Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 228 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

51.

Absolute time synchronization can beachieved using

A. vector time stamping method
B. christian’s method
C. lamport’s method
D. ricart-agrawala algorithm
Answer» C. lamport’s method
52.

is a process that prevents multiple threads or processes from accessing sharedresources at the same time.

A. critical section
B. deadlock
C. message passing
D. mutual exclusion
Answer» E.
53.

all related objects moved and left to a server upon the first RPC

A. call by value
B. call by move
C. call by visit
D. call by reference
Answer» C. call by visit
54.

If processes p and q both receive messages m and m', then p receives m before m' if and only if q receives m before m'.The order delivery iscalled

A. absolute ordering
B. consistent ordering
C. causal ordering
D. fifo ordering
Answer» C. causal ordering
55.

Which address is used to identify a processon a host by the transport layer?

A. physical address
B. logical address
C. port address
D. specific address
Answer» D. specific address
56.

Which of the followingallocates/deallocates buffers

A. rrl
B. stub/skeleton layer
C. transport layer
D. networking layer
Answer» B. stub/skeleton layer
57.

Message passing provides a mechanism to allow processes to communicate and to synchronize theiractions

A. by sharing the same address space
B. without sharing the same address space
C. by sharing the same process number and process identifier
D. by sharing port number
Answer» B. without sharing the same address space
58.

is an object acting as agateway for the client side.

A. skeleton
B. stub
C. remote
D. server
Answer» C. remote
59.

An architecture where clients first communicate the server for data then format and display it to the users, isknown as

A. client/server architecture
B. three-tier architecture
C. two-tier architecture
D. peer-to-peer architecture
Answer» B. three-tier architecture
60.

provides programmers a familiar programming model by extending the local procedure call to a distributedenvironment

A. distributed environment
B. permanent procedure call
C. process and file
D. remote procedure call
Answer» E.
61.

Machine that places the request to access the data is generally called as.

A. server machine
B. client machine
C. request machine
D. database server
Answer» C. request machine
62.

The local operating system on the server machine passes the incomingpackets to the

A. server stub
B. client stub
C. client operating system
D. binding agent
Answer» B. client stub
63.

Transient communication doneby layer

A. network
B. transport
C. physical
D. session
Answer» C. physical
64.

What are the exceptions which have to be handled in a RMI clientprogram?

A. malformedurlexception
B. notfoundexception
C. arithmeticexception
D. class•not•found•excepti on
Answer» B. notfoundexception
65.

In RMI, the objects are passed by.

A. value
B. reference
C. value and reference
D. object
Answer» B. reference
66.

Internet provides                for remotelogin.

A. telnet
B. http
C. ftp
D. rpc
Answer» B. http
67.

Distributed pervasive system is alsoknown as

A. ubiquitous computing
B. user interface design
C. graphical user interface
D. peer to peer system
Answer» B. user interface design
68.

A “glue” between client and server parts ofapplication

A. middleware
B. firmware
C. package
D. system software
Answer» B. firmware
69.

A distributed system is defined as a collection of autonomous computers linked by a network with software designed to produce an integratedcomputing facility.

A. true
B. false
Answer» B. false
70.

In distributed systems, what will the transaction coordinator do?

A. starts the execution of transaction
B. breaks the transaction into number of sub transactions
C. coordinates the termination of the transaction
D. all of the mentioned
Answer» E.
71.

What are the advantages of token(with rings) passing approach?i) One processor as coordinator which handles all requestsii) No starvation if the ring is unidirectionaliii) There are many messages passed per section entered if few users want to get in sectioniv) One processor as coordinator which handles all requestsv) Only one message/entry if everyone wants to get in

A. i
B. ii and iii
C. i, ii and iii
D. i, ii and iv
Answer» E.
72.

In distributed file system, file name does not reveal the file’s ___________

A. local name
B. physical storage location
C. both local name and physical storage location
D. none of the mentioned
Answer» C. both local name and physical storage location
73.

In a distributed file system, when a file’s physical storage location changes ___________

A. file name need to be changed
B. file name need not to be changed
C. file’s host name need to be changed
D. file’s local name need to be changed
Answer» C. file’s host name need to be changed
74.

A distributed system is defined as a collection of autonomous computers linked by a network with software designed to produce an integrated computing facility.

A. true
B. false
Answer» B. false
75.

A “glue” between client and server parts of application

A. middleware
B. firmware
C. package
D. system software
Answer» B. firmware
76.

The hardware of DS has two types

A. multiprocessor system,multicomputer system
B. multiprocessor system,unicomputer system
C. uniprocessor system,multicomputer system
D. uniprocessor system,unicomputer system
Answer» B. multiprocessor system,unicomputer system
77.

Process Fail - Stop in process omission faults

A. can be detected in synchronous system.
B. can be detected in asynchronous system.
C. can be detected in synchronous and asynchronous system.
D. can be detected in standalone system.
Answer» B. can be detected in asynchronous system.
78.

Distributed pervasive system is also known as

A. ubiquitous computing
B. user interface design
C. graphical user interface
D. peer to peer system
Answer» B. user interface design
79.

Type of cluster computing is

A. load sharing cluster
B. load holding cluster
C. load replication cluster
D. load balancing cluster
Answer» E.
80.

Type of grid computing is

A. collaborative grid
B. system grid
C. process grid
D. channel grid
Answer» B. system grid
81.

Scaling transparency hides

A. system expansion
B. system collaboration
C. system failure
D. system security
Answer» B. system collaboration
82.

Internet provides                for remote login.

A. telnet
B. http
C. ftp
D. rpc
Answer» B. http
83.

The header usually consists of the following elements in IPC I. Sequence number II. Structural information III. Address IV. File mode(Read/ Write)

A. i,iii, iv
B. i,ii, iii
C. i, ii, iv
D. i,iv
Answer» C. i, ii, iv
84.

In RMI, the objects are passed by .

A. value
B. reference
C. value and reference
D. object
Answer» B. reference
85.

What are the exceptions which have to be handled in a RMI client program?

A. malformedurlexception
B. notfoundexception
C. arithmeticexception
D. class•not•found•excepti on
Answer» B. notfoundexception
86.

Transient communication done by layer

A. network
B. transport
C. physical
D. session
Answer» C. physical
87.

The local operating system on the server machine passes the incoming packets to the

A. server stub
B. client stub
C. client operating system
D. binding agent
Answer» B. client stub
88.

                                  provides programmers a familiar programming model by extending the local procedure call to a distributed environment

A. distributed environment
B. permanent procedure call
C. process and file
D. remote procedure call
Answer» E.
89.

Machine that places the request to access the data is generally called as .

A. server machine
B. client machine
C. request machine
D. database server
Answer» C. request machine
90.

An architecture where clients first communicate the server for data then format and display it to the users, is known as

A. client/server architecture
B. three-tier architecture
C. two-tier architecture
D. peer-to-peer architecture
Answer» B. three-tier architecture
91.

                   is an object acting as a gateway for the client side.

A. skeleton
B. stub
C. remote
D. server
Answer» C. remote
92.

Which of the following allocates/deallocates buffers

A. rrl
B. stub/skeleton layer
C. transport layer
D. networking layer
Answer» B. stub/skeleton layer
93.

Message passing provides a mechanism to allow processes to communicate and to synchronize their actions

A. by sharing the same address space
B. without sharing the same address space
C. by sharing the same process number and process identifier
D. by sharing port number
Answer» B. without sharing the same address space
94.

Which address is used to identify a process on a host by the transport layer?

A. physical address
B. logical address
C. port address
D. specific address
Answer» D. specific address
95.

If processes p and q both receive messages m and m', then p receives m before m' if and only if q receives m before m'.The order delivery is called

A. absolute ordering
B. consistent ordering
C. causal ordering
D. fifo ordering
Answer» C. causal ordering
96.

In all reliable multicast group communication

A. n\ response expected from the receiver
B. response from any of the receiver required
C. response from \m\(1<m<n) of the \n\ receiver required
D. response needed from all the receivers
Answer» E.
97.

What is close group in group communication?

A. only members can send messages to the group as a whole
B. processes that are not members (clients) can send message to the group.
C. the idea of groups is to support replicated servers
D. processes that are not members (clients) but close to the group can send message to the group.
Answer» B. processes that are not members (clients) can send message to the group.
98.

                   all related objects moved and left to a server upon the first RPC

A. call by value
B. call by move
C. call by visit
D. call by reference
Answer» C. call by visit
99.

What is the feature of stateful server?

A. longer server recovery time
B. quick recovery after reboot
C. file operations must be idempotent
D. simple server design
Answer» B. quick recovery after reboot
100.

           is a process that prevents multiple threads or processes from accessing shared resources at the same time.

A. critical section
B. deadlock
C. message passing
D. mutual exclusion
Answer» E.