Please cross check my answers and let me know if any question is wrong, I will c
ID: 3852684 • Letter: P
Question
Please cross check my answers and let me know if any question is wrong, I will change the answer
1. Which network device is responsible for connecting end nodes (computers) to the network ?
· Switch
· Router
· VPN
· Firewall
· Proxy
2. In peer to peer systems which indexing methodology reduces the limits to horizontal peer scaling?
· Distributed Hash Tables
· Centralized
· Random Walk
· Query Flood
3. Which of the following is general not supported with in the message queue form of indirect communication
· Blocking Receive
· Non-Blocking Receive
· Notify
· Non-Blocking Send
4. Which publish/subscribe event routing methodology employs group membership in its routing topology
· Flood
· Filtering
· Informed Gossip
· Rendezvous
5. Which of the publish/subscribe overlay network methodology most resembles a peer-to-peer arrangement
· Group Multicast
· DHT
· Gossip
· Broker
46. Which of the following are difference between RPC and RMI?
· Typically structured atop request/reply method
· Offer similar levels of transparency
· Use the full expressive power of the object oriented programming model
· Support programming with interfaces
7. Which of the following are true about distributed systems models
Physical models are an absolute representation of the hardware and software composition
Architectural models represent the computational and communication tasks of the system
Fundamental models represent an abstract perspective of the behavior of the system
Temporal models represent the context of time and the operating entities of the system
8. Which of the following are not consequences of resource sharing in distributed systems?
Concurrency
Message Transmission
Independent Failures
No Global clock
9. Which of the following are true about TCP
Fixed Size
Guaranteed Delivery
Guaranteed Send Order
Bandwidth Efficient
10. Which of the remote invocation methodologies best mimics the human interactive nature of the web
Remote Method Invocation
Remote Procedure Call
Request/Reply
11. Indirect communication paradigms are closely related to which coupling methodology
space coupled / time coupled
space coupled / time uncoupled
space uncoupled / time uncoupled
· space uncoupled / time uncoupled
12. What is the application software defined entry/exit point for interprocess communication?
Socket
Port
Endpoint
Interface
13. Which network device limits external traffic to the internal network?
Switch
Router
VPN
Proxy
Firewall
14. Which indirect communication paradigm supports a one-to-one relationship with the sender and receiver?
Publish/Subscribe
Message Queue
Group Membership
Shared Memory
15. What is the operating system software entry and exit point for interprocess communication
Socket
Port
Endpoint
Interface
16. The remote invocation methodologies of Request/Reply,Remote Procedure Call/Remote Method Invocation are implemented as which of the following
Asynchronous / Direct
Asynchronous / Indirect
Synchronous / Direct
Synchronous / Indirect
17. Which of the following are true about REST (Representational State Transfer)
Always contain XML
Are client-server
Are Stateless
Provide a uniform interface
18. A service oriented architecture (SOA) aligns services (web) with
Technical strategy
Business Value
Implementation effectiveness
Location Transparency
19. Which of the following are true about SOAP (Simple Object Access Protocol)
Contains XML headers and bodies
Contains directives for message processing
Contains layout tags
Can contain encrypted sections
20. Which of the following are characteristics of paravirtualization ?
Multiple O/S Guests per Host
Same O/S Guests per Host
Streamlined Hardware Invocation
Modified Guest Kernel
Emulated Hardware Invocation
· Potential License Savings on Guests
21. RPC (Remote Procedure Call) is
Direct Communication
Time uncoupled
Space Coupled
Asynchronous
22. Which network device is responsible for connecting the local area network to the internet?
Switch
Router
VPN
Firewall
Proxy
23. Which of the remote invocation methodologies best align with the context of object oriented programming
Request/Reply
Remote Procedure Call
Remote Method Invocation
24. Which of the following are characteristics of cloud computing
Massive Scale
Maximize Resource Utilization
Network Tolerance
On Demand Access
Space Uncoupled
Data Intensive
25. Which of the following indexing methodologies produces the most network bandwidth for peer to peer networks?
DHT
Random Walk
Query flood
Centralized
26. Which of the following are characteristics of "FULL" of virtualization ?
Multiple O/S guests per host
Same O/S Guests per host
Streamlined Hardware Invocation
Modified Guest Kernel
Emulated Hardware Invocation
Potential Licensing Savings on Guests
27. Which of the following is true about the tenants of transperancy
Access transparency may conflict with security
Mobility transparency may conflict with replication
Location transparency may conflict with scaling
Concurrency transparency may conflict with performance
28. What is middleware
A layer of software to mask heterogeniety
A medium in which to connect end points
A way to connect hardware and software
· Supports abstraction for process communication
29. What is the difference between tiered and layered architectures
Tiered deals with vertical organization of abstraction
Layering deals with placement of functionality across hosts or nodes
Tiered deals with the application stacks
Layering deals with the placement of nodes
Tiered deals with the placement of applications across layers
Layered deals with the placement of application across Tiers
30. Which of the following are benefits of a monolithic kernel?
Easier to Maintain
Efficient Execution
Dynamic Code
Mature Code
31. In Naptster's music sharing service which of the following are NOT true?
Changed the dynamics of music and media distribution for ever
The courts would hold Napster liable for its centralized music indexing and ultimately force the closure of the service
Responses to Napster download queries were guaranteed
Napster's network overlay compensated for fluctuations in network dynamics
apster demonstrated one of the first at scale storage systems
32. Which of the following protocols assists in the routing of messages in a packet-switched network?
NAT
RIP
TCPIP
VLAN
ARP
33.Which of the following defines network latency?
The time from the start of the transmission to the end of the receipt of the transmission
The time from the end of the send of the transmission to the beginning of the receipt of the transmission
The time from the start of the transmission to the beginning of the receipt of the transmission
The time from the end of the send of the transmission to the end of the receipt of the transmission
34. Which object oriented principles are distributed objects built on
encapsulation
constraint
data abstraction
regular expression
object classification
35. Asynchronous communication is
A reliable form of communication
Time-Uncoupled
A direct form of communcation
Space coupled
36. Which networking device extends an internal network beyond the security perimeter
Firewall
Proxy
VPN
Switch
Router
37. Which of the following are characteristics of OS Partitioning Style of Virtualization
Multiple O/S guests per host
Same O/S Guests
Streamlined Hardware Invocation
Modified Guest Kernel
Emulated Hardware Invocation
Potential Licensing Savings on Guests
38.Interprocess communication in distributed systems can warrant multicast in which of the following cases
when messages require guaranteed delivery
when multiple event are to be delivered to multiple recipients
when messages require send order
when a single message is to be delivered to multiple recipients
39. Which of the following are benefits of a micro kernel ?
Easier to Maintain
Efficient Execution
Dynamic Code
Mature Code
40. Which of the following are true about UDP
Variable size
Guaranteed Delivery
Guaranteed Send Order
Bandwidth Efficient
· Switch
· Router
· VPN
· Firewall
· Proxy
Explanation / Answer
1. In data communication, a physical network node may either be a data communication equipment (DCE) such as a modem, hub, bridge or switch; or a data terminal equipment (DTE) such as a digital telephone handset, a printer or a host computer, for example a router, a workstation or a server. So correct answer is option B. Router.
2. Distributed Hash Tables
The ability for an increasing number of organizations or users to easily share a single distributed system. The ability for a distributed system to easily expand and contract its resource pool to accommodate heavier or lighter loads or number of inputs. Alternatively, the ease with which a system or component can be modified, added, or removed, to accommodate changing load.
3. Blocking Device.
4. Publish/subscribe event routing methodology employs group membership in its routing topology Flood.
5. Publish/subscribe overlay network methodology most resembles a peer-to-peer arrangement Gossip.
6. Difference between RPC and RMI are-
Use the full expressive power of theobject oriented programming model.
7. True fct about distributed systems models are--
a. Physical models are an absolute representation of the hardware and software composition.
b. Architectural models represent the computational and communication tasks of the system.
c. Fundamental models represent an abstract perspective of the behavior of the system.
8. Message Transmission is not consequences of resource sharing in distributed systems.
9. True fact about TCP are --
a. Guaranteed Delivery
b. Guaranteed Send Order
c. Bandwidth Efficient
10. Remote invocation methodologies best mimics the human interactive nature of the web is -
Request/Reply
11. Indirect communication paradigms are closely related to which coupling methodology-
space uncoupled / time uncoupled
12. The application software defined entry/exit point for interprocess communication is --
Interface
13. Network device limits external traffic to the internal network is --
Firewall
14. Indirect communication paradigm supports a one-to-one relationship with the sender and receiver --
Group Membership
15. Operating system software entry and exit point for interprocess communication is --
Interface
16. The remote invocation methodologies of Request/Reply,Remote Procedure Call/Remote Method Invocation are implemented as which of the following --
Synchronous / Direct
17. True about REST (Representational State Transfer)
Are Client-Server
18. A service oriented architecture (SOA) aligns services (web) with --
Implementation effectiveness
19. True about SOAP (Simple Object Access Protocol) are --
a. Contains XML headers and bodies
b. Contains directives for message processing
c. Can contain encrypted sections
20. Characteristics of paravirtualization are --
a. Multiple O/S Guests per Host
b. Same O/S Guests per Host
c. Modified Guest Kernel
21. RPC (Remote Procedure Call) is --
Direct Communication
22. Network device is responsible for connecting the local area network to the internet is-
Router
23. Which of the remote invocation methodologies best align with the context of object oriented programming --
Remote Method Invocation
24. Which of the following are characteristics of cloud computing
a. Massive Scale
b. Maximize Resource Utilization
c. Network Tolerance
d. On Demand Access
25. Which of the following indexing methodologies produces the most network bandwidth for peer to peer networks?
DHT
26. Which of the following are characteristics of "FULL" of virtualization ?
a. Multiple O/S guests per host
b. Same O/S Guests per host
c. Streamlined Hardware Invocation
d. Potential Licensing Savings on Guests
27. Which of the following is true about the tenants of transperancy --
Concurrency transparency may conflict with performance
28. What is middleware --
A medium in which to connect end points
29. What is the difference between tiered and layered architectures --
a. Tiered deals with vertical organization of abstraction
b. Layering deals with placement of functionality across hosts or nodes
30. Which of the following are benefits of a monolithic kernel?
Easier to Maintain
31. In Naptster's music sharing service which of the following are NOT true?
Napster's network overlay compensated for fluctuations in network dynamics
32. Which of the following protocols assists in the routing of messages in a packet-switched network?
TCPIP
33.Which of the following defines network latency?
The time from the start of the transmission to the end of the receipt of the transmission
34. Which object oriented principles are distributed objects built on
object classification
35. Asynchronous communication is
Time-Uncoupled
36. Which networking device extends an internal network beyond the security perimeter
VPN
37. Which of the following are characteristics of OS Partitioning Style of Virtualization
a. Multiple O/S guests per host
b. Streamlined Hardware Invocation
c. Emulated Hardware Invocation
38.Interprocess communication in distributed systems can warrant multicast in which of the following cases
when multiple event are to be delivered to multiple recipients
39. Which of the following are benefits of a micro kernel ?
a. Easier to Maintain
b. Efficient Execution
c. Dynamic Code
40. Which of the following are true about UDP --
Variable size
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.