Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 228 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

151.

Network file system(NFS) is developed by?

A. sun microsystem
B. oracle
C. apple
D. honeywell
Answer» B. oracle
152.

The file once created can not be changed is called

A. rigid file
B. rex file
C. immutable file
D. robust file
Answer» D. robust file
153.

___ is a framework for distributed components using a messaging paradigm.

A. CORBA
B. DCOM
C. DDObjects
D. Jt
Answer» E.
154.

_____is a framework for distributed objects on the Microsoft platform.

A. CORBA
B. DCOM
C. DDObjects
D. none
Answer» C. DDObjects
155.

RPC works between two processes. These processes may be:

A. on the same computer
B. on different computers connected with a network
C. both (a) and (b)
D. neither (a) nor (b)(
Answer» D. neither (a) nor (b)(
156.

An RPC (remote procedure call) is initiated by the:

A. server
B. client
C. both (a) and (b)
D. neither (a) nor (b)(
Answer» C. both (a) and (b)
157.

To let a client have random access to a media stream with ___________

A. the protocol used must not be stateless
B. the server must support download
C. the stream should give access rights to the client
D. all of the mentioned
Answer» B. the server must support download
158.

The problem with unicast delivery is that the ___________

A. memory allocation is difficult
B. server must establish a separate unicast session for each client
C. the routers must support unicasting
D. the clients must be close to the server
Answer» C. the routers must support unicasting
159.

HTTP is __________

A. a stateful protocol
B. a stateless protocol
C. a protocol that maintains the status of its connection with the client
D. a stateless protocol that does not maintain the status of its connection with the client
Answer» E.
160.

Multicasting delivers the content to ___________

A. a single client
B. all clients, regardless whether they want the content or not
C. a group of receivers who indicate they wish to receive the content
D. none of the mentioned
Answer» D. none of the mentioned
161.

The difficulty with multicasting from a practical point of view is ___________

A. memory allocation is difficult
B. server must establish a separate unicast session for each client
C. the routers must support multicasting
D. none of the mentioned
Answer» D. none of the mentioned
162.

Broadcasting delivers the content to ___________

A. a single client
B. all clients, regardless whether they want the content or not
C. a group of receivers who indicate they wish to receive the content
D. none of the mentioned
Answer» C. a group of receivers who indicate they wish to receive the content
163.

Unicasting delivers the content to ___________

A. a single client
B. all clients, regardless whether they want the content or not
C. a group of receivers who indicate they wish to receive the content
D. none of the mentioned
Answer» B. all clients, regardless whether they want the content or not
164.

Multimedia system require hard real time scheduling ___________

A. to ensure critical tasks will be serviced within timing deadlines
B. to deliver the media file to the client
C. to minimize the delay
D. for security
Answer» B. to deliver the media file to the client
165.

The three general methods for delivering content from a server to a client across a network are ___________

A. unicasting
B. multicasting
C. broadcasting
D. all of the mentioned
Answer» E.
166.

The delay that occur during the playback of a stream is called ___________

A. stream delay
B. playback delay
C. jitter
D. event delay
Answer» D. event delay
167.

Which one of the following is the characteristic of a multimedia system?

A. high storage
B. high data rates
C. both high storage and high data rates
D. none of the mentioned
Answer» D. none of the mentioned
168.

In which type of streaming multimedia file is delivered to the client, but not shared?

A. real-time streaming
B. progressive download
C. compression
D. none of the mentioned
Answer» B. progressive download
169.

What is multimedia file?

A. is same as any other regular file
B. must be accessed at specific rate
C. stored on remote server can not be delivered to its client
D. none of the mentioned
Answer» C. stored on remote server can not be delivered to its client
170.

Domain name system provides _____________

A. host-name-to-network-address translations for the entire internet
B. network-address-to-host-name translations for the entire internet
C. binary to hex translations for the entire internet
D. all of the mentioned
Answer» B. network-address-to-host-name translations for the entire internet
171.

Distributed naming services/Distributed information systems have been devised to _____________

A. provide information about all the systems
B. provide unified access to the information needed for remote computing
C. provide unique names to all systems in a network
D. all of the mentioned
Answer» C. provide unique names to all systems in a network
172.

In the world wide web, a ____ is needed to gain access to the remote files, and separate operations are used to transfer files.

A. laptop
B. plugin
C. browser
D. player
Answer» D. player
173.

In distributed file system ________________ directories are visible from the local machine.

A. protected
B. local
C. private
D. remote
Answer» E.
174.

When a file system is mounted over a directory that is not empty then _____________

A. the system may not allow the mount
B. the system must allow the mount
C. the system may allow the mount and the directory’s existing files will then be made obscure
D. all of the mentioned
Answer» D. all of the mentioned
175.

What is the mount point?

A. an empty directory at which the mounted file system will be attached
B. a location where every time file systems are mounted
C. is the time when the mounting is done
D. none of the mentioned
Answer» B. a location where every time file systems are mounted
176.

Which of the following are the two parts of the file name?

A. name & identifier
B. identifier & type
C. extension & name
D. type & extension
Answer» D. type & extension
177.

Which one of the following explains the sequential file access method?

A. random access according to the given byte number
B. read bytes one at a time, in order
C. read/write sequentially by record
D. read/write randomly by record
Answer» C. read/write sequentially by record
178.

Mapping of network file system protocol to local file system is done by ____________

A. network file system
B. local file system
C. volume manager
D. remote mirror
Answer» B. local file system
179.

Mapping of file is managed by ____________

A. file metadata
B. page table
C. virtual memory
D. file system
Answer» B. page table
180.

______ is a unique tag, usually a number identifies the file within the file system.

A. file identifier
B. file name
C. file type
D. none of the mentioned
Answer» B. file name
181.

What is the mounting of file system?

A. crating of a filesystem
B. deleting a filesystem
C. attaching portion of the file system into a directory structure
D. removing the portion of the file system into a directory structure
Answer» D. removing the portion of the file system into a directory structure
182.

By using the specific system call, we can ____________

A. open the file
B. read the file
C. write into the file
D. all of the mentioned
Answer» E.
183.

To create a file ____________

A. allocate the space in file system
B. make an entry for new file in directory
C. allocate the space in file system & make an entry for new file in directory
D. none of the mentioned
Answer» D. none of the mentioned
184.

What are the characteristics of processor in distributed system?

A. they vary in size and function
B. they are same in size and function
C. they are manufactured with single purpose
D. they are real-time devices
Answer» B. they are same in size and function
185.

In distributed systems, election algorithms assumes that ____________

A. a unique priority number is associated with each active process in system
B. there is no priority number associated with any process
C. priority of the processes is not required
D. none of the mentioned
Answer» B. there is no priority number associated with any process
186.

What are the different ways distributed may suffer?

A. failure of a link
B. failure of a site
C. loss of message
D. all of the mentioned
Answer» E.
187.

According to the ring algorithm, links between processes are ____________

A. bidirectional
B. unidirectional
C. both bidirectional and unidirectional
D. none of the mentioned
Answer» C. both bidirectional and unidirectional
188.

What are design issues in distributed system structure?

A. scalability
B. fault-tolerance
C. clustering
D. all of the mentioned
Answer» E.
189.

In case of failure, a new transaction coordinator can be elected by ____________

A. bully algorithm
B. ring algorithm
C. both bully and ring algorithm
D. none of the mentioned
Answer» D. none of the mentioned
190.

In the token passing approach of distributed systems, processes are organized in a ring structure ____________

A. logically
B. physically
C. both logically and physically
D. none of the mentioned
Answer» B. physically
191.

If a process is executing in its critical section ____________

A. any other process can also execute in its critical section
B. no other process can execute in its critical section
C. one more process can execute in its critical section
D. none of the mentioned
Answer» C. one more process can execute in its critical section
192.

For proper synchronization in distributed systems ____________

A. prevention from the deadlock is must
B. prevention from the starvation is must
C. prevention from the deadlock & starvation is must
D. none of the mentioned
Answer» D. none of the mentioned
193.

A process can enter into its critical section ____________

A. anytime
B. when it receives a reply message from its parent process
C. when it receives a reply message from all other processes in the system
D. none of the mentioned
Answer» D. none of the mentioned
194.

If timestamps of two events are same, then the events are ____________

A. concurrent
B. non-concurrent
C. monotonic
D. non-monotonic
Answer» B. non-concurrent
195.

What are the parts of a global unique identifier?

A. local unique timestamp
B. remote timestamp
C. clock number
D. all of the mentioned
Answer» B. remote timestamp
196.

In distributed systems, a logical clock is associated with ______________

A. each instruction
B. each process
C. each register
D. none of the mentioned
Answer» C. each register
197.

Which of the following disadvantages follows the single coordinator approach?

A. bottleneck
B. slow response
C. deadlock
D. one request per second
Answer» B. slow response
198.

Which one of the following is a distributed file system?

A. andrew file system
B. network file system
C. novel network
D. all of the mentioned
Answer» E.
199.

Which of the following advantages follows the single coordinator approach?

A. simple implementation
B. simple deadlock handling
C. bottleneck
D. all of the mentioned
Answer» E.
200.

What are the characteristics of atomicity?

A. all operations associated are executed to completion or none are performed
B. one processor as coordinator which handles all requests
C. when responses are received from all processes, then the process can enter its critical section
D. use communication links
Answer» B. one processor as coordinator which handles all requests