Question No. A B C D Answer Key: Scheme R2016 Semester 8 Course Code CSC802 Course Name Distributed Computing
Question No. A B C D Answer Key: Scheme R2016 Semester 8 Course Code CSC802 Course Name Distributed Computing
Question No. A B C D Answer Key: Scheme R2016 Semester 8 Course Code CSC802 Course Name Distributed Computing
Semester 8
Course Code CSC802
Course Name Distributed Computing
MODULE 1
Q A Parallel computer is the computer system capable of
A Parallel Computing
A Centralized Computing
A Decentralized Computing
A Distributed Computing
Q A distributed computer running a distributed program is known as
A Distributed Process
A Distributed Application
A Distributed Computing
A Distributed Program
Q Uni processor computing is known as
A Centralized Computing
A Parallel Computing
A Distributed Computing
A Grid Computing
Q Which of the following is true about heterogeneous architecture?
A There is no mixed architecture style at one abstraction level
A Heterogeneous architecture implies increased time efficiency
If the general structure of a system is connected using one architecture style, and each
A component can use a different one, this is one example of heterogeneous architecture
A Heterogeneous architecture implies decreased time efficiency
MODULE 2
Q What is the other name for object middleware?
A Object request interface
A Object Request broker
A Object enabled broker
A Object enabled interface
Q A “glue” between client and server parts of application.
A Middleware
A Firmware
A Package
A System Software
A type of middleware that allows for between the built-in applications and the real-
Q time OS?
A Firmware
A Embedded Middleware
A Database middleware
A Portals
Q Middleware forms a layer between
A application and distributed platforms
A several individual computers
A application and client
A server and client
Q Middleware systems follow
A middleware solution
A specific model
A specific architecture style
A specific protocol
A typical _________ program creates some remote objects, makes references to these
objects accessible, and waits for clients to invoke methods on these objects.
Q
A Server
A Client
A Thread
A Concurrent
Q From the following which is not a type of Communication
A Persistent and transient communication
A Synchronous and asynchronous communication
A Persistent synchronous and persistent asynchronous communication
A Non persistent communication
Q What is true about asynchronous communication
in asynchronous communication most of the time there is no reply from the reciever
A end
A Sender and reciver process need to be active at the time of communication
A it uses procedure calling at the server's side
A in asynchronous communication there is always a reply from the reciever end
An email service is a typical example of messaging service, where a sender sends an
Q email message to recipient.
A It never waits for a reply from the recipient
A it always waits for a reply from the reciepient before sending next
A it will always send the reply email message to the sender.
A it is a type of synchronous communication
Q Which of the following is not a classification of group communication?
A One to Many
A Many to one
A Many to Many
A Many to All
Which of the following is not commonly used semantics for ordered delivery of
Q multicast messages are:
A Absolute Ordering
A Consistent Ordering
A Casual
A Non- Casual
Q The data sequence of information that is time-dependent is called ___________
A Stream of data
A traditional data
A transactional data
A spatial data
Q Which of the following is not an example of stream data
A Video
A Audio
A large data files
A text
Q MPI and sockets are examples of
A Message oriented transient communication
A message oriented persistent communication
A Mobile Oriented Communication
A Object oriented permanent Communication
Q The sever and client computer interact with each other using ________
A Specific Port Number and IP Address
A MAC Address
A MAC Address and Port Number
A MAC Address and IP Address
In consistent ordering when recieving the message each member calculate its
Q proposed sequence number by using the function____________
A max(Fmax, Pmax) + I + i/N
A min(Fmax, Pmax) + I + i/N
A min(Fmin, Pmax) + I + i/N
A max(Fmin, Pmin) + I + i/N
A socket uses ____________ to transmit data between the sender and the reciever.
Q
A IPC
A IMC
A IBC
A API
The Resource Reservation Protocol is __________________ layer protocol designed
Q to reserver resources in Distributed Computing.
A Transport Layer
A Network Layer
A Interface Layer
A Internet Layer
MODULE 3
Q When resources have multiple instances ________ is used for deadlock Avoidance.
A Bankers algorithm
A Resource Allocation Graph
A Semaphores
A Phishing
Q Synchronization tool is?
A thread
A pipe
A semaphore
A socket
In which the access takes place when different processes try to access the same data
concurrently and the outcome of the execution depends on the specific order, is called
Q
A dynamic condition
A race condition
A essential condition
A critical condition
Q Process synchronization can be done on which of the following levels
A hardware
A software
A both hardware and software
A BIOS
Which of the following process can be affected by other processes during execution in
Q the system?
A init process
A child process
A parent process
A cooperating process
Q How can we avoid deadlock
A Resource Allocation must be done at once
A there must be a fixed number of resources to allocate
A all deadlock process must be aborted
A inversion technique can be used
A minimum of _____ variable(s) is/are required to be shared between processes to
Q solve the critical section problem.
A 1
A 2
A 3
A 4
Q Which of the following conditions is not requied to solve the critical section problem?
A Mutual Exclusion
A Progress
A Bounded Waiting
A Sharing
The segment of code in which the process may change common variables, update
Q tables, write into files is known as ____________
A program
A critical section
A non – critical section
A synchronizing
A situation where several processes access and manipulate the same data concurrently
and the outcome of the execution depends on the particular order in which access
Q takes place is called ____________
A Data consistency
A race condition
A aging
A starvation
MODULE 4
The address of the next instruction to be executed by the current process is provided
Q by the __________
A Program counter
A CPU registers
A Process stack
A Pipe
Q Which system call returns the process identifier of a terminated child?
A wait
A exit
A fork
A get
A thread shares its resources(like data section, code section, open files, signals) with
Q ___________
A other process similar to the one that the thread belongs to
A other threads that belong to similar processes
A other threads that belong to the same process
A different threads that belong to the different process
_________________ is often used for implementing specialized threads within a
Q process.
A Team model
A Dispatcher worker model
A Pipeline model
A Light model
Q The capability of a system to adapt the increased service load is called ___________
A scalability
A tolerance
A capacity
A polling
Q Logical extension of computation migration is
A process migration
A system migration
A thread migration
A data migration
No special machines manage the network of architecture in which resources are
Q known as
A Peer-to-Peer
A Space based
A Tightly coupled
A Loosely coupled
Q Scheduuling of threads done by
A input
A output
A operating system
A memory
Q For execution on process need
A Throughput
A Timer
A Resources
A Access Time
Q Message passing system allows processes to __________
A communicate with one another without resorting to shared data
A communicate with one another by resorting to shared data
A share data
A name the recipient or sender of the message
Q Which is not an examples of state information ?
A Mounting information
A Description of HDD space
A Session keys
A Lock status
Q Which policy used in load balancing algorithm
A standard policy
A variant policy
A location policy
A random policy
Q Select the correct sequence for process migration
freezing the process- Transfer the process- forward the message- communicate
A between cooperating process
Transfer the process- forward the message- communicate between cooperating
A process-freezing the process
forward the message- communicate between cooperating process-freezing the process-
A Transfer the process
communicate between cooperating process-freezing the process- Transfer the process-
A forward the message
____ can be defined as a lightweight process, a part of process which is to be
Q executed sequentially on one core
A method
A Thread
A virtualization
A client server
Q _____ is defined as that feeling something when it is not actually present
A method
A Thread
A virtualization
A client server
Q What is common problem found in distributed system ?
A Process Synchronization
A Communication synchronization
A Deadlock problem
A Power failure
What are the advantages of token(with rings) passing approach ? I. One processor as
coordinator which handles all requests II. No starvation if the ring is unidirectional III.
There are many messages passed per section entered if few users want to get in
section IV. One processor as coordinator which handles all requests V. Only one
Q message/entry if everyone wants to get in
A I, II and V
A I, II and IV
A II, III and IV
A II, IV and V
Q Which are the two complementary deadlock-prevention schemes using time stamps ?
A The wait-die & wound-wait scheme
A The wait-n-watch scheme
A The wound-wait scheme
A The wait-wound & wound-wait scheme
In wound-wait If a young process wants a resource held by an old process, the young
Q process will _____
A Killed
A Wait
A Preempt
A Restarts and wait
Q Election message is always sent to the process with _______
A Lower numbers
A Waiting processes
A Higher numbers
A Requesting Lower number of resources
Which algorithms are used for selecting a process to act as coordinator or sequencer?
I. Centralized algorithm II. Election algorithm III. Ring algorithm IV. Chandy-Misra-
Q Haas algorithm
A II and IV
A II, III, IV
A II and III
A II
Q What is interprocess communication?
A communication within the process
A communication between two process
A communication between two threads of same process
A Comunication of process
_____________ enables the migration of the virtual image from one physical
Q machine to another.
A Visualization
A Virtualization
A Migration
A Virtual transfer
Q If one thread opens a file with read privileges then ___________
A other threads in the another process can also read from that file
A other threads in the same process can also read from that file
A any other thread can not read from that file
A all of the mentioned
MODULE 5
Q A replica set can have only ________ primary.
A One
A two
A three
A zero
Q Two types of subscriptions present for replication is _____________
A push and pull
A throw and pull
A push and throw
A Pull and throw
Q _________ class contains an implementation of a proxy.
A client
A server
A RMI
A object
Q In GFS, Chunk replicas are created for three reasons: ___________________
A chunk creation, re-replication, and rebalancing
A chunk deletion, re-replication, and rebalancing
A chunk creation, re-replication, and resharing
A chunk creation, chunk deletion, and rebalancing
Hide differences in data representation and how a resource is accessed” which type of
Q transparency is this?
A Relocation
A Failure
A Concurrency
A Access
Q Logical extension of computation migration is
A process migration
A system migration
A thread migration
A data migration
Q Processes on the remote systems are identified by ___________
A host ID
A host name and identifier
A identifier
A process ID
Q To what extent inconsistencies can be tolerated depends highly on the usage of a
A replication
A duplication
A resource
A data
The ----------- of distributed system is determined primarily by the degree to which
new resource- sharing services can be added and be made available for use by a
Q variety of client programs
A Openness
A Resource Sharing
A Transparency
A Scalability
Q Hide that a resource is replicated is known as___________transparency
A Replication
A Location
A Migration
A Relocation
Q Hide the failure and recovery of a resource is known as which transparency
A Failure
A Location
A Migration
A Relocation
Q Hide where a resource is located which type of transparency is this?
A Location
A Migration
A Relocation
A Access
Q What is WPA?
A wi-fi protected access
A wired protected access
A wired process access
A wi-fi process access
Q Which is not an examples of state information ?
A Mounting information
A Description of HDD space
A Session keys
A Lock status
Q What are the advantages of file replication ?
A Improves availability &performance
A Decreases performance
A They are consistent
A Improves speed
The portion of the process scheduler in an operating system that dispatches
Q processes is concerned with ____________
A assigning ready processes to CPU
A assigning ready processes to waiting queue
A assigning running processes to blocked queue
A assigning new processes to cpu
Q What are the characteristics of data migration?
A transfer data by entire file or immediate portion required
A transfer the computation rather than the data
A execute an entire process or parts of it at different sites
A execute limited portion of data
Q What are the characteristics of process migration?
A transfer data by entire file or immediate portion required
A transfer the computation rather than the data
A execute an entire process or parts of it at different sites
A execute limited portion of data
Q Which one of the following is not shared by threads?
A program counter
A stack register
A program counter and stack
A register
Q A process can be ___________
A single threaded
A tripalthreaded
A single threaded and multithreaded
A doublethreaded
Q Replication should be used when which of the following exist?
When transmission speeds and capacity in a network prohibit frequent refreshing
A of large tables.
When using many nodes with different operating systems and DBMSs and database
A designs.
A The application's data can be somewhat out-of-date.
A When using some nodes with selected operating system.
Storing a separate copy of the database at multiple locations is which of the
Q following?
A Data Replication
A Horizontal Partitioning
A Vertical Partitioning
A Horizontal and Vertical Partitioning
Q A distributed database is which of the following?
A single logical database that is spread to multiple locations and is interconnected
A by a network
A loose collection of file that is spread to multiple locations and is interconnected
A by a network
A A single logical database that is limited to one location.
A A loose collection of file that is limited to one location.
Q Which of the following is a disadvantage of replication?
A Reduced network traffic
A If the database fails at one site, a copy can be located at another site.
A Each site must have the same storage capacity.
A Each transaction may proceed without coordination across the network.
Message passing provides a mechanism to allow processes to communicate and to
Q synchronize their actions ________
A By sharing the same address space
A without sharing the same address space
A by sharing the same Process Identifier
A by sharing the same process number
Q Which layer is the layer closest to the transmission medium ?
A Physical
A Data link
A Network
A Transport
Q A group server is responsible for_______ & ________ groups
A clean and deduct
A program and make funtional
A create and destroy
A advance and fail
TCP is reliable _______ protocol which supports reliable point to point
Q communication in distributed system.
A network
A transport
A communication
A system
Q Communication channels may suffer through
A protocol
A transport
A arbitrary failures
A reliable communication
Q Arbitrary failure may ouccur in form of
A duplicate message
A protocol
A reliable communication
A address spacde
Q SRM protocol stands for
A Scalable Reliable Multispreading
A Scalable Recovery Multicasting
A Scalable Reliable Multicasting
A Scalable Recovery Multispreading
Q In RPC system, which of the following failure may not occur
A The client cannot locate server
A The client crashes after sending a request
A The server crashs after receiving a request
A The request message from the client to the server is obtained
MODULE 6
Q Google was born out of a research project at Standford with the company launched in
A 1995
A 1992
A 1997
A 1998
Q In global google sysytem The user can expect query result in
A 0.7 seconds
A 0.4 seconds
A 0.2 seconds
A 0.8 seconds
to locate and retrieve the contents of the web and pass the content onto the indexing
Q subsystem. Performed by a software called
A Googlebot.
A Gobot.
A bot.
A lebot.
Q In global google sysytem indexing define as
A index for the contents of the web that is similar to an index at the back of a book
A Serial nos
A Serial nos in parrallel
A index of data
In global google system index of links is also
Q maintained to keep track of
A links to a given site
A links of user
A links to programs
A links of user queries
Q In global google system Ranking algorithm is called
A SyatemRank
A LinkRank
A PageRank
A IPRank
In global google system offering application-level software over the Internet
Q as
A web application
A user application
A link application
A system application
Q With the launch of Google App Engine, Google went beyond _____________.
A software as a service
A service provider
A quality as a service
A data as a service
Q Other organizations are able to run their ______________on the Google platform.
A own web applications
A own services
A own queries
A own network programs
These are sample MCQs to indicate pattern, may or may
not appear in examination
G.M. VEDAK INSTITUTE OF TECHNOLOGY
Note to the students:- All the Questions are compulsory and carry equal marks .
dynamic condition
A 0
race condition
A 1
essential condition
A 0
A critical condition 0
You are synchronizing your clock from a time server using NTP
and observe the following times: [4 points] a. timestamp at
client when the message leaves the client: 6:22:15.100 b.
timestamp at which the server receives the message:
Q M
7:05:10.700 c. timestamp at which the server sends the reply:
7:05:10.710 d. timestamp at client when the message is
received at client: 6:22:15.250 To what value do you set the
client's clock?
A 07:05:10.780 1
A 08:05:10.780 0
A 09:05:10.780 0
A 10:05:10.780 0
Suppose that two processes detect the demise of the
Q coordinator simultaneously and both decide to hold an election M
using the bully algorithm. What happens?
Each of the higher-numbered processes will get two ELECTION
A messages, but will ignore the first one. The election will 1
proceed as usual
Each of the lower-numbered processes will get two ELECTION
A messages, but will ignore the first one. The election will 0
proceed as usual
Each of the lower-numbered processes will get two ELECTION
A messages, but will ignore the second one. The election will 0
proceed as usual
Each of the higher-numbered processes will get two ELECTION
A messages, but will ignore the second one. The election will 0
proceed as usual
What is the advantage of a vector clock over Lamport's logical
Q M
clock?
A Catch causality 1
A avoid deadlock 0
A avoid linear relationship 0
A set nonlinear relationship 0
___algorithm for coordinator election assumes that no process
Q can fail during the election procedure until the new M
coordinator has been selected.
bully algorithm
A 1
Ring algorithm
A 0
A Lamport algorithm 0
A Suzuki Kasami algorithm 0
A client's clock reads 3:20:00. The server's clock reads 3:10:00
when they synchronize using the Berkeley algorithm. Assume
message delays are negligible. What is the time at the client
Q after M
synchronization?
A 03:15 1
A 04:15 0
A 05:15 0
A 06:15 0
A client's clock reads 3:20:00. The server's clock reads 3:10:00
when they synchronize using Cristian's algorithm. Assume
message
Q M
delays are negligible. What is the time at the client after
synchronization?
A 03:20:00 0
A 03:05:00 0
A 03:15:00 0
A 03:10:00 1
Q The ring election algorithm works by: M
Having all nodes in a ring of processors send a message to a
coordinator who will elect the leader.
A 0
I
A 0
A I and III 0
III and IV
A 0
A I and II 1
What are the advantages of token(with rings) passing
approach ? I. One processor as coordinator which handles all
requests II. No starvation if the ring is unidirectional III. There
are many messages passed per section entered if few users
Q M
want to get in section IV. One processor as coordinator which
handles all requests V. Only one message/entry if everyone
wants to get in
I, II and V
A 0
I, II and IV
A 1
II, III and IV
A 0
A II, IV and V 0
Single coordinator approach has the following advantages :
Q M
Simple implementation
A 0
Simple deadlock handling
A 0
Bottleneck
A 0
A All of the mentioned 1
Which are the two complementary deadlock-prevention
Q M
schemes using time stamps ?
The wait-die & wound-wait scheme
A 1
The wait-n-watch scheme
A 0
The wound-wait scheme
A 0
A The wait-wound & wound-wait scheme 0
If an old process wants a resource held by a young process, the
Q M
old one will wait happens in _______
Wait-die
A 0
Wound-wait
A 1
Both
A 0
A None of the mentioned 0
In wound-wait If a young process wants a resource held by an
Q M
old process, the young process will _____
Killed
A 0
Wait
A 1
Preempt
A 0
A Restarts and wait 0
Q Election message is always sent to the process with _____ M
Lower numbers
A 0
Waiting processes
A 0
Higher numbers
A 1
A Requesting Lower number of resources 0
Which algorithms are used to handle mutual exclusion in
Q M
distributed systems?
Centralized
A 0
Distributed
A 0
Token ring
A 0
A All of the mentioned 1
Which algorithms are used for selecting a process to act as
coordinator or sequencer? I. Centralized algorithm II. Election
Q M
algorithm III. Ring algorithm IV. Chandy-Misra-Haas algorithm
II and IV
A 0
II, III, IV
A 0
II and III
A 1
A II 0
Q What is UTC ? M
Universal Centralized Time
A 0
Unique Coordinated Time
A 0
Universal Coordinated Time
A 1
A Unique Centralized Time 0
Q In Cristian algorithm the time sever is ____ M
Passive
A 1
Active
A 0
Some internal passive some interval active
A 0
A None of the mentioned 0
What are the problems of clock synchronization in distributed
operating systems ? I. Processses make decision based only on
local information II. The relevent information is scattered
Q among multiple machines III. A single point of failure in the M
system should be avoided IV. No common clock or other
precise global time source exists
Clock drift
A 1
Clock skew
A 0
A None of the mentioned 0
In ________________________ each node periodically sends a
Q M
message to the time server.
Passive Time Server Centralized Algorithm
A 1
Active Time Server Centralized Algorithm
A 0
Global Averaging Distributed Algorithms
A 0
A Localized Averaging Distributed Algorithms 0
Q Cristian’s Algorithm is _____ M
Passive Time Server Algorithm
A 1
Active Time Server Algorithm
A 0
both (a) and (b)
A 0
A None of the mentioned 0
Q Berkeley Algorithm is ________ M
Passive Time Server Algorithm
A 0
Active Time Server Algorithm
A 1
both (a) and (b)
A 0
Critical section
A 0
Deadlock
A 0
Message passing
A 0
A Mutual Exclusion 1
In which algorithm, One process is elected as the coordinator.
Q M
Distributed mutual exclusion algorithm
A 0
Centralized mutual exclusion algorithm
A 1
Token ring algorithm
A 0
A None of the mentioned 0
When resources have multiple instances ________ is used for
Q M
deadlock Avoidance.
Bankers algorithm
A 1
Resource Allocation Graph
A 0
Semaphores
A 0
A All of these 0
Q The Bankers algorithm is used ______ M
to prevent deadlock
A 1
to rectify deadlock
A 0
to detect deadlock
A 0
A to solve deadlock 0
In ____ only one process at a time is allowed into its critical
Q section, among all processes that have critical sections for the M
same resource.
Mutual Exclusion
A 1
Synchronization
A 0
Deadlock
A 0
A Starvation 0
____are useful for the enforcement of mutual exclusion and also
Q provide an effective means of inter-process communication. M
Semaphores
A 0
Messages
A 1
Monitors
A 0
A Addressing 0
A ___ is a software module consisting of one or more
Q M
procedures, an initialization sequence, and local data.
monitor
A 1
message passing
A 0
strong semaphore
A 0
A binary semaphore 0
____lends itself to implementation in distributed systems as
Q well as in shared-memory multiprocessor and uni-processor M
system.
monitor
A 0
message passing
A 1
strong semaphore
A 0
A binary semaphore 0
State whether the following statements are correct for the
characteristics of monitor
i) The local data variables are accessible not only by the
monitors’ procedures but also by the external procedure.
Q ii) A process enters the monitor by invoking one of its M
procedures.
iii) Only one process may be excluded in the monitor at a time.
i and ii only
A 0
ii and iii only
A 1
i and iii only
A 0
A All i, ii and iii 0
____are used for signaling among processes and can be readily
Q M
used to enforce a mutual exclusion discipline.
Semaphores
A 1
Messages
A 0
Monitors
A 0
A Addressing 0
In distributed systems, a logical clock is associated with
Q M
_____________
each instruction
A 0
each process
A 1
each register
A 0
A none of the mentioned 0
In distributed systems, what will the transaction coordinator
Q M
do?
starts the execution of transaction
A 0
breaks the transaction into number of sub transactions
A 0
coordinates the termination of the transaction
A 0
A all of the mentioned 1
Q In distributed systems, transaction coordinator M
starts the execution of transaction
A 0
breaks the transaction into number of sub transactions
A 0
coordinates the termination of the transaction
A 0
A all of the mentioned 1
What are the characteristics of tightly coupled system ? i)
Different clock
Q ii) Use communication links M
iii) Same clock
iv) Distributed systems
i
A 0
i and iv
A 0
i, ii and iii
A 0
A ii, iii and iv 1
Which of the following variable wait within the to enable a
Q M
process
a condition is defined by a condition variable
A 1
objects Boolean objects can be used by condition variables
A 0
i
A 0
ii and iii
A 0
i, ii and iii
A 0
A i, ii and iv 1
In which the access takes place when different processes try to
access the same data concurrently and the outcome of the
Q M
execution depends on the specific order, is called
dynamic condition
A 0
race condition
A 1
essential condition
A 0
A critical condition 0
Q A semaphore is a shared integer variable that can not M
drop below zero
A 1
be more than zero
A 0
drop below one
A 0
A that cannot be more than one 0
Which of the following for Mutual exclusion can be provided by
Q M
the
mutex locks
A 0
binary semaphores
A 0
both mutex locks and binary semaphores
A 1
A none of the mentioned 0
When high priority task is indirectly preempted by medium
Q M
priority the scenario is called
priority inversion
A 1
priority removal
A 0
priority exchange
A 0
A priority modification 0
A monitor is a module and monitor which of the following can
Q M
encapsulates
shared data structures
A 0
procedures that operate on shared data structure
A 0
synchronization between concurrent procedure invocation
A 0
dynamic condition
A 0
race condition
A 1
essential condition
A 0
A critical condition 0
You are synchronizing your clock from a time server using NTP
and observe the following times: [4 points] a. timestamp at
client when the message leaves the client: 6:22:15.100 b.
timestamp at which the server receives the message:
Q M
7:05:10.700 c. timestamp at which the server sends the reply:
7:05:10.710 d. timestamp at client when the message is
received at client: 6:22:15.250 To what value do you set the
client's clock?
A 07:05:10.780 1
A 08:05:10.780 0
A 09:05:10.780 0
A 10:05:10.780 0
Suppose that two processes detect the demise of the
Q coordinator simultaneously and both decide to hold an election M
using the bully algorithm. What happens?
Each of the higher-numbered processes will get two ELECTION
A messages, but will ignore the first one. The election will 1
proceed as usual
Each of the lower-numbered processes will get two ELECTION
A messages, but will ignore the first one. The election will 0
proceed as usual
Each of the lower-numbered processes will get two ELECTION
A messages, but will ignore the second one. The election will 0
proceed as usual
Each of the higher-numbered processes will get two ELECTION
A messages, but will ignore the second one. The election will 0
proceed as usual
What is the advantage of a vector clock over Lamport's logical
Q M
clock?
A Catch causality 1
A avoid deadlock 0
A avoid linear relationship 0
A set nonlinear relationship 0
___algorithm for coordinator election assumes that no process
Q can fail during the election procedure until the new M
coordinator has been selected.
bully algorithm
A 1
Ring algorithm
A 0
A Lamport algorithm 0
A Suzuki Kasami algorithm 0
A client's clock reads 3:20:00. The server's clock reads 3:10:00
when they synchronize using the Berkeley algorithm. Assume
message delays are negligible. What is the time at the client
Q after M
synchronization?
A 03:15 1
A 04:15 0
A 05:15 0
A 06:15 0
A client's clock reads 3:20:00. The server's clock reads 3:10:00
when they synchronize using Cristian's algorithm. Assume
message
Q M
delays are negligible. What is the time at the client after
synchronization?
A 03:20:00 0
A 03:05:00 0
A 03:15:00 0
A 03:10:00 1
Q The ring election algorithm works by: M
Having all nodes in a ring of processors send a message to a
coordinator who will elect the leader.
A 0
Sending a token around a set of nodes. Whoever has the token
is the coordinator.
A 0
A Token Ring. 0
Q=QUESTION question_description question_explanationquestion_type question_difficulty
A=ANSWER answer_description answer_explanation answer_isright answer_position