MCQOPTIONS
Saved Bookmarks
This section includes 228 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 151. |
Network file system(NFS) is developed by? |
| A. | sun microsystem |
| B. | oracle |
| C. | apple |
| D. | honeywell |
| Answer» B. oracle | |
| 152. |
The file once created can not be changed is called |
| A. | rigid file |
| B. | rex file |
| C. | immutable file |
| D. | robust file |
| Answer» D. robust file | |
| 153. |
___ is a framework for distributed components using a messaging paradigm. |
| A. | CORBA |
| B. | DCOM |
| C. | DDObjects |
| D. | Jt |
| Answer» E. | |
| 154. |
_____is a framework for distributed objects on the Microsoft platform. |
| A. | CORBA |
| B. | DCOM |
| C. | DDObjects |
| D. | none |
| Answer» C. DDObjects | |
| 155. |
RPC works between two processes. These processes may be: |
| A. | on the same computer |
| B. | on different computers connected with a network |
| C. | both (a) and (b) |
| D. | neither (a) nor (b)( |
| Answer» D. neither (a) nor (b)( | |
| 156. |
An RPC (remote procedure call) is initiated by the: |
| A. | server |
| B. | client |
| C. | both (a) and (b) |
| D. | neither (a) nor (b)( |
| Answer» C. both (a) and (b) | |
| 157. |
To let a client have random access to a media stream with ___________ |
| A. | the protocol used must not be stateless |
| B. | the server must support download |
| C. | the stream should give access rights to the client |
| D. | all of the mentioned |
| Answer» B. the server must support download | |
| 158. |
The problem with unicast delivery is that the ___________ |
| A. | memory allocation is difficult |
| B. | server must establish a separate unicast session for each client |
| C. | the routers must support unicasting |
| D. | the clients must be close to the server |
| Answer» C. the routers must support unicasting | |
| 159. |
HTTP is __________ |
| A. | a stateful protocol |
| B. | a stateless protocol |
| C. | a protocol that maintains the status of its connection with the client |
| D. | a stateless protocol that does not maintain the status of its connection with the client |
| Answer» E. | |
| 160. |
Multicasting delivers the content to ___________ |
| A. | a single client |
| B. | all clients, regardless whether they want the content or not |
| C. | a group of receivers who indicate they wish to receive the content |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 161. |
The difficulty with multicasting from a practical point of view is ___________ |
| A. | memory allocation is difficult |
| B. | server must establish a separate unicast session for each client |
| C. | the routers must support multicasting |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 162. |
Broadcasting delivers the content to ___________ |
| A. | a single client |
| B. | all clients, regardless whether they want the content or not |
| C. | a group of receivers who indicate they wish to receive the content |
| D. | none of the mentioned |
| Answer» C. a group of receivers who indicate they wish to receive the content | |
| 163. |
Unicasting delivers the content to ___________ |
| A. | a single client |
| B. | all clients, regardless whether they want the content or not |
| C. | a group of receivers who indicate they wish to receive the content |
| D. | none of the mentioned |
| Answer» B. all clients, regardless whether they want the content or not | |
| 164. |
Multimedia system require hard real time scheduling ___________ |
| A. | to ensure critical tasks will be serviced within timing deadlines |
| B. | to deliver the media file to the client |
| C. | to minimize the delay |
| D. | for security |
| Answer» B. to deliver the media file to the client | |
| 165. |
The three general methods for delivering content from a server to a client across a network are ___________ |
| A. | unicasting |
| B. | multicasting |
| C. | broadcasting |
| D. | all of the mentioned |
| Answer» E. | |
| 166. |
The delay that occur during the playback of a stream is called ___________ |
| A. | stream delay |
| B. | playback delay |
| C. | jitter |
| D. | event delay |
| Answer» D. event delay | |
| 167. |
Which one of the following is the characteristic of a multimedia system? |
| A. | high storage |
| B. | high data rates |
| C. | both high storage and high data rates |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 168. |
In which type of streaming multimedia file is delivered to the client, but not shared? |
| A. | real-time streaming |
| B. | progressive download |
| C. | compression |
| D. | none of the mentioned |
| Answer» B. progressive download | |
| 169. |
What is multimedia file? |
| A. | is same as any other regular file |
| B. | must be accessed at specific rate |
| C. | stored on remote server can not be delivered to its client |
| D. | none of the mentioned |
| Answer» C. stored on remote server can not be delivered to its client | |
| 170. |
Domain name system provides _____________ |
| A. | host-name-to-network-address translations for the entire internet |
| B. | network-address-to-host-name translations for the entire internet |
| C. | binary to hex translations for the entire internet |
| D. | all of the mentioned |
| Answer» B. network-address-to-host-name translations for the entire internet | |
| 171. |
Distributed naming services/Distributed information systems have been devised to _____________ |
| A. | provide information about all the systems |
| B. | provide unified access to the information needed for remote computing |
| C. | provide unique names to all systems in a network |
| D. | all of the mentioned |
| Answer» C. provide unique names to all systems in a network | |
| 172. |
In the world wide web, a ____ is needed to gain access to the remote files, and separate operations are used to transfer files. |
| A. | laptop |
| B. | plugin |
| C. | browser |
| D. | player |
| Answer» D. player | |
| 173. |
In distributed file system ________________ directories are visible from the local machine. |
| A. | protected |
| B. | local |
| C. | private |
| D. | remote |
| Answer» E. | |
| 174. |
When a file system is mounted over a directory that is not empty then _____________ |
| A. | the system may not allow the mount |
| B. | the system must allow the mount |
| C. | the system may allow the mount and the directory’s existing files will then be made obscure |
| D. | all of the mentioned |
| Answer» D. all of the mentioned | |
| 175. |
What is the mount point? |
| A. | an empty directory at which the mounted file system will be attached |
| B. | a location where every time file systems are mounted |
| C. | is the time when the mounting is done |
| D. | none of the mentioned |
| Answer» B. a location where every time file systems are mounted | |
| 176. |
Which of the following are the two parts of the file name? |
| A. | name & identifier |
| B. | identifier & type |
| C. | extension & name |
| D. | type & extension |
| Answer» D. type & extension | |
| 177. |
Which one of the following explains the sequential file access method? |
| A. | random access according to the given byte number |
| B. | read bytes one at a time, in order |
| C. | read/write sequentially by record |
| D. | read/write randomly by record |
| Answer» C. read/write sequentially by record | |
| 178. |
Mapping of network file system protocol to local file system is done by ____________ |
| A. | network file system |
| B. | local file system |
| C. | volume manager |
| D. | remote mirror |
| Answer» B. local file system | |
| 179. |
Mapping of file is managed by ____________ |
| A. | file metadata |
| B. | page table |
| C. | virtual memory |
| D. | file system |
| Answer» B. page table | |
| 180. |
______ is a unique tag, usually a number identifies the file within the file system. |
| A. | file identifier |
| B. | file name |
| C. | file type |
| D. | none of the mentioned |
| Answer» B. file name | |
| 181. |
What is the mounting of file system? |
| A. | crating of a filesystem |
| B. | deleting a filesystem |
| C. | attaching portion of the file system into a directory structure |
| D. | removing the portion of the file system into a directory structure |
| Answer» D. removing the portion of the file system into a directory structure | |
| 182. |
By using the specific system call, we can ____________ |
| A. | open the file |
| B. | read the file |
| C. | write into the file |
| D. | all of the mentioned |
| Answer» E. | |
| 183. |
To create a file ____________ |
| A. | allocate the space in file system |
| B. | make an entry for new file in directory |
| C. | allocate the space in file system & make an entry for new file in directory |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 184. |
What are the characteristics of processor in distributed system? |
| A. | they vary in size and function |
| B. | they are same in size and function |
| C. | they are manufactured with single purpose |
| D. | they are real-time devices |
| Answer» B. they are same in size and function | |
| 185. |
In distributed systems, election algorithms assumes that ____________ |
| A. | a unique priority number is associated with each active process in system |
| B. | there is no priority number associated with any process |
| C. | priority of the processes is not required |
| D. | none of the mentioned |
| Answer» B. there is no priority number associated with any process | |
| 186. |
What are the different ways distributed may suffer? |
| A. | failure of a link |
| B. | failure of a site |
| C. | loss of message |
| D. | all of the mentioned |
| Answer» E. | |
| 187. |
According to the ring algorithm, links between processes are ____________ |
| A. | bidirectional |
| B. | unidirectional |
| C. | both bidirectional and unidirectional |
| D. | none of the mentioned |
| Answer» C. both bidirectional and unidirectional | |
| 188. |
What are design issues in distributed system structure? |
| A. | scalability |
| B. | fault-tolerance |
| C. | clustering |
| D. | all of the mentioned |
| Answer» E. | |
| 189. |
In case of failure, a new transaction coordinator can be elected by ____________ |
| A. | bully algorithm |
| B. | ring algorithm |
| C. | both bully and ring algorithm |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 190. |
In the token passing approach of distributed systems, processes are organized in a ring structure ____________ |
| A. | logically |
| B. | physically |
| C. | both logically and physically |
| D. | none of the mentioned |
| Answer» B. physically | |
| 191. |
If a process is executing in its critical section ____________ |
| A. | any other process can also execute in its critical section |
| B. | no other process can execute in its critical section |
| C. | one more process can execute in its critical section |
| D. | none of the mentioned |
| Answer» C. one more process can execute in its critical section | |
| 192. |
For proper synchronization in distributed systems ____________ |
| A. | prevention from the deadlock is must |
| B. | prevention from the starvation is must |
| C. | prevention from the deadlock & starvation is must |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 193. |
A process can enter into its critical section ____________ |
| A. | anytime |
| B. | when it receives a reply message from its parent process |
| C. | when it receives a reply message from all other processes in the system |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 194. |
If timestamps of two events are same, then the events are ____________ |
| A. | concurrent |
| B. | non-concurrent |
| C. | monotonic |
| D. | non-monotonic |
| Answer» B. non-concurrent | |
| 195. |
What are the parts of a global unique identifier? |
| A. | local unique timestamp |
| B. | remote timestamp |
| C. | clock number |
| D. | all of the mentioned |
| Answer» B. remote timestamp | |
| 196. |
In distributed systems, a logical clock is associated with ______________ |
| A. | each instruction |
| B. | each process |
| C. | each register |
| D. | none of the mentioned |
| Answer» C. each register | |
| 197. |
Which of the following disadvantages follows the single coordinator approach? |
| A. | bottleneck |
| B. | slow response |
| C. | deadlock |
| D. | one request per second |
| Answer» B. slow response | |
| 198. |
Which one of the following is a distributed file system? |
| A. | andrew file system |
| B. | network file system |
| C. | novel network |
| D. | all of the mentioned |
| Answer» E. | |
| 199. |
Which of the following advantages follows the single coordinator approach? |
| A. | simple implementation |
| B. | simple deadlock handling |
| C. | bottleneck |
| D. | all of the mentioned |
| Answer» E. | |
| 200. |
What are the characteristics of atomicity? |
| A. | all operations associated are executed to completion or none are performed |
| B. | one processor as coordinator which handles all requests |
| C. | when responses are received from all processes, then the process can enter its critical section |
| D. | use communication links |
| Answer» B. one processor as coordinator which handles all requests | |