Professional Documents
Culture Documents
Semester: 8 Sem Subject: DOS Quiz Bank
Semester: 8 Sem Subject: DOS Quiz Bank
Quiz Bank
30. ______ of the distributed file (A) Clients(B) Servers(C) (D) All of the
system are dispersed among Storage devices(D) All of the mentioned
various machines of mentioned
distributed system.
31. _______ is not possible in (A) File replication (B) Migration
distributed file system (B) Migration
(C) Client interface
(D) Remote access
32. In distributed file system, a (A) host name (C) the combination
file is uniquely identified by (B) local name of host name and
_________________ (C) the combination of host local name
name and local name
(D) none of the mentioned
33. In distributed file system, file (A) local name (B) physical storage
name does not reveal the (B) physical storage location location
file’s ____________ (C) both local name and
physical storage location
(D) none of the mentioned
34. Which one of the following is (A) andrew file system (D) all of the
a distributed file system? (B) network file system mentioned
(C) novel network
(D) all of the mentioned
35. What is the advantage of (A) Reduced network traffic (A) Reduced
caching in remote file access by retaining recently accessed network traffic by
? disk blocks retaining recently
(B) Faster network access accessed disk
(C) Copies of data creates blocks
backup automatically
(D) None of the mentioned
36. The file once created cannot (A) Immutable file (A) Immutable file
be changed is called (B) Mutex file
(C) Mutable file
(D) None of the mentioned
37. What are the characteristics (A) Suitable for applications (B) The users of
of transaction semantics ? that are concerned about this model are
coherence of data interested in the
(B) The users of this model atomicity property
are interested in the atomicity for their transaction
property for their transaction
(C) Easy to implement in a
single processor system
(D) Write-back enhances
access performance
38. In the case of____________ , (A) session semantics (A) session
changes to an open file are (B) immutable files semantics
only locally visible. (C) atomic transactions
(D) None of the mentioned
39. The meaning of INVALID (A) Memory is incorrect; no (C) This cache
state means____ other cache holds the block. block does not
(B) Memory is up-to-date; the contain valid data
block may be in other caches
(C) This cache block does not
contain valid data
(D) all of the mentioned
40. The Coda distributed file (A) Tokens for file locking. (A) Tokens for file
system does not support: (B) Disconnected clients. locking.
(C) Replicated servers.
(D) Session semantics.
41. IP multicast uses (A) Unreliable multicast. (A) Unreliable
(B) Reliable multicast. multicast.
(C) Atomic multicast.
(D) User-selectable
reliability.
42. False sharing in a distributed (A) Unrelated data is shared (A) Unrelated data
shared memory system arises between multiple systems but is shared between
because resides on the same memory multiple systems
page. but resides on the
(B) One distribute memory same memory page.
page is mapped onto two or
more systems at the same
time.
(C) Two or more distributed
memory pages are mapped
onto the same system.
(D) Bad message ordering
makes it appear that data is
shared when, in reality, it is
not.
43. A distributed directory in a (A) Ensures cache coherence (D) Distributes the
distributed shared memory in a sequentially coherent load of looking up
system memory system. page owners.
(B) Allows concurrent
queries and updates to a
memory page.
(C) Is necessary for systems
that employ caching.
(D) Distributes the load of
looking up page owners.
44. The ring election algorithm (A) Having all nodes in a ring (D) Building a list
works by of processors send a message of all live nodes and
to a coordinator who will choosing the largest
elect the leader. first one on the
(B) Sending a token around a resultant list.
set of nodes. Whoever has the
token is the coordinator.
(C) Sending a message
around all available nodes
and choosing the first one on
the resultant list.
(D) Building a list of all live
nodes and choosing the
largest first one on the
resultant list.
45. Which offers the most fault- (A) Atomic multicast. (A) Atomic
tolerant message delivery? (B) Totally ordered reliable multicast.
multicast.
(C) Causally ordered reliable
multicast.
(D) Hardware multicast.
46. False sharing in a DSM (A) an unwanted page being (B) unrelated data
system refers to cached on another system being resident on
(B) unrelated data being the same page.
resident on the same page.
(C) invalid data in the
directory, leading the system
to falsely believe the page is
shared.
(D) two versions of the same
page being present on one
system
47. _________ is a DSM system (A) RPC (C) Munin
that is fundamentally based (B) IPC
on software objects, but (C) Munin
which can place each object (D) None of the mentioned
on a separate page so the
hardware MMU can be used
for detecting accesses to
shard objects
48. The straight-forward model (A) Random consistency (C) Sequential
used for the memory (B) Remote node consistency
consistency is called (C) Sequential consistency
_____________ (D) None of the mentioned
49. Implementation of the (A) Strict consistency (A) Strict
________ model for a DSM (B) Causal consistency consistency
system is practically (C) Sequential consistency
impossible. (D) None of the mentioned
50. Remote Procedure Calls are (A) For communication (C) For
used ____________ between two processes communication
remotely different from each between two
other on the same system processes on
(B) For communication separate systems
between two processes on the
same system
(C) For communication
between two processes on
separate systems
(D) None of the mentioned
Sample Question for Distributed Opearting system
Sr. Question Option 1 Option 2 Option 3 Option 4 Answer
No.
if the same source code can be
Execution Execution
compiled and executed properly on any Protocol level Binary level
1 level None level
computer in the distributed system compatibility compatibility
compatibility compatibility
called
_______Occurs when a server crashes or
2 Omission Timing Crash Response Crash
any other hardware related
______may be occur due to deadlocks,
Secondary Communicati
timeouts, protection violation, wrong Process Process
3 System failure storage on medium
input from user or consistency failure failure
failure failure
violation.
______Occurs when a server does not
4 Omission Timing Crash Response Omission
receive incoming requests from
______usually caused by the failure of Secondary Communicati Communicati
Process
5 switching nodes or links of System failure storage on medium on medium
failure
communicating system failure failure failure
Secondary Communicati Secondary
_____caused by parity error, head crash, Process
6 System failure storage on medium storage
or dust particles on medium failure
failure failure failure
_____Occurs when a server fails to
7 Omission Timing Crash Response Timing
respond with in a particular
_____Occurs when a server sends any
8 Omission Timing Arbitrary Response Arbitrary
arbitrary message.
_____Occurs when a server sends
9 Omission Timing Crash Response Response
incorrect message in response to
A ______ occurs when a set of processes
are waiting for the lock of some
10 livelock failure crash
resources held by other processes in the
same set. deadlock deadlock
A _______is an anomalous physical
11 fault Recovery Backup None fault
condition.
A cut is graphical representation of
12 _______ in history of distributed logical state global state graph Local state global state
computation
A distributed operating system appears
to its user as centralised operating
13 independent similar Dependent none independent
system for single machine, but it run on
multiple ________ computer
The number of messages required per Message Synchronizati Time Response Message
71
CS execution by a site is. complexity on delay complexity time complexity
The overhead to restore a process or
72 system state to a prior state can be quite Low Moderate high None high
_____
The problem of mutual exclusion arise
in distributed system whenever several
73 several site Single site Process several site
concurrent access to shared resource by Process
_________is involved
The process of deciding what privileges
Authenticatio
74 an entity has and providing only these Authorization Security None of above Authorization
n
privileges.
The processes cannot record their local
75 states at precisely the same instant vector Local clock common clock process common clock
unless they have access to a
The rate at which the system executes Message Synchronizati System Response System
76
requests for the Critical section complexity on delay throughput time throughput
file name file name file host name file local name file name
97 need to be need not be need not be need not be need not be
In a distributed file system, when a file's
changed changed changed changed changed
physical storage location changes .....
physical physical
98 In distributed file system, file name local name storage both none storage
does not reveal the file's ..... location location
In a distributed file system, ..... is
client
99 mapping between logical and physical naming migration hetrogeneity naming
interface
objects.
Which one of the following hides the transparent hidden escape spy transparent
100 location where in the network the file is distributed distributed distributed distributed distributed
stored? file system file system file system file system file system
There is no need to establish and
stateless file stateful file stateless file
101 terminate a connection through open both none
service service service
and close operation in .....
_________ is not possible in distributed file client
102 migration remote access migration
file system. replication interface
The file once created can not be immutable immutable
103 mutex file mutable file none
changed is called ..... file file
..... of the distributed file system are
client STORAGE ALL THE ALL THE
104 dispersed among various machines of SERVER
interface DEVICE ABOVE ABOVE
distributed system.
Which one of the following is a ALL THE ALL THE
105 ANDREW NETWORK NOVEL
distributed file system? ABOVE ABOVE
c) indexed
106 What are the different ways file sequential b) direct sequential d) all of the d) all of the
accesses take place? access access access mentioned mentioned
What are the different ways mounting a) boot b) auto c) explicit d) all of the d) all of the
107
of the file system? mounting mounting mounting mentioned mentioned
a) Reduced a) Reduced
network network
c) Copies of
traffic by b) Faster traffic by
What is the advantage of caching in data creates d) None of the
108 retaining network retaining
remote file access backup mentioned
recently access recently
automatically
accessed disk accessed disk
blocks blocks
prevention prevention prevention none of the prevention
from the from the from the mentioned from the
109 deadlock is starvation is deadlock & deadlock &
For proper synchronization in must must starvation is starvation is
distributed systems must must
In the token passing approach of
110 distributed systems, processes are
organized in a ring structure logically physical both none logically
breaks the coordinates
transaction the
111 starts the into number termination of
n distributed systems, transaction execution of of sub the all of the all of the
coordinator transaction transactions transaction mentioned mentioned
a unique a unique
priority there is no priority
number is priority number is
113
associated number associated
with each associated priority of the with each
In distributed systems, election active process with any processes is none of the active process
algorithms assumes that in system process not required mentioned in system
---------------------------------------------------------------------------------------------------------
Answer:-d
Show which one is not a task transfer category.
a) Preemptive task transfer
23. b) Non-preemptive task transfer
c) Load discharge task transfer
d) None of above
Answer:-c
Show a task transfer technique in which partially executed task is transferred.
a) Preemptive task transfer
24. b) Non-preemptive task transfer
c) Load discharge task transfer
d) None of above
Answer:-a
Show which one is a component of distributed scheduling algorithms.
a) Transfer policy
25. b) Selection policy
c) Location policy
d) All of above.
Answer:-d
Show which one is not a component of distributed scheduling algorithms.
a) Information policy
26. b) Randomization policy
c) Location policy
d) Selection policy
Answer:-b
Show which one is a load distributing algorithm.
a) Sender Initiated
27. b) Receiver initiated
c) Symmetric
d) All of above
Answer:-d
What a system is called when it cannot meet its promises.
a) Crashed system
28. b) Faulty system
c) Damage system
d) Failed system
Answer:-d
Which one is not a type of fault?
a) Transient
29. b) Intermittent
c) Permanent
d) None of above
Answer:-d
Which one is a type of failure?
a) Crash
30. b) Omission
c) Timing
d) All of above
Answer:-d
Which one is not a type of failure masking by redundancy?
31.
a) Place redundancy
b) Information redundancy
c) Time Redundancy
d) Physical Redundancy
Answer:-a
What are the important steps followed when recovery from failure happens?
a) Post repairing integration with main system should happen smoothly and
gracefully
32. b) Upon link failure both parties at end must not be notified
c) Fault recovery system must me adjusted
d) Failures are logged systematically
Answer:-a
What are different ways in which distributed system may suffer?
a) Link failure
33. b) Site failure
c) Loss of message
d) All of above
Answer:-d
What are the things transaction coordinator is responsible for?
a) Starting the execution of the transaction
34. b) Breaking transaction into no of sub transaction
c) Coordinating the termination of the transaction
d) All of above
Answer:-d
What is the disadvantage of majority protocol?
a) Complicated implementation
35. b) Deadlock cannot occur easily
c) Bottleneck
d) All of above
Answer:-a
What detects link and site failure in distributed system?
a) Polling
36. b) Handshaking
c) Token passing
d) None of above
Answer:-b
Which one is not an error recovery technique?
a) Backward
37. b) Downward
c) Forward
d) None of above
Answer:-b
Which one is a technique of recovering from system failure?
a) Amnesia
38. b) Pause
c) Halting
d) All of above
Answer:-d
Which one is a type of failure?
39. a) Communication failure
b) Secondary storage failure
c) Process failure
d) All of above
Answer:-d
What is an anomalous physical condition in a system called?
a) Failure
40. b) Error
c) Damage
d) Fault
Answer:-d