Question: Side panel MAKE - UP CAT Time left 0 : 1 3 : 3 2 Question 1 Not yet answered Marked out of 1 .
Side panel
MAKEUP CAT
Time left ::
Question
Not yet answered
Marked out of
Flag question
Question text
For proper synchronization in distributed systems
Question Answer
a
prevention from the deadlock & starvation is must
b
none of the mentioned
c
prevention from the starvation is must
d
prevention from the deadlock is must
Question
Not yet answered
Marked out of
Flag question
Question text
In distributed systems, election algorithms assumes that
Question Answer
a
priority of the processes is not required
b
there is no priority number associated with any process
c
none of the mentioned
d
a unique priority number is associated with each active process in system
Question
Not yet answered
Marked out of
Flag question
Question text
Resources and clients transparency that allows movement within a system is called
Question Answer
a
Mobility transparency
b
Performance transparency
c
Concurrency transparency
d
Replication transparency
Question
Not yet answered
Marked out of
Flag question
Question text
If timestamps of two events are same, then the events are
Question Answer
a
nonconcurrent
b
nonmonotonic
c
concurrent
d
monotonic
Question
Not yet answered
Marked out of
Flag question
Question text
Domain Name System DNS resolvers use Paxos and invalidation messages to maintain the consistency of cached records
Question Answer
a
FALSE
b
TRUE
Question
Not yet answered
Marked out of
Flag question
Question text
In distributed systems, a logical clock is associated with
Question Answer
a
each instruction
b
none of the mentioned
c
each register
d
each process
Question
Not yet answered
Marked out of
Flag question
Question text
What is the characteristics of atomicity
Question Answer
a
When responses are received from all processes, then process can enter its Critical Section
b
All operations associated are executed to completion or none are performed
c
Use communication links
d
One processor as coordinator which handles all requests
Question
Not yet answered
Marked out of
Flag question
Question text
Which of the following promotes interoperability between cells?
Question Answer
a
Interface
b
GDA
c
CDS
d
GDS
Question
Not yet answered
Marked out of
Flag question
Question text
Which of the following are forms of malicious attack?
Question Answer
a
Wiping of information
b
Modification of data
c
All of the mentioned
d
Theft of information
Question
Not yet answered
Marked out of
Flag question
Question text
If one site fails in distributed system,
Question Answer
a
none of the mentioned
b
all the sites will stop working
c
directly connected sites will stop working
d
the remaining sites can continue operating
Question
Not yet answered
Marked out of
Flag question
Question text
In the token passing approach of distributed systems, processes are organized in a ring structure
Question Answer
a
both logically and physically
b
logically
c
none of the mentioned
d
physically
Question
Not yet answered
Marked out of
Flag question
Question text
What are characteristic of Network Operating Systems
Question Answer
a
All of the mentioned
b
They are simple to use
c
Users are aware of multiplicity of machines
d
They are transparent
Question
Not yet answered
Marked out of
Flag question
Question text
What are characteristics of Distributed Operating system
Question Answer
a
It is a collection of processor
b
They do not share memory
c
All processors are synchronized
d
None of the mentioned
Question
Not yet answered
Marked out of
Flag question
Question text
Which of the following is the least secure method of authentication?
Question Answer
a
fingerprint
b
Password
c
retina pattern
d
Key card
Question
Not yet answered
Marked out of
Flag question
Question text
What are non characteristics of session semantics?
Question Answer
a
Each client obtains a working copy from the server
b
When file is closed, the modified file is copied to the file server
c
Easy to implement in a single processor system
d
The burden of coordinating file sharing is ignored by the system
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
