Question: Side panel MAKE - UP CAT Time left 0 : 1 3 : 3 2 Question 1 Not yet answered Marked out of 1 .

Side panel
MAKE-UP CAT
Time left 0:13:32
Question 1
Not yet answered
Marked out of 1.00
Flag question
Question text
405. For proper synchronization in distributed systems ____________
Question 1Answer
a.
prevention from the deadlock & starvation is must
b.
none of the mentioned
c.
prevention from the starvation is must
d.
prevention from the deadlock is must
Question 2
Not yet answered
Marked out of 1.00
Flag question
Question text
409. In distributed systems, election algorithms assumes that ____________
Question 2Answer
a.
priority of the processes is not required
b.
there is no priority number associated with any process
c.
none of the mentioned
d.
a unique priority number is associated with each active process in system
Question 3
Not yet answered
Marked out of 1.00
Flag question
Question text
2001.Resources and clients transparency that allows movement within a system is called____________________
Question 3Answer
a.
Mobility transparency
b.
Performance transparency
c.
Concurrency transparency
d.
Replication transparency
Question 4
Not yet answered
Marked out of 1.00
Flag question
Question text
402. If timestamps of two events are same, then the events are ____________
Question 4Answer
a.
non-concurrent
b.
non-monotonic
c.
concurrent
d.
monotonic
Question 5
Not yet answered
Marked out of 1.00
Flag question
Question text
13. Domain Name System (DNS) resolvers use Paxos and invalidation messages to maintain the consistency of cached records
Question 5Answer
a.
FALSE
b.
TRUE
Question 6
Not yet answered
Marked out of 1.00
Flag question
Question text
401. In distributed systems, a logical clock is associated with ______________
Question 6Answer
a.
each instruction
b.
none of the mentioned
c.
each register
d.
each process
Question 7
Not yet answered
Marked out of 1.00
Flag question
Question text
2006.What is the characteristics of atomicity ?
Question 7Answer
a.
When responses are received from all processes, then process can enter its Critical Section
b.
All operations associated are executed to completion or none are performed
c.
Use communication links
d.
One processor as coordinator which handles all requests
Question 8
Not yet answered
Marked out of 1.00
Flag question
Question text
1. Which of the following promotes interoperability between cells?
Question 8Answer
a.
Interface
b.
GDA
c.
CDS
d.
GDS
Question 9
Not yet answered
Marked out of 1.00
Flag question
Question text
311. Which of the following are forms of malicious attack?
Question 9Answer
a.
Wiping of information
b.
Modification of data
c.
All of the mentioned
d.
Theft of information
Question 10
Not yet answered
Marked out of 1.00
Flag question
Question text
2003.If one site fails in distributed system, ___________
Question 10Answer
a.
none of the mentioned
b.
all the sites will stop working
c.
directly connected sites will stop working
d.
the remaining sites can continue operating
Question 11
Not yet answered
Marked out of 1.00
Flag question
Question text
406. In the token passing approach of distributed systems, processes are organized in a ring structure ____________
Question 11Answer
a.
both logically and physically
b.
logically
c.
none of the mentioned
d.
physically
Question 12
Not yet answered
Marked out of 1.00
Flag question
Question text
2005.What are characteristic of Network Operating Systems ?
Question 12Answer
a.
All of the mentioned
b.
They are simple to use
c.
Users are aware of multiplicity of machines
d.
They are transparent
Question 13
Not yet answered
Marked out of 1.00
Flag question
Question text
2011.What are characteristics of Distributed Operating system ?
Question 13Answer
a.
It is a collection of processor
b.
They do not share memory
c.
All processors are synchronized
d.
None of the mentioned
Question 14
Not yet answered
Marked out of 1.00
Flag question
Question text
314. Which of the following is the least secure method of authentication?
Question 14Answer
a.
fingerprint
b.
Password
c.
retina pattern
d.
Key card
Question 15
Not yet answered
Marked out of 1.00
Flag question
Question text
100. What are non characteristics of session semantics?
Question 15Answer
a.
Each client obtains a working copy from the server
b.
When file is closed, the modified file is copied to the file server
c.
Easy to implement in a single processor system
d.
The burden of coordinating file sharing is ignored by the system

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!