MCQOPTIONS
Saved Bookmarks
This section includes 1690 Mcqs, each offering curated multiple-choice questions to sharpen your Technical Programming knowledge and support exam preparation. Choose a topic below to get started.
| 651. |
The file once created can not be changed is called |
| A. | immutable file |
| B. | mutex file |
| C. | mutable file |
| D. | none of the mentioned |
| Answer» B. mutex file | |
| 652. |
What are non characteristics of session semantics ? |
| A. | Each client obtains a working copy from the server |
| B. | When file is closed, the modified file is copied to the file server |
| C. | The burden of coordinating file sharing is ignored by the system |
| D. | Easy to implement in a single processor system |
| Answer» E. | |
| 653. |
What are the characteristics of transaction semantics ? |
| A. | Suitable for applications that are concerned about coherence of data |
| B. | The users of this model are interested in the atomicity property for their transaction |
| C. | Easy to implement in a single processor system |
| D. | Write-back enhances access performance |
| Answer» C. Easy to implement in a single processor system | |
| 654. |
What are the characteristics of Unix semantics ? |
| A. | Easy to implement in a single processor system |
| B. | Data cached on a per process basis using write through case control |
| C. | Write-back enhances access performance |
| D. | All of the mentioned |
| Answer» E. | |
| 655. |
What are the three popular semantic modes ? |
| A. | Unix, Coherent & Session semantics |
| B. | Unix, Transaction & Session semantics |
| C. | Coherent, Transaction & Session semantics |
| D. | Session, Coherent semantics |
| Answer» C. Coherent, Transaction & Session semantics | |
| 656. |
What is coherency of replicated data ? |
| A. | All replicas are identical at all times |
| B. | Replicas are perceived as identical only at some points in time |
| C. | Users always read the most recent data in the replicas |
| D. | All of the mentioned |
| Answer» E. | |
| 657. |
What are characteristic of NFS protocol ? |
| A. | Search for file within directory |
| B. | Read a set of directory entries |
| C. | Manipulate links and directories |
| D. | All of the mentioned |
| Answer» E. | |
| 658. |
What are the advantages of file replication ? |
| A. | Improves availability & performance |
| B. | Decreases performance |
| C. | They are consistent |
| D. | Improves speed |
| Answer» B. Decreases performance | |
| 659. |
Implementation of a stateless file server must not follow ? |
| A. | Idempotency requirement |
| B. | Encryption of keys |
| C. | File locking mechanism |
| D. | Cache consistency |
| Answer» C. File locking mechanism | |
| 660. |
What are the characteristics of stateless server ? |
| A. | Easier to implement |
| B. | They are not fault-tolerant upon client or server failures |
| C. | They store all information file server |
| D. | They are redundant to keep data safe |
| Answer» B. They are not fault-tolerant upon client or server failures | |
| 661. |
What is a stateless file server ? |
| A. | It keeps tracks of states of different objects |
| B. | It maintains internally no state information at all |
| C. | It maintains some information in them |
| D. | None of the mentioned |
| Answer» C. It maintains some information in them | |
| 662. |
Which is not an examples of state information ? |
| A. | Mounting information |
| B. | Description of HDD space |
| C. | Session keys |
| D. | Lock status |
| Answer» C. Session keys | |
| 663. |
What are examples of state information ? |
| A. | opened files and their clients |
| B. | file descriptors and file handles |
| C. | current file position pointers |
| D. | all of the mentioned |
| Answer» E. | |
| 664. |
What is networked virtual memory ? |
| A. | Caching |
| B. | Segmentation |
| C. | RAM disk |
| D. | None of the mentioned |
| Answer» B. Segmentation | |
| 665. |
What is the advantage of caching in remote file access ? |
| A. | Reduced network traffic by retaining recently accessed disk blocks |
| B. | Faster network access |
| C. | Copies of data creates backup automatically |
| D. | None of the mentioned |
| Answer» B. Faster network access | |
| 666. |
What are the different ways mounting of file system ? |
| A. | boot mounting |
| B. | auto mounting |
| C. | explicit mounting |
| D. | all of the mentioned |
| Answer» E. | |
| 667. |
Which is not a major components of file system ? |
| A. | Directory service |
| B. | Authorization service |
| C. | Shadow service |
| D. | System service |
| Answer» D. System service | |
| 668. |
What are the different ways file accesses take place ? |
| A. | sequential access |
| B. | direct access |
| C. | indexed sequential access |
| D. | all of the mentioned |
| Answer» E. | |
| 669. |
What are characteristic of a DFS ? |
| A. | Fault tolerance |
| B. | Scalability |
| C. | Heterogeneity of the system |
| D. | Upgradation |
| Answer» E. | |
| 670. |
What are not the characteristics of a DFS ? |
| A. | login transparency and access transparency |
| B. | Files need not contain information about their physical location |
| C. | No Multiplicity of users |
| D. | No Multiplicity if files |
| Answer» D. No Multiplicity if files | |
| 671. |
What are the different ways in which clients and servers are dispersed across machines ? |
| A. | Servers may not run on dedicated machines |
| B. | Servers and clients can be on same machines |
| C. | Distribution cannot be interposed between a OS and the file system |
| D. | OS cannot be distributed with the file system a part of that distribution |
| Answer» C. Distribution cannot be interposed between a OS and the file system | |
| 672. |
What are important step followed when recovery from failure happens ? |
| A. | Post repairing integration with main system should happen smoothly and gracefully |
| B. | Upon link failure both parties at end must not be notified |
| C. | Fault recovery system must me adjusted |
| D. | Failures are logged systematically |
| Answer» B. Upon link failure both parties at end must not be notified | |
| 673. |
In which OSI layer encryption and decryption happens ? |
| A. | Application |
| B. | Presentation |
| C. | Transport |
| D. | Data Link |
| Answer» C. Transport | |
| 674. |
What are design issues in distributed system structure ? |
| A. | Scalability |
| B. | Fault-tolerance |
| C. | Clustering |
| D. | All of the mentioned |
| Answer» E. | |
| 675. |
What are different ways distributed may suffer ? |
| A. | Failure of a link |
| B. | Failure of a site |
| C. | Loss of message |
| D. | All of the mentioned |
| Answer» E. | |
| 676. |
Which of the following is an application layer service ? |
| A. | Mail service |
| B. | File transfer |
| C. | Remote access |
| D. | All of the mentioned |
| Answer» E. | |
| 677. |
Which layer lies between transport layer and data link layer ? |
| A. | Physical |
| B. | Network |
| C. | Application |
| D. | Session |
| Answer» C. Application | |
| 678. |
Header are ______ when data packet moves from upper to the lower layers ? |
| A. | Modified |
| B. | Removed |
| C. | Added |
| D. | All of the mentioned |
| Answer» D. All of the mentioned | |
| 679. |
Which layer is the layer closest to the transmission medium ? |
| A. | Physical |
| B. | Data link |
| C. | Network |
| D. | Transport |
| Answer» B. Data link | |
| 680. |
Which layer is responsible for The process-to-process delivery ? |
| A. | Network |
| B. | Transport |
| C. | Application |
| D. | Physical |
| Answer» C. Application | |
| 681. |
How many layers does Internet model ISO consists of ? |
| A. | Three |
| B. | Five |
| C. | Seven |
| D. | Eight |
| Answer» D. Eight | |
| 682. |
What is common problem found in distributed system ? |
| A. | Process Synchronization |
| B. | Communication synchronization |
| C. | Deadlock problem |
| D. | Power failure |
| Answer» D. Power failure | |
| 683. |
How is are collisions avoided in network ? |
| A. | Carrier sense with multiple access (CSMA); collision detection (CD) |
| B. | Carrier sense multiple access with collision avoidance |
| C. | Message slots |
| D. | All of the mentioned |
| Answer» E. | |
| 684. |
What are connection strategies not used in distributed systems ? |
| A. | Circuit switching |
| B. | Message switching |
| C. | Token switching |
| D. | Packet switching |
| Answer» D. Packet switching | |
| 685. |
What are routing strategies which is not used in distributed systems ? |
| A. | Fixed routing |
| B. | Token routing |
| C. | Virtual circuit |
| D. | Dynamic routing |
| Answer» D. Dynamic routing | |
| 686. |
What are characteristics of Naming and Name resolution ? |
| A. | name systems in the network |
| B. | address messages with the process-id |
| C. | virtual circuit |
| D. | message switching |
| Answer» C. virtual circuit | |
| 687. |
Which design features of a communication network are important ? |
| A. | Naming and name resolution |
| B. | Routing strategies |
| C. | Connection strategies |
| D. | All of the mentioned |
| Answer» E. | |
| 688. |
What are sites in network topology compared ? |
| A. | Basic cost |
| B. | Communication cost |
| C. | Reliability |
| D. | All of the mentioned |
| Answer» E. | |
| 689. |
What are valid network topology ? |
| A. | Multiaccess bus |
| B. | Ring |
| C. | Star |
| D. | All of the mentioned |
| Answer» E. | |
| 690. |
What are parts of network structure ? |
| A. | Workstation |
| B. | Gateway |
| C. | Laptop |
| D. | All of the mentioned |
| Answer» E. | |
| 691. |
What are characteristics of process migration ? |
| A. | transfer data by entire file or immediate portion required |
| B. | transfer the computation rather than the data |
| C. | execute an entire process or parts of it at different sites |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 692. |
What are characteristics of computation migration ? |
| A. | transfer data by entire file or immediate portion required |
| B. | transfer the computation rather than the data |
| C. | execute an entire process or parts of it at different sites |
| D. | none of the mentioned |
| Answer» C. execute an entire process or parts of it at different sites | |
| 693. |
What are characteristics of data migration ? |
| A. | transfer data by entire file or immediate portion required |
| B. | transfer the computation rather than the data |
| C. | execute an entire process or parts of it at different sites |
| D. | none of the mentioned |
| Answer» B. transfer the computation rather than the data | |
| 694. |
What are characteristics of Distributed Operating system ? |
| A. | Users are aware of multiplicity of machines |
| B. | Access is done like local resources |
| C. | Users are aware of multiplicity of machines |
| D. | They have multiple zones to access files |
| Answer» C. Users are aware of multiplicity of machines | |
| 695. |
How are access to resources of various machines is done ? |
| A. | Remote logging using ssh or telnet |
| B. | Zone are configured for automatic access |
| C. | FTP is not used |
| D. | All of the mentioned |
| Answer» B. Zone are configured for automatic access | |
| 696. |
What are characteristic of Network Operating Systems ? |
| A. | Users are aware of multiplicity of machines |
| B. | They are transparent |
| C. | They are simple to use |
| D. | All of the mentioned |
| Answer» B. They are transparent | |
| 697. |
What are types of distributed operating system ? |
| A. | Network Operating system |
| B. | Zone based Operating system |
| C. | Level based Operating system |
| D. | All of the mentioned |
| Answer» B. Zone based Operating system | |
| 698. |
What is not a major reason for building distributed systems ? |
| A. | Resource sharing |
| B. | Computation speedup |
| C. | Reliability |
| D. | Simplicity |
| Answer» E. | |
| 699. |
What are characteristics of distributed file system ? |
| A. | Its users, servers and storage devices are dispersed |
| B. | Service activity is not carried out across the network |
| C. | They have single centralized data repository |
| D. | There are multiple dependent storage devices |
| Answer» B. Service activity is not carried out across the network | |
| 700. |
What are characteristics of processor in distributed system ? |
| A. | They vary in size and function |
| B. | They are same in size and function |
| C. | They are manufactured with single purpose |
| D. | They are real-time devices |
| Answer» B. They are same in size and function | |