Deck 5: Distributed Systems and Synchronization

ملء الشاشة (f)
exit full mode
سؤال
Which one of the following hides the location where in the network the file is stored?

A)transparent distributed file system
B)hidden distributed file system
C)escaped distribution file system
D)spy distributed file system
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
In a distributed file system, when a file's physical storage location changes ___________

A)file name need to be changed
B)file name need not to be changed
C)file's host name need to be changed
D)file's local name need to be changed
سؤال
In a distributed file system, _______ is mapping between logical and physical objects.

A)client interfacing
B)naming
C)migration
D)heterogeneity
سؤال
In a distributed file system, a file is uniquely identified by ___________

A)host name
B)local name
C)the combination of host name and local name
D)none of the mentioned
سؤال
There is no need to establish and terminate a connection through open and close operation in ___________

A)stateless file service
B)stateful file service
C)both stateless and stateful file service
D)none of the mentioned
سؤال
In distributed file system, file name does not reveal the file's ___________

A)local name
B)physical storage location
C)both local name and physical storage location
D)none of the mentioned
سؤال
Which one of the following is a distributed file system?

A)andrew file system
B)network file system
C)novel network
D)all of the mentioned
سؤال
What are the characteristics of mutual exclusion using centralized approach?

A)one processor as coordinator which handles all requests
B)it requires request,reply and release per critical section entry
C)the method is free from starvation
D)all of the mentioned
سؤال
What are the advantages of token(with rings) passing approach?
i. One processor as coordinator which handles all requests
ii. No starvation if the ring is unidirectional
iii. There are many messages passed per section entered if few users want to get in section
iv. One processor as coordinator which handles all requests
v. Only one message/entry if everyone wants to get in

A)i
B)ii and iii
C)i, ii and iii
D)i, ii and iv
سؤال
What are the characteristics of atomicity?

A)all operations associated are executed to completion or none are performed
B)one processor as coordinator which handles all requests
C)when responses are received from all processes, then the process can enter its critical section
D)use communication links
سؤال
What things are the transaction coordinator is responsible for?

A)starting the execution of the transaction
B)breaking transaction into a number of subtransactions
C)coordinating the termination of the transaction
D)all of the mentioned
سؤال
Which of the following advantages follows the single coordinator approach?

A)simple implementation
B)simple deadlock handling
C)bottleneck
D)all of the mentioned
سؤال
Which of the following disadvantages follows the single coordinator approach?

A)bottleneck
B)slow response
C)deadlock
D)one request per second
سؤال
What are the parts of a global unique identifier?

A)local unique timestamp
B)remote timestamp
C)clock number
D)all of the mentioned
سؤال
In distributed systems, a logical clock is associated with ______________

A)each instruction
B)each process
C)each register
D)none of the mentioned
سؤال
If timestamps of two events are same, then the events are ____________

A)concurrent
B)non-concurrent
C)monotonic
D)non-monotonic
سؤال
If a process is executing in its critical section ____________

A)any other process can also execute in its critical section
B)no other process can execute in its critical section
C)one more process can execute in its critical section
D)none of the mentioned
سؤال
A process can enter into its critical section ____________

A)anytime
B)when it receives a reply message from its parent process
C)when it receives a reply message from all other processes in the system
D)none of the mentioned
سؤال
For proper synchronization in distributed systems ____________

A)prevention from the deadlock is must
B)prevention from the starvation is must
C)prevention from the deadlock & starvation is must
D)none of the mentioned
سؤال
In the token passing approach of distributed systems, processes are organized in a ring structure ____________

A)logically
B)physically
C)both logically and physically
D)none of the mentioned
سؤال
In distributed systems, what will the transaction coordinator do?

A)starts the execution of transaction
B)breaks the transaction into number of sub transactions
C)coordinates the termination of the transaction
D)all of the mentioned
سؤال
In case of failure, a new transaction coordinator can be elected by ____________

A)bully algorithm
B)ring algorithm
C)both bully and ring algorithm
D)none of the mentioned
سؤال
In distributed systems, election algorithms assumes that ____________

A)a unique priority number is associated with each active process in system
B)there is no priority number associated with any process
C)priority of the processes is not required
D)none of the mentioned
سؤال
According to the ring algorithm, links between processes are ____________

A)bidirectional
B)unidirectional
C)both bidirectional and unidirectional
D)none of the mentioned
سؤال
What are the different ways distributed may suffer?

A)failure of a link
B)failure of a site
C)loss of message
D)all of the mentioned
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 5: Distributed Systems and Synchronization
1
Which one of the following hides the location where in the network the file is stored?

A)transparent distributed file system
B)hidden distributed file system
C)escaped distribution file system
D)spy distributed file system
transparent distributed file system
2
In a distributed file system, when a file's physical storage location changes ___________

A)file name need to be changed
B)file name need not to be changed
C)file's host name need to be changed
D)file's local name need to be changed
file name need not to be changed
3
In a distributed file system, _______ is mapping between logical and physical objects.

A)client interfacing
B)naming
C)migration
D)heterogeneity
naming
4
In a distributed file system, a file is uniquely identified by ___________

A)host name
B)local name
C)the combination of host name and local name
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
5
There is no need to establish and terminate a connection through open and close operation in ___________

A)stateless file service
B)stateful file service
C)both stateless and stateful file service
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
6
In distributed file system, file name does not reveal the file's ___________

A)local name
B)physical storage location
C)both local name and physical storage location
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which one of the following is a distributed file system?

A)andrew file system
B)network file system
C)novel network
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
8
What are the characteristics of mutual exclusion using centralized approach?

A)one processor as coordinator which handles all requests
B)it requires request,reply and release per critical section entry
C)the method is free from starvation
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
9
What are the advantages of token(with rings) passing approach?
i. One processor as coordinator which handles all requests
ii. No starvation if the ring is unidirectional
iii. There are many messages passed per section entered if few users want to get in section
iv. One processor as coordinator which handles all requests
v. Only one message/entry if everyone wants to get in

A)i
B)ii and iii
C)i, ii and iii
D)i, ii and iv
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
10
What are the characteristics of atomicity?

A)all operations associated are executed to completion or none are performed
B)one processor as coordinator which handles all requests
C)when responses are received from all processes, then the process can enter its critical section
D)use communication links
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
11
What things are the transaction coordinator is responsible for?

A)starting the execution of the transaction
B)breaking transaction into a number of subtransactions
C)coordinating the termination of the transaction
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following advantages follows the single coordinator approach?

A)simple implementation
B)simple deadlock handling
C)bottleneck
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following disadvantages follows the single coordinator approach?

A)bottleneck
B)slow response
C)deadlock
D)one request per second
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
14
What are the parts of a global unique identifier?

A)local unique timestamp
B)remote timestamp
C)clock number
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
15
In distributed systems, a logical clock is associated with ______________

A)each instruction
B)each process
C)each register
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
16
If timestamps of two events are same, then the events are ____________

A)concurrent
B)non-concurrent
C)monotonic
D)non-monotonic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
17
If a process is executing in its critical section ____________

A)any other process can also execute in its critical section
B)no other process can execute in its critical section
C)one more process can execute in its critical section
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
18
A process can enter into its critical section ____________

A)anytime
B)when it receives a reply message from its parent process
C)when it receives a reply message from all other processes in the system
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
19
For proper synchronization in distributed systems ____________

A)prevention from the deadlock is must
B)prevention from the starvation is must
C)prevention from the deadlock & starvation is must
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
20
In the token passing approach of distributed systems, processes are organized in a ring structure ____________

A)logically
B)physically
C)both logically and physically
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
21
In distributed systems, what will the transaction coordinator do?

A)starts the execution of transaction
B)breaks the transaction into number of sub transactions
C)coordinates the termination of the transaction
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
22
In case of failure, a new transaction coordinator can be elected by ____________

A)bully algorithm
B)ring algorithm
C)both bully and ring algorithm
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
23
In distributed systems, election algorithms assumes that ____________

A)a unique priority number is associated with each active process in system
B)there is no priority number associated with any process
C)priority of the processes is not required
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
24
According to the ring algorithm, links between processes are ____________

A)bidirectional
B)unidirectional
C)both bidirectional and unidirectional
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
25
What are the different ways distributed may suffer?

A)failure of a link
B)failure of a site
C)loss of message
D)all of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.