No - 8
Network operating system runs on ___________
(A) every system in the network
(B) server
(C) both server and every system in the network
(D) none of the mentioned

Answer
B
MCQ No - 9
The transparency that enables multiple instances of resources to be used, is
called ____________
(A) Performance transparency
(B) Scaling transparency
(C) Concurrency transparency
(D) Replication transparency

Answer
D
MCQ No - 10
A set of highly integrated machines that run the same process in parallel is
known to be ___________
(A) Space based
(B) Loosely coupled
(C) Tightly coupled
(D) Peer-to-Peer

Answer
C
MCQ No - 11
Which of the following will be true distributed system ?
(A) tightly-coupled software on loosely-coupled hardware
(B) loosely-coupled software on tightly-coupled hardware
(C) tightly-coupled software on tightly-coupled hardware
(D) loosely-coupled software on loosely-coupled hardware

Answer
A
MCQ No - 12
Distributed systems should ?
(A) high security
(B) have better resource sharing
(C) better system utilization
(D) low system overhead

Answer
B
MCQ No - 13
Scalability basically refers to the size of the network that is to be used and it
consists for various sizes. Thus this may create some problems in the network.
To solve the scalability problem, which are basically three techniques for scaling?
I. Hiding communication latencies II. Distribution III. Replication
(A) I, III
(B) II, III
(C) I, II
(D) I, II, III

Answer
D
MCQ No - 14
Distributed OS works on the ________ principle.
(A) File Foundation
(B) Multi system image
(C) Single system image
(D) Networking image

Answer
C
MCQ No - 15
Distributed systems have __________
(A) high security
(B) better resource sharing
(C) better system utilization
(D) low system overhead

Answer
B
MCQ No - 16
What is not true about distributed system ?
(A) It is a collection of processor
(B) All processors are synchronized
(C) They do not share memory
(D) None of the mentioned

Answer
B
MCQ No - 17
What are characteristics of Distributed Operating system ?
(A) Access is done like local resources
(B) Users are aware of multiplicity of machines
(C) Users are aware of multiplicity of machines
(D) They have multiple zones to access files

Answer
A
MCQ No - 18
In distributed file system, when a file’s physical storage location changes
________________
(A) file name need to be changed
(B) file name need not to be changed
(C) file’s host name need to be changed
(D) file’s local name need to be changed

Answer
B
MCQ No - 19
All the resources are tightly coupled in the computing paradigm of __________
(A) Cloud computing
(B) Parallel computing
(C) Distributed computing
(D) Centralized computing

Answer
D
MCQ No - 20
The transparency that enables accessing local and remote resources using
identical operations is called ____________
(A) Access transparency
(B) Concurrency transparency
(C) Performance transparency
(D) Scaling transparency

Answer
A
MCQ No - 21
Individual wires from machine to machine, with many different wiring patterns in
use is an example of _________
(A) Switched
(B) Bus
(C) Both
(D) None of the mentioned

Answer
A
MCQ No - 22
There are four requirements in the design of a distributed system. Choose the
correct combination from the list below.
(A) Network performance, Quality of Service (QoS), Caching and replication, Dependability issues
(B) Network dependency, Quantity of Service (QoS), Cookies and replication, Dependability issues.
(C) Network integrity, Quality of Software (QoS), Caching and alteration, Dependability issues
(D) Network Accessibility, Quality of hardware (QoH), Caching and replication, Dependability issues.

Answer
A
MCQ No - 23
Concurrency is one of the intrinsic characteristics of distributed systems. Here,
Parallel executions occurs because __________
(A) Many users simultaneously invoke commands or interact with (the same) application programs.
(B) Many server processes run concurrently, each corresponding to a single request from a client
process.
(C) A and B Both
(D) None of these

Answer
C
MCQ No - 24
"Consider the two statements. (A) A network operating system, the users access
remote resources in the same manner as local resource. (B) In a distributed
operating system, the user can access remote resources either by logging into
the appropriate remote machine or transferring data from the remote machine to
their own machine. Which of the statement is true?
(A) A true, B false
(B) B true, A false
(C) Both A and B false
(D) Both A and B true

Answer
C
MCQ No - 25
Centralized computing covers many data centers and ________
(A) Minicomputers
(B) Mainframe computers
(C) Microcomputers
(D) Supercomputers

Answer
D
MCQ No - 26
Data centers and centralized computing covers many and _________________
(A) Microcomputers
(B) Minicomputers
(C) Mainframe computers
(D) Supercomputers

Answer
D
MCQ No - 27
The characteristics of a distributed system are :
(A) Resource sharing, heterogeneity, openness, security
(B) Scalability, fault handling
(C) Concurrency, transparency
(D) ALL are acceptable answers

Answer
D
MCQ No - 28
Which are the character characteristics of a decentralized algorithms: I. No
machine has complete information about the system state. II. Machines make
decisions based only on local information. III. Failure of one machine does not
damage the algorithm. IV. There is no implicit assumption that a global clock
exist
(A) I, II, IV
(B) II, III, IV
(C) I, II, III, IV
(D) I, II, III

Answer
C
MCQ No - 29
What is not a major reason for building distributed systems ?
(A) Resource sharing
(B) Computation speedup
(C) Reliability
(D) Simplicity

Answer
D
MCQ No - 30
What are design issues in distributed system structure ?
(A) Scalability
(B) Fault-tolerance
(C) Flexibility
(D) All of the mentioned

Answer
D
MCQ No - 31
What are the characteristics of tightly coupled system ? I. Different clock II. Use
communication links III. Same clock IV. Distributed systems
(A) II, III and IV
(B) I and IV
(C) I, II and III
(D) I

Answer
A
MCQ No - 32
Location transparency allows for which of the following?
(A) Users to treat the data as if it is at one location
(B) Programmers to treat the data as if it is at one location
(C) Managers to treat the data as if it is at one location
(D) All of the above.

Answer
D
MCQ No - 33
All the resources are shared and integrated within one OS, in the computing
paradigm named _________
(A) Distributed computing
(B) Centralized computing
(C) Cloud computing
(D) Parallel computing

Answer
B
MCQ No - 34
What are the Advantages of Distributed Systems over Independent PCs?
(A) Data sharing
(B) Resource Sharing
(C) Communication
(D) All of the above

Answer
D
Operating System Questions & Answers – Distributed Operating System
This set of Operating System Multiple Choice Questions & Answers (MCQs) focuses on
“Distributed Operating System”.
1. In distributed system, each processor has its own ___________
a) local memory
b) clock
c) both local memory and clock
d) none of the mentioned
View Answer
2. If one site fails in distributed system then ___________
a) the remaining sites can continue operating
b) all the sites will stop working
c) directly connected sites will stop working
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
3. Network operating system runs on ___________
a) server
b) every system in the network
c) both server and every system in the network
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
4. Which technique is based on compile-time program transformation for accessing remote
data in a distributed-memory parallel system?
a) cache coherence scheme
b) computation migration
c) remote procedure call
d) message passing
View Answer
Answer: b
Explanation: None.
5. Logical extension of computation migration is ___________
a) process migration
b) system migration
c) thread migration
d) data migration
View Answer
Answer: a
Explanation: None.
6. Processes on the remote systems are identified by ___________
a) host ID
b) host name and identifier
c) identifier
d) process ID
View Answer
7. Which routing technique is used in a distributed system?
a) fixed routing
b) virtual routing
c) dynamic routing
d) all of the mentioned
View Answer
Answer: d
Explanation: None.
8. In distributed systems, link and site failure is detected by ___________
a) polling
b) handshaking
c) token passing
d) none of the mentioned
View Answer
Answer: b
Explanation: None.
9. The capability of a system to adapt the increased service load is called ___________
a) scalability
b) tolerance
c) capacity
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
10. Internet provides _______ for remote login.
a) telnet
b) http
c) ftp
d) rpc
View Answer
Answer: a
Explanation: None.
Operating System Questions and Answers – Remote Procedure Calls
« Prev
Next »
This set of Operating System Multiple Choice Questions & Answers (MCQs) focuses on
“Remote Procedure Calls”.
1. Remote Procedure Calls are used ____________
a) for communication between two processes remotely different from each other on the
same system
b) for communication between two processes on the same system
c) for communication between two processes on separate systems
d) none of the mentioned
View Answer
Answer: c
Explanation: None.
2. To differentiate the many network services a system supports ______ are used.
a) Variables
b) Sockets
c) Ports
d) Service names
View Answer
Answer: c
Explanation: None.
3. RPC provides a(an) _____ on the client side, a separate one for each remote procedure.
a) stub
b) identifier
c) name
d) process identifier
View Answer
Answer: a
Explanation: None.
4. What is stub?
a) transmits the message to the server where the server side stub receives the message
and invokes procedure on the server side
b) packs the parameters into a form transmittable over the network
c) locates the port on the server
d) all of the mentioned
View Answer
Answer: d
Explanation: None.

5. To resolve the problem of data representation on different systems RPCs define


_____________
a) machine dependent representation of data
b) machine representation of data
c) machine-independent representation of data
d) none of the mentioned
View Answer
Answer: c
Explanation: None.
6. What is the full form of RMI?
a) Remote Memory Installation
b) Remote Memory Invocation
c) Remote Method Installation
d) Remote Method Invocation
View Answer
Answer: d
Explanation: None.
7. The remote method invocation __________
a) allows a process to invoke memory on a remote object
b) allows a thread to invoke a method on a remote object
c) allows a thread to invoke memory on a remote object
d) allows a process to invoke a method on a remote object
View Answer
Answer: b
Explanation: None.
8. A process that is based on IPC mechanism which executes on different systems and can
communicate with other processes using message based communication, is called
________
a) Local Procedure Call
b) Inter Process Communication
c) Remote Procedure Call
d) Remote Machine Invocation
View Answer
Answer: c
Explanation: None.

Operating System Questions and Answers – Process Structures


This set of Operating System Multiple Choice Questions & Answers (MCQs) focuses on
“Process Structures”.
1. The initial program that is run when the computer is powered up is called __________
a) boot program
b) bootloader
c) initializer
d) bootstrap program
View Answer
Answer: d
Explanation: None.
2. How does the software trigger an interrupt?
a) Sending signals to CPU through bus
b) Executing a special operation called system call
c) Executing a special program called system program
d) Executing a special program called interrupt trigger program
View Answer
Answer: b
Explanation: None.
3. What is a trap/exception?
a) hardware generated interrupt caused by an error
b) software generated interrupt caused by an error
c) user generated interrupt caused by an error
d) none of the mentioned
View Answer
Answer: b
Explanation: None.
4. What is an ISR?
a) Information Service Request
b) Interrupt Service Request
c) Interrupt Service Routine
d) Information Service Routine
View Answer
Answer: c
Explanation: None.
5. What is an interrupt vector?
a) It is an address that is indexed to an interrupt handler
b) It is a unique device number that is indexed by an address
c) It is a unique identity given to an interrupt
d) None of the mentioned
View Answer
Answer: a
Explanation: None.

6. DMA is used for __________


a) High speed devices(disks and communications network)
b) Low speed devices
c) Utilizing CPU cycles
d) All of the mentioned
View Answer
Answer: a
Explanation: None.
7. In a memory mapped input/output __________
a) the CPU uses polling to watch the control bit constantly, looping to see if a device is
ready
b) the CPU writes one data byte to the data register and sets a bit in control register to show
that a byte is available
c) the CPU receives an interrupt when the device is ready for the next byte
d) the CPU runs a user written code and does accordingly
View Answer
Answer: b
Explanation: None.
8. In a programmed input/output(PIO) __________
a) the CPU uses polling to watch the control bit constantly, looping to see if a device is
ready
b) the CPU writes one data byte to the data register and sets a bit in control register to show
that a byte is available
c) the CPU receives an interrupt when the device is ready for the next byte
d) the CPU runs a user written code and does accordingly
View Answer
Answer: a
Explanation: None.
9. In an interrupt driven input/output __________
a) the CPU uses polling to watch the control bit constantly, looping to see if a device is
ready
b) the CPU writes one data byte to the data register and sets a bit in control register to show
that a byte is available
c) the CPU receives an interrupt when the device is ready for the next byte
d) the CPU runs a user written code and does accordingly
View Answer
Answer: c
Explanation: None.
10. In the layered approach of Operating Systems __________
a) Bottom Layer(0) is the User interface
b) Highest Layer(N) is the User interface
c) Bottom Layer(N) is the hardware
d) Highest Layer(N) is the hardware
View Answer
Answer: b
Explanation: None.
11. How does the Hardware trigger an interrupt?
a) Sending signals to CPU through a system bus
b) Executing a special program called interrupt program
c) Executing a special program called system program
d) Executing a special operation called system call
View Answer
Answer: a
Explanation: None.
12. Which operation is performed by an interrupt handler?
a) Saving the current state of the system
b) Loading the interrupt handling code and executing it
c) Once done handling, bringing back the system to the original state it was before the
interrupt occurred
d) All of the mentioned
View Answer
Answer: d
Explanation: None.

Operating System Questions & Answers – Distributed Operating System


This set of Operating System Multiple Choice Questions & Answers (MCQs) focuses on
“Distributed Operating System”.
1. In distributed system, each processor has its own ___________
a) local memory
b) clock
c) both local memory and clock
d) none of the mentioned
View Answer
Answer: c
Explanation: None.
2. If one site fails in distributed system then ___________
a) the remaining sites can continue operating
b) all the sites will stop working
c) directly connected sites will stop working
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
3. Network operating system runs on ___________
a) server
b) every system in the network
c) both server and every system in the network
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
4. Which technique is based on compile-time program transformation for accessing remote
data in a distributed-memory parallel system?
a) cache coherence scheme
b) computation migration
c) remote procedure call
d) message passing
View Answer
Answer: b
Explanation: None.
5. Logical extension of computation migration is ___________
a) process migration
b) system migration
c) thread migration
d) data migration
View Answer
Answer: a
Explanation: None.

6. Processes on the remote systems are identified by ___________


a) host ID
b) host name and identifier
c) identifier
d) process ID
View Answer
Answer: b
Explanation: None.
7. Which routing technique is used in a distributed system?
a) fixed routing
b) virtual routing
c) dynamic routing
d) all of the mentioned
View Answer
Answer: d
Explanation: None.
8. In distributed systems, link and site failure is detected by ___________
a) polling
b) handshaking
c) token passing
d) none of the mentioned
View Answer
Answer: b
Explanation: None.
9. The capability of a system to adapt the increased service load is called ___________
a) scalability
b) tolerance
c) capacity
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
10. Internet provides _______ for remote login.
a) telnet
b) http
c) ftp
d) rpc
View Answer
Answer: a
Explanation: None.

Operating System Questions & Answers – Distributed Operating System – Types &
Resource Sharing
This set of Operating System Multiple Choice Questions & Answers (MCQs) focuses on
“Distributed Operating System – Types & Resource Sharing”.
1. What is not true about a distributed system?
a) It is a collection of processor
b) All processors are synchronized
c) They do not share memory
d) None of the mentioned
View Answer
Answer: b
Explanation: None.
2. What are the characteristics of processor in distributed system?
a) They vary in size and function
b) They are same in size and function
c) They are manufactured with single purpose
d) They are real-time devices
View Answer
Answer: a
Explanation: None.
3. What are the characteristics of a distributed file system?
a) Its users, servers and storage devices are dispersed
b) Service activity is not carried out across the network
c) They have single centralized data repository
d) There are multiple dependent storage devices
View Answer
Answer: a
Explanation: None.
4. What is not a major reason for building distributed systems?
a) Resource sharing
b) Computation speedup
c) Reliability
d) Simplicity
View Answer
Answer: d
Explanation: None.
5. What are the types of distributed operating system?
a) Network Operating system
b) Zone based Operating system
c) Level based Operating system
d) All of the mentioned
View Answer
Answer: a
Explanation: None.

6. What are characteristic of Network Operating Systems?


a) Users are aware of multiplicity of machines
b) They are transparent
c) They are simple to use
d) All of the mentioned
View Answer
Answer: a
Explanation: None.
7. How is access to resources of various machines is done?
a) Remote logging using ssh or telnet
b) Zone are configured for automatic access
c) FTP is not used
d) All of the mentioned
View Answer
Answer: a
Explanation: None.
8. What are the characteristics of Distributed Operating system?
a) Users are aware of multiplicity of machines
b) Access is done like local resources
c) Users are aware of multiplicity of machines
d) They have multiple zones to access files
View Answer
Answer: b
Explanation: None.
9. What are the characteristics of data migration?
a) transfer data by entire file or immediate portion required
b) transfer the computation rather than the data
c) execute an entire process or parts of it at different sites
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
10. What are the characteristics of computation migration?
a) transfer data by entire file or immediate portion required
b) transfer the computation rather than the data
c) execute an entire process or parts of it at different sites
d) none of the mentioned
View Answer
Answer: b
Explanation: None.
11. What are the characteristics of process migration?
a) transfer data by entire file or immediate portion required
b) transfer the computation rather than the data
c) execute an entire process or parts of it at different sites
d) none of the mentioned
View Answer
Answer: c
Explanation: None.

Operating System Questions and Answers – Process Structures


This set of Operating System Multiple Choice Questions & Answers (MCQs) focuses on
“Process Structures”.
1. The initial program that is run when the computer is powered up is called __________
a) boot program
b) bootloader
c) initializer
d) bootstrap program
View Answer
Answer: d
Explanation: None.
2. How does the software trigger an interrupt?
a) Sending signals to CPU through bus
b) Executing a special operation called system call
c) Executing a special program called system program
d) Executing a special program called interrupt trigger program
View Answer
Answer: b
Explanation: None.
3. What is a trap/exception?
a) hardware generated interrupt caused by an error
b) software generated interrupt caused by an error
c) user generated interrupt caused by an error
d) none of the mentioned
View Answer
Answer: b
Explanation: None.
4. What is an ISR?
a) Information Service Request
b) Interrupt Service Request
c) Interrupt Service Routine
d) Information Service Routine
View Answer
Answer: c
Explanation: None.
5. What is an interrupt vector?
a) It is an address that is indexed to an interrupt handler
b) It is a unique device number that is indexed by an address
c) It is a unique identity given to an interrupt
d) None of the mentioned
View Answer
Answer: a
Explanation: None.

6. DMA is used for __________


a) High speed devices(disks and communications network)
b) Low speed devices
c) Utilizing CPU cycles
d) All of the mentioned
View Answer
Answer: a
Explanation: None.
7. In a memory mapped input/output __________
a) the CPU uses polling to watch the control bit constantly, looping to see if a device is
ready
b) the CPU writes one data byte to the data register and sets a bit in control register to show
that a byte is available
c) the CPU receives an interrupt when the device is ready for the next byte
d) the CPU runs a user written code and does accordingly
View Answer
Answer: b
Explanation: None.
8. In a programmed input/output(PIO) __________
a) the CPU uses polling to watch the control bit constantly, looping to see if a device is
ready
b) the CPU writes one data byte to the data register and sets a bit in control register to show
that a byte is available
c) the CPU receives an interrupt when the device is ready for the next byte
d) the CPU runs a user written code and does accordingly
View Answer
Answer: a
Explanation: None.
9. In an interrupt driven input/output __________
a) the CPU uses polling to watch the control bit constantly, looping to see if a device is
ready
b) the CPU writes one data byte to the data register and sets a bit in control register to show
that a byte is available
c) the CPU receives an interrupt when the device is ready for the next byte
d) the CPU runs a user written code and does accordingly
View Answer
Answer: c
Explanation: None.
10. In the layered approach of Operating Systems __________
a) Bottom Layer(0) is the User interface
b) Highest Layer(N) is the User interface
c) Bottom Layer(N) is the hardware
d) Highest Layer(N) is the hardware
View Answer
Answer: b
Explanation: None.
11. How does the Hardware trigger an interrupt?
a) Sending signals to CPU through a system bus
b) Executing a special program called interrupt program
c) Executing a special program called system program
d) Executing a special operation called system call
View Answer
Answer: a
Explanation: None.
12. Which operation is performed by an interrupt handler?
a) Saving the current state of the system
b) Loading the interrupt handling code and executing it
c) Once done handling, bringing back the system to the original state it was before the
interrupt occurred
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
Operating System Questions & Answers – Distributed File System – 2
This set of JUnit Questions and Answers for Aptitude test focuses on “Distributed File
System – 2”.
1. What is a stateless file server?
a) It keeps tracks of states of different objects
b) It maintains internally no state information at all
c) It maintains some information in them
d) None of the mentioned
View Answer
Answer: b
Explanation: None.
2. What are the characteristics of the stateless server?
a) Easier to implement
b) They are not fault-tolerant upon client or server failures
c) They store all information file server
d) They are redundant to keep data safe
View Answer
Answer: a
Explanation: None.
3. Implementation of a stateless file server must not follow?
a) Idempotency requirement
b) Encryption of keys
c) File locking mechanism
d) Cache consistency
View Answer
Answer: b
Explanation: None.
4. What are the advantages of file replication?
a) Improves availability & performance
b) Decreases performance
c) They are consistent
d) Improves speed
View Answer
Answer: a
Explanation: None.
5. What are characteristic of NFS protocol?
a) Search for file within directory
b) Read a set of directory entries
c) Manipulate links and directories
d) All of the mentioned
View Answer
Answer: d
Explanation: None.

6. What is the coherency of replicated data?


a) All replicas are identical at all times
b) Replicas are perceived as identical only at some points in time
c) Users always read the most recent data in the replicas
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
7. What are the three popular semantic modes?
a) Unix, Coherent & Session semantics
b) Unix, Transaction & Session semantics
c) Coherent, Transaction & Session semantics
d) Session, Coherent semantics
View Answer
Answer: b
Explanation: None.
8. What are the characteristics of Unix semantics?
a) Easy to implement in a single processor system
b) Data cached on a per process basis using write through case control
c) Write-back enhances access performance
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
9. What are the characteristics of transaction semantics?
a) Suitable for applications that are concerned about coherence of data
b) The users of this model are interested in the atomicity property for their transaction
c) Easy to implement in a single processor system
d) Write-back enhances access performance
View Answer
Answer: b
Explanation: None.
10. What are non characteristics of session semantics?
a) Each client obtains a working copy from the server
b) When file is closed, the modified file is copied to the file server
c) The burden of coordinating file sharing is ignored by the system
d) Easy to implement in a single processor system
View Answer
Answer: d
Explanation: None.

Operating System Questions & Answers – Distributed File System – 3


This set of Operating System Multiple Choice Questions & Answers (MCQs) focuses on
“Distributed File System – 3”.
1. The file once created can not be changed is called ___________
a) immutable file
b) mutex file
c) mutable file
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
2. ______ of the distributed file system are dispersed among various machines of
distributed system.
a) Clients
b) Servers
c) Storage devices
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
3. _______ is not possible in distributed file system.
a) File replication
b) Migration
c) Client interface
d) Remote access
View Answer
Answer: b
Explanation: None.
4. Which one of the following hides the location where in the network the file is stored?
a) transparent distributed file system
b) hidden distributed file system
c) escaped distribution file system
d) spy distributed file system
View Answer
Answer: a
Explanation: None.
5. In a distributed file system, when a file’s physical storage location changes ___________
a) file name need to be changed
b) file name need not to be changed
c) file’s host name need to be changed
d) file’s local name need to be changed
View Answer
Answer: b
Explanation: None.
6. In a distributed file system, _______ is mapping between logical and physical objects.
a) client interfacing
b) naming
c) migration
d) heterogeneity
View Answer
Answer: b
Explanation: None.
7. In a distributed file system, a file is uniquely identified by ___________
a) host name
b) local name
c) the combination of host name and local name
d) none of the mentioned
View Answer
Answer: c
Explanation: None.
8. There is no need to establish and terminate a connection through open and close
operation in ___________
a) stateless file service
b) stateful file service
c) both stateless and stateful file service
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
9. In distributed file system, file name does not reveal the file’s ___________
a) local name
b) physical storage location
c) both local name and physical storage location
d) none of the mentioned
View Answer
Answer: b
Explanation: None.
10. Which one of the following is a distributed file system?
a) andrew file system
b) network file system
c) novel network
d) all of the mentioned
View Answer
Answer: d
Explanation: None.
Operating System Questions & Answers – Distributed Coordination
This set of Operating System Multiple Choice Questions & Answers (MCQs) focuses on
“Distributed Coordination”.
1. What are the characteristics of tightly coupled system?
i) Same clock, usually shared memory
ii) Communication is via this shared memory
iii) Multiprocessors
iv) Different clock
a) i
b) i, ii and ii
c) ii and iii
d) i, iii and iv
View Answer
Answer: b
Explanation: None.
2. What are the characteristics of tightly coupled system?
i) Different clock
ii) Use communication links
iii) Same clock
iv) Distributed systems
a) i
b) i and iv
c) i, ii and iii
d) ii, iii and iv
View Answer
Answer: d
Explanation: None.
3. What are the characteristics of mutual exclusion using centralized approach?
a) One processor as coordinator which handles all requests
b) It requires request,reply and release per critical section entry
c) The method is free from starvation
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
4. What are the characteristics of fully distributed approach?
i) When responses are received from all processes, then process can enter its Critical
Section
ii) When process exits its critical section, the process sends reply messages to all its
deferred requests.
iii) It requires request,reply and release per critical section entry
iv) One processor as coordinator which handles all requests
a) i
b) i and ii
c) ii and iii
d) iii and iv
View Answer
Answer: b
Explanation: None.
5. What are the advantages of token(with rings) passing approach?
i) One processor as coordinator which handles all requests
ii) No starvation if the ring is unidirectional
iii) There are many messages passed per section entered if few users want to get in section
iv) One processor as coordinator which handles all requests
v) Only one message/entry if everyone wants to get in
a) i
b) ii and iii
c) i, ii and iii
d) i, ii and iv
View Answer
Answer: d
Explanation: None.

6. What are the characteristics of atomicity?


a) All operations associated are executed to completion or none are performed
b) One processor as coordinator which handles all requests
c) When responses are received from all processes, then the process can enter its Critical
Section
d) Use communication links
View Answer
Answer: a
Explanation: None.
7. What things are the transaction coordinator is responsible for?
a) Starting the execution of the transaction
b) Breaking transaction into a number of subtransactions
c) Coordinating the termination of the transaction
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
8. Which of the following advantages follows the single coordinator approach?
a) Simple implementation
b) Simple deadlock handling
c) bottleneck
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
9. Which of the following disadvantages follows the single coordinator approach?
a) Bottleneck
b) Slow response
c) Deadlock
d) One request per second
View Answer
Answer: a
Explanation: None.
10. What are the disadvantages of majority protocol?
a) Complicated implementation
b) Deadlock cannot occur easily
c) Bottleneck
d) All of the mentioned
View Answer
Answer: a
Explanation: None.
11. What are the parts of a global unique identifier?
a) Local unique timestamp
b) Remote timestamp
c) Clock number
d) All of the mentioned
View Answer
Answer: a
Explanation: None.
12. Which are the two complementary deadlock-prevention schemes using timestamps?
a) The wait-die & wound-wait scheme
b) The wait-n-watch scheme
c) The wound-wait scheme
d) The wait-wound & wound-wait scheme
View Answer
Answer: a
Explanation: None.

Operating System Questions & Answers – Distributed Synchronization


This set of Operating System Multiple Choice Questions & Answers (MCQs) focuses on
“Distributed Synchronization”.
1. In distributed systems, a logical clock is associated with ______________
a) each instruction
b) each process
c) each register
d) none of the mentioned
View Answer
Answer: b
Explanation: None.
2. If timestamps of two events are same, then the events are ____________
a) concurrent
b) non-concurrent
c) monotonic
d) non-monotonic
View Answer
Answer: a
Explanation: None.
3. If a process is executing in its critical section ____________
a) any other process can also execute in its critical section
b) no other process can execute in its critical section
c) one more process can execute in its critical section
d) none of the mentioned
View Answer
Answer: b
Explanation: None.
4. A process can enter into its critical section ____________
a) anytime
b) when it receives a reply message from its parent process
c) when it receives a reply message from all other processes in the system
d) none of the mentioned
View Answer
Answer: c
Explanation: None.
5. For proper synchronization in distributed systems ____________
a) prevention from the deadlock is must
b) prevention from the starvation is must
c) prevention from the deadlock & starvation is must
d) none of the mentioned
View Answer
Answer: c
Explanation: None.

6. In the token passing approach of distributed systems, processes are organized in a ring
structure ____________
a) logically
b) physically
c) both logically and physically
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
7. In distributed systems, what will the transaction coordinator do?
a) starts the execution of transaction
b) breaks the transaction into number of sub transactions
c) coordinates the termination of the transaction
d) all of the mentioned
View Answer
Answer: d
Explanation: None.
8. In case of failure, a new transaction coordinator can be elected by ____________
a) bully algorithm
b) ring algorithm
c) both bully and ring algorithm
d) none of the mentioned
View Answer
Answer: c
Explanation: None.
9. In distributed systems, election algorithms assumes that ____________
a) a unique priority number is associated with each active process in system
b) there is no priority number associated with any process
c) priority of the processes is not required
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
10. According to the ring algorithm, links between processes are ____________
a) bidirectional
b) unidirectional
c) both bidirectional and unidirectional
d) none of the mentioned
View Answer
Answer: b
Explanation: None.

Question : 1
In shared Memory
a) Multiple processors can operate independently but share the same
memory resources
b) Multiple processors can operate independently but do not share the
same memory resources
c) Multiple processors can operate independently but some do not share
the same memory resources
d) None of these
Answer » Discuss »
Answer: (a)
Question : 2
These applications typically have multiple executable object files
(programs). While the application is being run in parallel, each task can
be executing the same or different program as other tasks. All tasks may
use different data
a) Single Program Multiple Data (SPMD)
b) Multiple Program Multiple Data (MPMD)
c) Von Neumann Architecture
d) None of these
Answer » Discuss »
Answer: (b)
Question : 3
Load balancing is
a) Involves only those tasks executing a communication operation
b) It exists between program statements when the order of statement
execution affects the results of the program.
c) It refers to the practice of distributing work among tasks so that all
tasks are kept busy all of the time. It can be considered as minimization
of task idle time.
d) None of these
Answer » Discuss »
Answer: (c)
Question : 4
In designing a parallel program, one has to break the problem into
discreet chunks of work that can be distributed to multiple tasks. This is
known as
a) Decomposition
b) Partitioning
c) Compounding
d) Both A and B
Answer » Discuss »
Answer: (d)
Question : 5
Fine-grain Parallelism is
a) In parallel computing, it is a qualitative measure of the ratio of
computation to communication
b) Here relatively small amounts of computational work are done
between communication events
c) Relatively large amounts of computational work are done between
communication / synchronization events
d) None of these
Answer » Discuss »
Answer: (b)
Question : 6
Granularity is
a) In parallel computing, it is a qualitative measure of the ratio of
computation to communication
b) Here relatively small amounts of computational work are done
between communication events
c) Relatively large amounts of computational work are done between
communication / synchronization events
d) None of these
Answer » Discuss »
Answer: (a)
Question : 7
Distributed Memory
a) A computer architecture where all processors have direct access to
common physical memory
b) It refers to network based memory access for physical memory that is
not common
c) Parallel tasks typically need to exchange dat(A) There are several ways
this can be accomplished, such as through, a shared memory bus or over
a network, however the actual event of data exchange is commonly
referred to as communications regardless of the method employe(D)
d) None of these
Answer » Discuss »
Answer: (b)
Question : 8
Serial Execution
a) A sequential execution of a program, one statement at a time
b) Execution of a program by more than one task, with each task being
able to execute the same or different statement at the same moment in
time
c) A program or set of instructions that is executed by a processor.
d) None of these
Answer » Discuss »
Answer: (a)
Question : 9
Functional Decomposition:
a) Partitioning in that the data associated with a problem is
decompose(D) Each parallel task then works on a portion of the dat(A)
b) Partitioning in that, the focus is on the computation that is to be
performed rather than on the data manipulated by the computation. The
problem is decomposed according to the work that must be done. Each
task then performs a portion of the overall work.
c) It is the time it takes to send a minimal (0 byte) message from point A
to point (B)
d) None of these
Answer » Discuss »
Answer: (b)
Question : 10
It distinguishes multi-processor computer architectures according to
how they can be classified along the two independent dimensions of
Instruction and Dat(A) Each of these dimensions can have only one of
two possible states: Single or Multiple.
a) Single Program Multiple Data (SPMD)
b) Flynn’s taxonomy
c) Von Neumann Architecture
d) None of these
Answer » Discuss »
Answer: (b)
Question : 11
Coarse-grain Parallelism
a) In parallel computing, it is a qualitative measure of the ratio of
computation to communication
b) Here relatively small amounts of computational work are done
between communication events
c) Relatively large amounts of computational work are done between
communication / synchronization events
d) None of these
Answer » Discuss »
Answer: (c)
Question : 12
Parallel Execution
a) A sequential execution of a program, one statement at a time
b) Execution of a program by more than one task, with each task being
able to execute the same or different statement at the same moment in
time
c) A program or set of instructions that is executed by a processor.
d) None of these
Answer » Discuss »
Answer: (b)
Question : 13
In shared Memory:
a) Here all processors access, all memory as global address space
b) Here all processors have individual memory
c) Here some processors access, all memory as global address space and
some not
d) None of these
Answer » Discuss »
Answer: (a)
Question : 14
Massively Parallel
a) Observed speedup of a code which has been parallelized, defined as:
wall-clock time of serial execution and wall-clock time of parallel
execution
b) The amount of time required to coordinate parallel tasks. It includes
factors such as: Task start-up time, Synchronizations, Data
communications.
c) Refers to the hardware that comprises a given parallel system - having
many processors
d) None of these
Answer » Discuss »
Answer: (b)
Question : 15
Cache Coherent UMA (CC-UMA) is
a) Here all processors have equal access and access times to memory
b) Here if one processor updates a location in shared memory, all the
other processors know about the update.
c) Here one SMP can directly access memory of another SMP and not all
processors have equal access time to all memories
d) None of these
Answer » Discuss »
Answer: (b)
Question : 1
Scalability refers to a parallel system’s (hardware and/or software) ability
a) To demonstrate a proportionate increase in parallel speedup with the
removal of some processors
b) To demonstrate a proportionate increase in parallel speedup with the
addition of more processors
c) To demonstrate a proportionate decrease in parallel speedup with the
addition of more processors
d) None of these
Answer » Discuss »
Answer: (b)
Question : 2
Uniform Memory Access (UMA) referred to
a) Here all processors have equal access and access times to memory
b) Here if one processor updates a location in shared memory, all the
other processors know about the update.
c) Here one SMP can directly access memory of another SMP and not all
processors have equal access time to all memories
d) None of these
Answer » Discuss »
Answer: (a)
Question : 3
Parallel computing can include
a) Single computer with multiple processors
b) Arbitrary number of computers connected by a network
c) Combination of both A and B
d) None of these
Answer » Discuss »
Answer: (c)
Question : 4
In shared Memory
a) Changes in a memory location effected by one processor do not affect
all other processors.
b) Changes in a memory location effected by one processor are visible to
all other processors
c) Changes in a memory location effected by one processor are randomly
visible to all other processors.
d) None of these
Answer » Discuss »
Answer: (b)
Question : 5
Collective communication
a) It involves data sharing between more than two tasks, which are often
specified as being members in a common group, or collective.
b) It involves two tasks with one task acting as the sender/producer of
data, and the other acting as the receiver/consumer.
c) It allows tasks to transfer data independently from one another.
d) None of these
Answer » Discuss »
Answer: (a)
Question : 6
Point-to-point communication referred to
a) It involves data sharing between more than two tasks, which are often
specified as being members in a common group, or collective.
b) It involves two tasks with one task acting as the sender/producer of
data, and the other acting as the receiver/consumer.*
c) It allows tasks to transfer data independently from one another.
d) None of these
Answer » Discuss »
Answer: (b)
Question : 7
Shared Memory is
a) A computer architecture where all processors have direct access to
common physical memory
b) It refers to network based memory access for physical memory that is
not common.
c) Parallel tasks typically need to exchange dat(A) There are several ways
this can be accomplished, such as through, a shared memory bus or over
a network, however the actual event of data exchange is commonly
referred to as communications regardless of the method employe(D)
d) None of these
Answer » Discuss »
Answer: (a)
Question : 8
Data dependence is
a) Involves only those tasks executing a communication operation
b) It exists between program statements when the order of statement
execution affects the results of the program.
c) It refers to the practice of distributing work among tasks so that all
tasks are kept busy all of the time. It can be considered as minimization
of task idle time.
d) None of these
Answer » Discuss »
Answer: (b)
Question : 9
Non-Uniform Memory Access (NUMA) is
a) Here all processors have equal access and access times to memory
b) Here if one processor updates a location in shared memory, all the
other processors know about the update.
c) Here one SMP can directly access memory of another SMP and not all
processors have equal access time to all memories
d) None of these
Answer » Discuss »
Answer: (c)
Question : 10
In the threads model of parallel programming
a) A single process can have multiple, concurrent execution paths
b) A single process can have single, concurrent execution paths.
c) A multiple process can have single concurrent execution paths.
d) None of these
Answer » Discuss »
Answer: (a)
Question : 6
Point-to-point communication referred to
a) It involves data sharing between more than two tasks, which are often
specified as being members in a common group, or collective.
b) It involves two tasks with one task acting as the sender/producer of
data, and the other acting as the receiver/consumer.*
c) It allows tasks to transfer data independently from one another.
d) None of these
Answer » Discuss »
Answer: (b)
Question : 7
Shared Memory is
a) A computer architecture where all processors have direct access to
common physical memory
b) It refers to network based memory access for physical memory that is
not common.
c) Parallel tasks typically need to exchange dat(A) There are several ways
this can be accomplished, such as through, a shared memory bus or over
a network, however the actual event of data exchange is commonly
referred to as communications regardless of the method employe(D)
d) None of these
Answer » Discuss »
Answer: (a)
Question : 8
Data dependence is
a) Involves only those tasks executing a communication operation
b) It exists between program statements when the order of statement
execution affects the results of the program.
c) It refers to the practice of distributing work among tasks so that all
tasks are kept busy all of the time. It can be considered as minimization
of task idle time.
d) None of these
Answer » Discuss »
Answer: (b)
Question : 9
Non-Uniform Memory Access (NUMA) is
a) Here all processors have equal access and access times to memory
b) Here if one processor updates a location in shared memory, all the
other processors know about the update.
c) Here one SMP can directly access memory of another SMP and not all
processors have equal access time to all memories
d) None of these
Answer » Discuss »
Answer: (c)
Question : 10
In the threads model of parallel programming
a) A single process can have multiple, concurrent execution paths
b) A single process can have single, concurrent execution paths.
c) A multiple process can have single concurrent execution paths.
d) None of these
Answer » Discuss »
Answer: (a)
Question : 16
These computer uses the stored-program concept. Memory is used to
store both program and data instructions and central processing unit
(CPU) gets instructions and/ or data from memory. CPU, decodes the
instructions and then sequentially performs them.
a) Single Program Multiple Data (SPMD)
b) Flynn’s taxonomy
c) Von Neumann Architecture
d) None of these
Answer » Discuss »
Answer: (c)
Question : 17
Synchronous communications
a) It require some type of “handshaking” between tasks that are sharing
dat(A) This can be explicitly structured in code by the programmer, or it
may happen at a lower level unknown to the programmer.
b) It involves data sharing between more than two tasks, which are often
specified as being members in a common group, or collective.
c) It involves two tasks with one task acting as the sender/producer of
data, and the other acting as the receiver/consumer.
d) It allows tasks to transfer data independently from one another.
Answer » Discuss »
Answer: (a)
Question : 18
Latency is
a) Partitioning in that the data associated with a problem is
decompose(D) Each parallel task then works on a portion of the dat(A)
b) Partitioning in that, the focus is on the computation that is to be
performed rather than on the data manipulated by the computation. The
problem is decomposed according to the work that must be done. Each
task then performs a portion of the overall work.
c) It is the time it takes to send a minimal (0 byte) message from one
point to other point
d) None of these
Answer » Discuss »
Answer: (c)
Question : 19
Asynchronous communications
a) It involves data sharing between more than two tasks, which are often
specified as being members in a common group, or collective.
b) It involves two tasks with one task acting as the sender/producer of
data, and the other acting as the receiver/consumer.
c) It allows tasks to transfer data independently from one another.
d) None of these
Answer » Discuss »
Answer: (c)
Parallel Processing
Multiple Choice question & Answers:-

1) A collection of lines that connects several devices is called ..............

A. bus

B. peripheral connection wires

C. Both a and b

D. internal wires

Answer: A. bus

2) A complete microcomputer system consist of ...........

A. microprocessor

B. memory

C. peripheral equipment

D. all of the above

Answer: D. all of the above

3) PC Program Counter is also called ...................

A. instruction pointer

B. memory pointer

C. data counter

D. file pointer
Answer: A. instruction pointer

4) In a single byte how many bits will be there?

A. 8

B. 16

C. 4

D. 32

Answer: A. 8

5) CPU does not perform the operation ..................

A. data transfer

B. logic operation

C. arithmetic operation

D. all of the above

Answer: A. data transfer

6) The access time of memory is ............... the time required for performing any single CPU operation.

A. Longer than

B. Shorter than

C. Negligible than

D. Same as
Answer: A. Longer than

7) Memory address refers to the successive memory words and the machine is called as ............

A. word addressable

B. byte addressable

C. bit addressable

D. Terra byte addressable

Answer: A. word addressable

8) A microprogram written as string of 0's and 1's is a .............

A. Symbolic microinstruction

B. binary microinstruction

C. symbolic microinstruction

D. binary micro-program

Answer: D. binary micro-program

9) A pipeline is like ....................

A. an automobile assembly line

B. house pipeline

C. both a and b

D. a gas line

Answer: A. an automobile assembly line


10) Data hazards occur when .....................

A. Greater performance loss

B. Pipeline changes the order of read/write access to operands

C. Some functional unit is not fully pipelined

D. Machine size is limited

Answer: B. Pipeline changes the order of read/write access to operands

11) Processors of all computers, whether micro, mini or mainframe must have

A. ALU

B. Primary Storage

C. Control unit

D. All of above

Answer: D. All of above

12) What is the control unit's function in the CPU?

A. To transfer data to primary storage

B. to store program instruction

C. to perform logic operations

D. to decode program instruction

Answer: D. to decode program instruction

13) What is meant by a dedicated computer?


A. which is used by one person only

B. which is assigned to one and only one task

C. which does one kind of software

D. which is meant for application software only

Answer: B. which is assigned to one and only one task

14) The most common addressing techiniques employed by a CPU is

A. immediate

B. direct

C. indirect

D. register

E. all of the above

Answer: E. all of the above

15) Pipeline implement

A. fetch instruction

B. decode instruction

C. fetch operand

D. calculate operand

E. execute instruction

F. all of abve

Answer: F. all of abve

16) Which of the following code is used in present day computing was developed by IBM corporation?
A. ASCII

B. Hollerith Code

C. Baudot code

D. EBCDIC code

Answer: D. EBCDIC code

17) When a subroutine is called, the address of the instruction following the CALL instructions stored
in/on the

A. stack pointer

B. accumulator

C. program counter

D. Stack

Answer: D. Stack

18) A microprogram written as string of 0's and 1's is a

A. symbolic microinstruction

B. binary microinstruction

C. symbolic microprogram

D. binary microprogram

Answer: D. binary microprogram

19) Interrupts which are initiated by an instruction are


A. internal

B. external

C. hardware

D. Software

Answer: B. external

20) Memory access in RISC architecture is limited to instructions

A. CALL and RET

B. PUSH and POP

C. STA and LDA

D. MOV and JMP

Answer: C. STA and LDA

21) From where interrupts are generated?

A) Central processing unit

B) Memory chips

C) Registers

D) I/O devices

Answer: D) I/O devices

22) The output of a gate is low when at least one of its input is low . It is true for

A) AND gate

B) OR gate
C) NAND gate

D) NOR gate

Answer: A)AND gate

23) Which one of the following is most suitable to make a parity checker

A) AND gate

B) OR gate

C) Exclusive- OR gate

D) None of the above

Answer: C) Exclusive- OR gate

24) What is the minimum number of flip-flops required in a counter to count 100 pulses?

A) Five

B) seven

C) Ten

D) hundred

Answer: B) seven

25. For a RS flip-flop constructed with NAND gates and input R=1 and s=1 the state is

A) Memory state

B) Set state

C) Reset state

D) Unused state
Answer: D) Unused state

26. The advantage of RISC processor over CISC processor is that

A) The hardware architecture is simpler

B) An instruction can be executed in one cycle

C) Less number of registers accommodate in chip

D) Parallel execution capabilities

Answer: B) An instruction can be executed in one cycle

27. Which of the following is true about interrupts?

A) They are generated when memory cycles are stolen

B) They are used in place of data channels

C) They can be generated by arithmetic operation

D) They can indicate completion of an I/O operation

Answer: A) They are generated when memory cycles are stolen

28. Te devices connected to a microprocessor can use the data bus:

A) all the time

B) at regular interval of time

C) only when it’s sending or receiving data

D) when the microprocessor is reset

Answer: C) only when it’s sending or receiving data


29. Intel 8080 microprocessor has an instruction set of 91 instruction. The opcode to implement
this instruction set should be at least

A) 3 bit long

B) 5 bit long

C) 7 bit long

D) 9 bit long

Answer: C) 7 bit long

30. Dynamic RAMs are best suited to

A) slow system

B) large system

C) one bit system

D) none of the above

Answer: A) slow system

31. Intel Pentium CPU is a

A. RISC based

B. CISC based

C. Both of the above

D. None of the above

Answer: A. RISC based


32. A modem is used to link up two computers via

A. telephone line

B. dedicated line

C. Both of the above

D. None of the above

Answer: C. Both of the above

33. The maximum integer which can be stored on a 8 bit accumulator is


A. 112

B. 200

D. 224

Answer: C. 255

34. In a system with a 16 bit address bus, what is the maximum number of 1K byte memory devices it
could contain

A. 16

B. 64

C. 256

D. 65536

Answer: C. 256

35. Which of the following memories in a computer is volatile?


A. RAM

B. ROM

C. EPROM

D. ALL

Answer: A. RAM

36. A peripheral is

A. any drives installed in the computer

B. tapedrive connected to a computer

C. any physical device connected to the computer

D. None of above

Answer: C. any physical device connected to the computer

37. How many bits do you think will be adequate to encode individual character in Devnagari script

A. 12

B. 16

C. 64

D. 10

Answer: D. 10

38. Which of the following bus is used to transfer data from main memory to peripheral device?

A. DMA bus

B. Output bus
C. Data bus

D.All of the above

Answer: C. Data bus

39. To provide increased memory capacity for operating system, the

A. virtual memory is created

B. cache memory is increased

C. memory for OS is reserved

D. Additional memory is installed

Answer: A. virtual memory is created

40. CD -RAW is

A. Input device only

B. output device only

C. Both of the above

D. None of the above

Answer: B. output device only

41. Which of the following require large computer memory?

A. Imaging

B. Graphics

C. Voice

D. All of the above


Answer: D. All of the above

42. Which major development led to the production of microcomputers?

A. Magnetic disks

B. floppy disks

C. Logic gates

D. Integrated Circuits

Answer: D. Integrated Circuits

43. In immediate addressing the operand is placed

A. in the CPU register

B. after opcode in the instruction

C. in the memory

D. in the stack

Answer: B. after opcode in the instruction

44. Micro instructions are stored in

A. computer memory

B. primary storage

C. secondary storage

D. control memory

E. cache memory
Answer: D. control memory

45. Pipeline processing implement

A. fetch instruction

B. decode instruction

C. fetch operand

D. calculate operand

E. execute instruction

F. all of the above

Answer: F. all of the above

46. The 16- bit registers in 8085 is

A. general purpose register

B. accumulator

C. stack pointer and program counter

D. all of the above

Answer: C. stack pointer and program counter

47. Instruction pipelining has minimum stages

A. 4

B. 2

C. 3

D. 6
Answer: B. 2

48. Systems that do not have parallel processing capabilities are

A. SISD

B. SIMD

C. MIMD

D. All of the above

Answer: A. SISD

49. The word size of the microprocessor refers to

A. the amount of a information that can be stored in a byte

B. the amount of a information that can be stored in a cycle

C. The number of machine operations performed in a second

D. the maximum length of an English word that can be input to a computer

Answer: B. the amount of a information that can be stored in a cycle

50. How many address lines are needed to address each memory location in a 2048X 4 memory chip?

A. 10

B. 11

C. 8

D. 12

Answer: B. 11
51. Who is regarded as the founder of Computer Architecture?

A. Alan Turing

B. Konrad Zuse

C. John von Neumann

D. John William Mauchly

E. None of the answers above is correct

Answer: C. John von Neumann

52. What is characteristic for the organization of a computer architecture?

A. Size

B. Dynamic behaviour

C. Static behaviour

D. Speed

E. None of the answers above is correct

Answer: B. Dynamic behaviour

53. What is usually regarded as the von Neumann Bottleneck?

A. Processor/memory interface

B. Control unit

C. Arithmetic logical unit

D. Instruction set

E. None of the answers above is correct

Answer: A. Processor/memory interface


54. How does the number of transistors per chip increase according to Moore ´s law?

A. Quadratically

B. Linearly

C. Cubicly

D. Exponentially

E. None of the answers above is correct

Answer: D. Exponentially

55. Who is regarded as the founder of Computer Science?

A. Alan Turing

B. Konrad Zuse

C. J. Presper Eckert

D. John William Mauchly

E. None of the answers above is correct

Answer: A. Alan Turing

56. Which is the fastest storage unit in a usual memory hierarchy?

A. Cache

B. Main memory

C. Hard disk

D. Register

E. None of the answers above is correct


Answer: D. Register

57. Which cache miss does not occur in case of a fully associative cache ?

A. Conflict miss

B. Capacity miss

C. Compulsory miss

D. Cold start miss

E. None of the answers above is correct

Answer: A. Conflict miss

58. Which miss even occurs in infinite caches?

A. Coherence miss

B. Capacity miss

C. Conflict miss

D. Cold start miss

E. None of the answers above is correct

Answer: D. Cold start miss

59. What is stored in a Translation Lookaside Buffer?

A. System dumps

B. Physical addresses

C. rogram data

D. Operating system log files

E. None of the answers above is correct


Answer: B. Physical addresses

60. Which value has the speedup of a parallel program that achieves an efficiency of 75% on 32
processors?

A. 18

B. 24

C. 16

D. 20

E. None of the answers above is correct

Answer: B. 24

61. Pipelining strategy is called implement

A. instruction execution

B. instruction prefetch

C. instruction decoding

D. instruction manipulation

Answer: B. instruction prefetch

62. The concept of pipelining is most effective in improving performance if the tasks being performed in
different stages :

A. require different amount of time

B. require about the same amount of time

C. require different amount of time with time difference between any two tasks being same
D. require different amount with time difference between any two tasks being different

Answer: B. require about the same amount of time

63) Which Algorithm is better choice for pipelining?

A. Small Algorithm

B. Hash Algorithm

C. Merge-Sort Algorithm

D. Quick-Sort Algorithm

Answer: C. Merge-Sort Algorithm

64. The expression 'delayed load' is used in context of

A. processor-printer communication

B. memory-monitor communication

C. pipelining

D. none of the above

Answer: C. pipelining

65. Parallel processing may occur

A. in the instruction stream

B. in the data stream

C. both[A] and [B]

D. none of the above


Answer: C. both[A] and [B]

66. The cost of a parallel processing is primarily determined by :

A. Time Complexity

B. Switching Complexity

C. Circuit Complexity

D. None of the above

Answer: C. Circuit Complexity

67. An instruction to provide small delay in program

A. LDA

B. NOP

C. BEA

D. None of the above

Answer: B. NOP

68. Characteristic of RISC (Reduced Instruction Set Computer) instruction set is

A. three instructions per cycle

B. two instructions per cycle

C. one instruction per cycle

D. none of the

Answer: C. one instruction per cycle


69. In daisy-chaining priority method, all the devices that can request an interrupt are connected in

A. parallel

B. serial

C. random

D. none of the above

Answer: B. serial

70. Which one of the following is a characteristic of CISC (Complex Instruction Set Computer)

A. Fixed format instructions

B. Variable format instructions

C. Instructions are executed by hardware

D. None of the above

Answer: B. Variable format instructions

71. During the execution of the instructions, a copy of the instructions is placed in the ______ .

A. Register

B. RAM

C. System heap

D. Cache

Answer: D. Cache
72. Two processors A and B have clock frequencies of 700 Mhz and 900 Mhz respectively. Suppose A can
execute an instruction with an average of 3 steps and B can execute with an average of 5 steps. For the
execution of the same instruction which processor is faster ?

A. A

B. B

C. Both take the same time

D. Insuffient information

Answer: A. A

73. A processor performing fetch or decoding of different instruction during the execution of another
instruction is called ______ .

A. Super-scaling

B. Pipe-lining

C. Parallel Computation

D. None of these

Answer: B. Pipe-lining

74. For a given FINITE number of instructions to be executed, which architecture of the processor
provides for a faster execution ?

A. ISA

B. ANSA

C. Super-scalar

D. All of the above

Answer: C. Super-scalar
75. The clock rate of the processor can be improved by,

A. Improving the IC technology of the logic circuits

B. Reducing the amount of processing done in one step

C. By using overclocking method

D. All of the above

Answer: D. All of the above

76. An optimizing Compiler does,

A. Better compilation of the given piece of code.

B. Takes advantage of the type of processor and reduces its process time.

C. Does better memory managament.

D. Both a and c

Answer: B. Takes advantage of the type of processor and reduces its process time.

77. The ultimate goal of a compiler is to,

A. Reduce the clock cycles for a programming task.

B. Reduce the size of the object code.

C. Be versatile.

D. Be able to detect even the smallest of errors.

Answer: A. Reduce the clock cycles for a programming task.

78. SPEC stands for,


A. Standard Performance Evaluation Code.

B. System Processing Enhancing Code.

C. System Performance Evaluation Corporation.

D. Standard Processing Enhancement Corporation.

Answer: C. System Performance Evaluation Corporation.

79. As of 2000, the reference system to find the performance of a system is _____ .

A. Ultra SPARC 10

B. SUN SPARC

C. SUN II

D. None of these

Answer: A. Ultra SPARC 10

80. When Performing a looping operation, the instruction gets stored in the ______.

A. Registers

B. Cache

C. System Heap

D. System stack

Answer: B. Cache

81. The average number of steps taken to execute the set of instructions can be made to be less than
one by following _______ .
A. ISA

B. Pipe-lining

C. Super-scaling

D. Sequential

Answer: C. Super-scaling

82. If a processor clock is rated as 1250 million cycles per second, then its clock period is ________ .

A. 1.9 * 10 ^ -10 sec

B. 1.6 * 10 ^ -9 sec

C. 1.25 * 10 ^ -10 sec

D. 8 * 10 ^ -10 sec

Answer: D. 8 * 10 ^ -10 sec

83. If the instruction, Add R1,R2,R3 is executed in a system which is pipe-lined, then the value of S
is (Where S is term of the Basic performance equation)

A. 3

B. ~2

C. ~1

D. 6

Answer: C. ~1

84. CISC stands for,

A. Complete Instruction Sequential Compilation


B. Computer Integrated Sequential Compiler

C. Complex Instruction Set Computer

D. Complex Instruction Sequential Compilation

Answer: C. Complex Instruction Set Computer

85. As of 2000, the reference system to find the SPEC rating are built with _____ Processor.

A. Intel Atom SParc 300Mhz

B. Ultra SPARC -IIi 300MHZ

C. Amd Neutrino series

D. ASUS A series 450 Mhz

Answer: B. Ultra SPARC -IIi 300MHZ

86. The CISC stands for

A. Computer Instruction Set Compliment

B. Complete Instruction Set Compliment

C. Computer Indexed Set Components

D. Complex Instruction set computer

Answer: D. Complex Instruction set computer

87. The computer architecture aimed at reducing the time of execution of instructions is ________.

A. CISC

B. RISC

C. ISA
D. ANNA

Answer: B. RISC

88. The Sun micro systems processors usually follow _____ architecture.

A. CISC

B. ISA

C. ULTRA SPARC

D. RISC

Answer: D. RISC

89. The RISC processor has a more complicated design than CISC.

A. True

B. False

Answer: B. False

90. The iconic feature of the RISC machine among the following are

a) Reduced number of addressing modes

b) Increased memory size

c) Having a branch delay slot

d) All of the above

Answer: c) Having a branch delay slot


91. Both the CISC and RISC architectures have been developed to reduce the______.

A. Cost

B. Time delay

C. Semantic gap

D. All of the above

Answer: C. Semantic gap

92. Out of the following which is not a CISC machine.

A. IBM 370/168

B. VAX 11/780

C. Intel 80486

D. Motorola A567

Answer: D. Motorola A567

93. Pipe-lining is a unique feature of _______.

A. RISC

B. CISC

C. ISA

D. IANA

Answer: A. RISC

94. In CISC architecture most of the complex instructions are stored in _____.
A. Register

B. Diodes

C. CMOS

D. Transistors

Answer: D. Transistors

95. Which of the architecture is power efficient?

A. CISC

B. RISC

C. ISA

D. IANA

Answer: B. RISC

96. To which class of systems does the von Neumann computer belong?

A. SIMD (Single Instruction Multiple Data)

B. MIMD (Multiple Instruction Multiple Data)

C. MISD (Multiple Instruction Single Data)

D. SISD (Single Instruction Single Data)

E. None of the answers above is correct.

Answer: D. SISD (Single Instruction Single Data)

97. Parallel programs: Which speedup could be achieved according to Amdahl´s law for infinite number
of processors if 5% of a program is sequential and the remaining part is ideally parallel?
A. Infinite speedup

B. 5

C. 20

D. 50

E. None of the answers above is correct.

Answer: C. 20

98. Itanium processor: Which hazard can be circumvented by register rotation?

A. Control hazards

B. Data hazards

C. Structural hazards

D. None

E. None of the answers above is correct.

Answer: B. Data hazards

99. Which MIMD systems are best scalable with respect to the number of processors?

A. Distributed memory computers

B. ccNUMA systems

C. nccNUMA systems

D. Symmetric multiprocessors

E. None of the answers above is correct

Answer: A. Distributed memory computers

100. Cache coherence: For which shared (virtual) memory systems is the snooping protocol suited?
A. Crossbar connected systems

B. Systems with hypercube network

C. Systems with butterfly network

D. Bus based systems

E. None of the answers above is correct.

Answer: D. Bus based systems

This set of Operating System Multiple Choice Questions & Answers (MCQs) focuses on “Semaphores”.
1. An un-interruptible unit is known as ____________
a) single
b) atomic
c) static
d) none of the mentioned
View Answer

Answer: b
Explanation: None.
2. TestAndSet instruction is executed ____________
a) after a particular process
b) periodically
c) atomically
d) none of the mentioned
View Answer

Answer: c
Explanation: None.
3. Semaphore is a/an _______ to solve the critical section problem.
a) hardware for a system
b) special program for a system
c) integer variable
d) none of the mentioned
View Answer

Answer: c
Explanation: None.
4. What are the two atomic operations permissible on semaphores?
a) wait
b) stop
c) hold
d) none of the mentioned
View Answer

Answer: a
Explanation: None.
5. What are Spinlocks?
a) CPU cycles wasting locks over critical sections of programs
b) Locks that avoid time wastage in context switches
c) Locks that work better on multiprocessor systems
d) All of the mentioned
View Answer

Answer: d
Explanation: None.
advertisement
6. What is the main disadvantage of spinlocks?
a) they are not sufficient for many process
b) they require busy waiting
c) they are unreliable sometimes
d) they are too complex for programmers
View Answer

Answer: b
Explanation: None.
7. The wait operation of the semaphore basically works on the basic _______ system call.
a) stop()
b) block()
c) hold()
d) wait()
View Answer

Answer: b
Explanation: None.
8. The signal operation of the semaphore basically works on the basic _______ system call.
a) continue()
b) wakeup()
c) getup()
d) start()
View Answer

Answer: b
Explanation: None.
9. If the semaphore value is negative ____________
a) its magnitude is the number of processes waiting on that semaphore
b) it is invalid
c) no operation can be further performed on it until the signal operation is performed on it
d) none of the mentioned
View Answer

Answer: a
Explanation: None.
10. The code that changes the value of the semaphore is ____________
a) remainder section code
b) non – critical section code
c) critical section code
d) none of the mentioned
View Answer
Answer: c
Explanation: None.
11. The following program consists of 3 concurrent processes and 3 binary semaphores. The semaphores are
initialized as S0 = 1, S1 = 0, S2 = 0.

Process P0
while(true)
{
wait(S0);
print '0';
release(S1);
release(S2);
}

Process P1
wait(S1);
release(S0);

Process P2
wait(S2);
release(S0);
How many times will P0 print ‘0’?
a) At least twice
b) Exactly twice
c) Exactly thrice
d) Exactly once
View Answer

Answer: a
Explanation: None.
12. Each process Pi, i = 0,1,2,3,……,9 is coded as follows.

repeat
P(mutex)
{Critical Section}
V(mutex)
forever
The code for P10 is identical except that it uses V(mutex) instead of P(mutex). What is the largest number of
processes that can be inside the critical section at any moment (the mutex being initialized to 1)?
a) 1
b) 2
c) 3
d) None of the mentioned
View Answer

Answer: c
Explanation: Any one of the 9 processes can get into critical section after executing P(mutex) which decrements
the mutex value to 0. At this time P10 can enter critical section by incrementing the value to 1. Now any of the 9
processes can enter the critical section by again decrementing the mutex value to 0. None of the remaining
processes can get into their critical sections.
13. Two processes, P1 and P2, need to access a critical section of code. Consider the following synchronization
construct used by the processes.
Process P1 :
while(true)
{
w1 = true;
while(w2 == true);
Critical section
w1 = false;
}
Remainder Section

Process P2 :
while(true)
{
w2 = true;
while(w1 == true);
Critical section
w2 = false;
}
Remainder Section
Here, w1 and w2 have shared variables, which are initialized to false. Which one of the following statements is
TRUE about the above construct?
a) It does not ensure mutual exclusion
b) It does not ensure bounded waiting
c) It requires that processes enter the critical section in strict alternation
d) It does not prevent deadlocks but ensures mutual exclusion
View Answer

Answer: d
Explanation: None.
1. What will happen if a non-recursive mutex is locked more than once?
a) Starvation
b) Deadlock
c) Aging
d) Signaling
View Answer

Answer: b
Explanation: If a thread which had already locked a mutex, tries to lock the mutex again, it will enter into the
waiting list of that mutex, which results in a deadlock. It is because no other thread can unlock the mutex.
2. What is a semaphore?
a) is a binary mutex
b) must be accessed from only one process
c) can be accessed from multiple processes
d) none of the mentioned
View Answer

Answer: c
Explanation: None.
3. What are the two kinds of semaphores?
a) mutex & counting
b) binary & counting
c) counting & decimal
d) decimal & binary
View Answer

Answer: b
Explanation: None.
4. What is a mutex?
a) is a binary mutex
b) must be accessed from only one process
c) can be accessed from multiple processes
d) none of the mentioned
View Answer

Answer: b
Explanation: None.
5. At a particular time of computation the value of a counting semaphore is 7.Then 20 P operations and 15 V
operations were completed on this semaphore. The resulting value of the semaphore is? (GATE 1987)
a) 42
b) 2
c) 7
d) 12
View Answer

Answer: b
Explanation: P represents Wait and V represents Signal. P operation will decrease the value by 1 every time and V
operation will increase the value by 1 every time.
advertisement
6. A binary semaphore is a semaphore with integer values ____________
a) 1
b) -1
c) 0.8
d) 0.5
View Answer

Answer: a
Explanation: None.
7. The following pair of processes share a common variable X.

Process A
int Y;
A1: Y = X*2;
A2: X = Y;

Process B
int Z;
B1: Z = X+1;
B2: X = Z;
X is set to 5 before either process begins execution. As usual, statements within a process are executed
sequentially, but statements in process A may execute in any order with respect to statements in process B.
How many different values of X are possible after both processes finish executing?
a) two
b) three
c) four
d) eight
View Answer
Answer: c
Explanation: Here are the possible ways in which statements from A and B can be interleaved.
A1 A2 B1 B2: X = 11
A1 B1 A2 B2: X = 6
A1 B1 B2 A2: X = 10
B1 A1 B2 A2: X = 10
B1 A1 A2 B2: X = 6
B1 B2 A1 A2: X = 12.
8. The program follows to use a shared binary semaphore T.

Process A
int Y;
A1: Y = X*2;
A2: X = Y;
signal(T);

Process B
int Z;
B1: wait(T);
B2: Z = X+1;
X = Z;
T is set to 0 before either process begins execution and, as before, X is set to 5.
Now, how many different values of X are possible after both processes finish executing?
a) one
b) two
c) three
d) four
View Answer

Answer: a
Explanation: The semaphore T ensures that all the statements from A finish execution before B begins. So now
there is only one way in which statements from A and B can be interleaved:
A1 A2 B1 B2: X = 11.
9. Semaphores are mostly used to implement ____________
a) System calls
b) IPC mechanisms
c) System protection
d) None of the mentioned
View Answer

Answer: b
Explanation: None.
10. Spinlocks are intended to provide __________ only.
a) Mutual Exclusion
b) Bounded Waiting
c) Aging
d) Progress
View Answer

Answer: b
Explanation: None.
1: Computer system of a parallel computer is capable of
A. Decentralized computing
B. Parallel computing
C. Centralized computing
D. Decentralized computing
E. Distributed computing
F. All of these
G. None of these

Answer - Click Here:


A
2: Writing parallel programs is referred to as
A. Parallel computation
B. Parallel processes
C. Parallel development
D. Parallel programming
E. Parallel computation
F. All of these
G. None of these

Answer - Click Here:


D
3: Simplifies application’s of three-tier architecture is ____________.
A. Maintenance
B. Initiation
C.Implementation
D. Deployment
E. All of these
F. None of these

Answer - Click Here:


D
4: Dynamic networks of networks, is a dynamic connection that grows  is  called
A. Multithreading
B. Cyber cycle
C. Internet of things
D. Cyber-physical system
E. All of these
F. None of these

Answer - Click Here:


C
5: In which application system Distributed systems can run well?
A. HPC
D. HTC
C. HRC
D. Both A and B
E. All of these
F. None of these

Answer - Click Here:


D
6: In which systems desire  HPC and HTC.
A. Adaptivity
B. Transparency
C. Dependency
D. Secretive
E. Adaptivity
F. All of these
G. None of these

Answer - Click Here:


B
 
7: No special machines manage the network of  architecture in which resources are known as
A. Peer-to-Peer
B. Space based
C. Tightly coupled
D. Loosely coupled
E. All of these
F. None of these

Answer - Click Here:


A
8: Significant characteristics  of Distributed systems have of
A. 5 types
B. 2 types
C. 3 types
D. 4 types
E. All of these
F. None of these

Answer - Click Here:


C
 9: Built of  Peer machines are over
A. Many Server machines
B. 1 Server machine
C. 1 Client machine
D. Many Client machines
E. All of these
F. None of these

Answer - Click Here:


D
10: Type HTC applications are
A. Business
B. Engineering
C. Science
D. Media mass
E. All of these
F. None of these

Answer - Click Here:


A
11: Virtualization that creates one single address space architecture that of, is called
A. Loosely coupled
B. Peer-to-Peer
C. Space-based
D. Tightly coupled
E. Loosely coupled
F. All of these
G. None of these

Answer - Click Here:


C
12: We have an internet cloud of resources In cloud computing to form
A. Centralized computing
B. Decentralized computing
C. Parallel computing
D. Both A and B
E. All of these
F. None of these

Answer - Click Here:


E
13: Data access and storage are elements of  Job throughput, of __________.
A. Flexibility
B. Adaptation
C. Efficiency
D. Dependability
E. All of these
F. None of these

Answer - Click Here:


C
14: Billions of job requests is over massive data sets, ability to support known as
A. Efficiency
B. Dependability
C. Adaptation
D. Flexibility
E. All of these
F. None of these

Answer - Click Here:


C
15: Broader concept offers Cloud computing .to select which of the following.
A. Parallel computing
B. Centralized computing
C. Utility computing
D. Decentralized computing
E. Parallel computing
F. All of these
G. None of these

Answer - Click Here:


C
16: Resources and clients transparency that allows movement within a system is called
A.Mobility transparency
B. Concurrency transparency
C. Performance transparency
D. Replication transparency
E. All of these
F. None of these

Answer - Click Here:


A
 17: Distributed program in a distributed computer running a is known as
A. Distributed process
B. Distributed program
C. Distributed application
D. Distributed computing
E. All of these
F. None of these

Answer - Click Here:


B
18: Uniprocessor computing devices  is called__________.
A. Grid computing
B. Centralized computing
C. Parallel computing
D. Distributed computing
E. All of these
F. None of these

Answer - Click Here:


B
19: Utility computing focuses on a______________ model.
A. Data
B. Cloud
C. Scalable
D. Business
E. All of these
F. None of these

Answer - Click Here:


D
20: what is a CPS merges technologies
A. 5C
B. 2C
C. 3C
D. 4C
E. All of these
F. None of these

Answer - Click Here:


C
21: Aberavationn of HPC
A. High-peak computing
B. High-peripheral computing
C. High-performance computing
D. Highly-parallel computing
E. All of these
F. None of these

Answer - Click Here:


C
 
22: Peer-to-Peer leads to the development of  technologies like
A. Norming grids
B. Data grids
C. Computational grids
D. Both A and B
E. All of these
F. None of these

Answer - Click Here:


D
23: Type of HPC applications of.
A. Management
B. Media mass
C. Business
D. Science
E. All of these
F.None of these

Answer - Click Here:


D
24:  The development generations of  Computer technology has gone through
A. 6
B. 3
C. 4
D. 5
E. All of these
F. None of these

Answer - Click Here:


D
 
25: Utilization rate of resources in an execution model is known to be its
A. Adaptation
B. Efficiency
C. Dependability
D. Flexibility
E. All of these
F. None of these

Answer - Click Here:


B
 26: Even under failure conditions Providing Quality of Service (QoS) assurance is the
responsibility of
A. Dependability
B. Adaptation
C. Flexibility
D. Efficiency
E. All of these
F. None of these

Answer - Click Here:


A
27: Interprocessor communication that takes place
A. Centralized memory
B. Shared memory
C. Message passing
D. Both A and B
E. All of these
F. None of these

Answer - Click Here:


D
 
28: Data centers and centralized computing covers many and
A. Microcomputers
B. Minicomputers
C. Mainframe computers
D. Supercomputers
E. All of these
F. None of these

Answer - Click Here:


D
29: Which of the following is an primary goal of HTC paradigm___________.
A. High ratio Identification
B. Low-flux computing
C. High-flux computing
D. Computer utilities
E. All of these
F. None of these

Answer - Click Here:


C
30: The  high-throughput service provided is measures taken by
A. Flexibility
B. Efficiency
D. Adaptation
E. Dependability
F. All of these
G. None of these

Answer - Click Here:


D

You might also like