You are on page 1of 5

1) What are the goals of distributed file system?

a) Network transparency
b) Fault tolerance
c) High availability
d) All of the above
Answer: d

2) A file that provides a mapping from text name to internal file identifier is called?
a) File system
b) Access control list
c) Directory
d) Device module
Answer: c

3) In which transparency declined should not know the number of location of file server and
storage devices?
a) Structure transparency
b) Access transparency
c) Naming transparency
d) Replication transparency
Answer: a
4) Select the given features of a good distributed file system ?

a) High user mobility


b) Scalability
c) Low reliability
d) Security
i) (a)(c)
ii) (a)(b)
iii) (a)(b)(d)
iv) (b)
Answer: (iii)

5) The interface that defines the procedure between an individual file and file system type is called
as ?
a) NFS server
b) RPS server
c) Virtual node
d) Virtual file system
Answer: c

6) The components of file services are?


a) Client module
b) Server module
c) Flat file service
d) Directory service
i) a,b
ii) a,c,d
iii) b,c
iv) a,d
Answer: ii

7) The file which is divided into blocks of a pre-determined size by the system is called as
a) NFS
b) RPEC
c) DFS
d) HDFS
Answer: d

8) The highly available server that manages the file system name space and controls access to file
by client is
a) Data node
b) Check point node
c) Name node
d) Slave node
Answer: c

9) The HDFS does these operations


a) Maximum data reliability
b) Less availability
c) Maximising the write cost
d) Aggregate real bandwidth
i) b,c
ii) a,c,d
iii) a,d
iv) b,c,d
Answer: iii

10) The basic goals of naming system include


a) Location transparency
b) Meaningless names
c) Fault tolerance
d) Individual naming
i) A,b,c
ii) B,c,d
iii) C,d
iv) A,c
Answer: iv
11) The issues faced in name services are
a) Name spaces
b) Availability of names
c) Name revaluation
d) Domain name system
i) A,c,d
ii) C,d
iii) A,d
iv) B,d
Answer: iii

12) In ___________ a name is assigned to an address and are convenient and short
a) Flat name spaces
b) Hierarchical names
c) Domain name
d) Labels
Answer: a

13) If a server divide its domain into sub domain and delegates part of its authority to other server
then?
a) Domain and zone are different
b) Domain and zone are same
Answer: a

14) The yellow page service is an example of


a) Name service
b) Server service
c) Directory services
d) File services
Answer: c

15) The GNS has two parts


a) <directory name, value name>
b) <value name, flat file name>
c) <flat file name, value name>
d) Directory name, flat file name>
Answer: a

16) The basic uses of LDAP are


a) Have to manage separate directories for each application
b) Logged into a particular server
c) Allow users to find data that they need
d) Centrally managed users, groups and other data
i) A,b
ii) A,c,d
iii) C,d
iv) B,c
Answer: iii

17) Who has more powerful search capabilities to make retrieving information easier
a) LDAP
b) X.500
c) ASN.1
d) TCP
Answer: b
18) The algorithm used for traffic shaping is
a) Earliest deadline first algorithm
b) Leakage bucket algorithm
c) Ticket bucket algorithm
d) Leaky bucket algorithm
Answer: d

19) Resource management should look into


a) Increasing performance
b) Availability of sufficient resources
c) On time scheduling
d) All of the above
Answer: d

20) In ___________ algorithm the priority of a task can change during its execution
a) Leaky bucket algorithm
b) Ticket bucket algorithm
c) Earliest deadline first algorithm
d) Round robin scheduling algorithm
Answer: c

21) In ____________ algorithm the process of lowest period will get highest priority
a) Earliest deadline first algorithm
b) Round robin scheduling algorithm
c) Token bucket algorithm
d) Leaky bucket algorithm
Answer: b

22) Stream adaptation in DFS have the following factors


a) Scaling
b) Performance
c) Scheduling
d) All of the above
Answer: a

23) Meta files in bit torrent contains


a) File length
b) File name
c) URL of a tracker
d) All of the above
Answer: d

24) Online pairs with the complete file who upload for free is defined as
a) Swarm
b) Seeders
c) Leachers
d) Chunks
Answers: b
25) Which type of multi cast does not require core router support?
a) Single multi cast
b) IP multi cast
c) End system multi cast
d) One to more multi cast
Answer: c

You might also like