Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please cross check my answers and let me know if any question is wrong, I will change the answer 1. Which network device is responsible

Please cross check my answers and let me know if any question is wrong, I will change the answer

1. Which network device is responsible for connecting end nodes (computers) to the network ?

Switch

Router

VPN

Firewall

Proxy

2. In peer to peer systems which indexing methodology reduces the limits to horizontal peer scaling?

Distributed Hash Tables

Centralized

Random Walk

Query Flood

3. Which of the following is general not supported with in the message queue form of indirect communication

Blocking Receive

Non-Blocking Receive

Notify

Non-Blocking Send

4. Which publish/subscribe event routing methodology employs group membership in its routing topology

Flood

Filtering

Informed Gossip

Rendezvous

5. Which of the publish/subscribe overlay network methodology most resembles a peer-to-peer arrangement

Group Multicast

DHT

Gossip

Broker

46. Which of the following are difference between RPC and RMI?

Typically structured atop request/reply method

Offer similar levels of transparency

Use the full expressive power of the object oriented programming model

Support programming with interfaces

7. Which of the following are true about distributed systems models

Physical models are an absolute representation of the hardware and software composition

Architectural models represent the computational and communication tasks of the system

Fundamental models represent an abstract perspective of the behavior of the system

Temporal models represent the context of time and the operating entities of the system

8. Which of the following are not consequences of resource sharing in distributed systems?

Concurrency

Message Transmission

Independent Failures

No Global clock

9. Which of the following are true about TCP

Fixed Size

Guaranteed Delivery

Guaranteed Send Order

Bandwidth Efficient

10. Which of the remote invocation methodologies best mimics the human interactive nature of the web

Remote Method Invocation

Remote Procedure Call

Request/Reply

11. Indirect communication paradigms are closely related to which coupling methodology

space coupled / time coupled

space coupled / time uncoupled

space uncoupled / time uncoupled

space uncoupled / time uncoupled

12. What is the application software defined entry/exit point for interprocess communication?

Socket

Port

Endpoint

Interface

13. Which network device limits external traffic to the internal network?

Switch

Router

VPN

Proxy

Firewall

14. Which indirect communication paradigm supports a one-to-one relationship with the sender and receiver?

Publish/Subscribe

Message Queue

Group Membership

Shared Memory

15. What is the operating system software entry and exit point for interprocess communication

Socket

Port

Endpoint

Interface

16. The remote invocation methodologies of Request/Reply,Remote Procedure Call/Remote Method Invocation are implemented as which of the following

Asynchronous / Direct

Asynchronous / Indirect

Synchronous / Direct

Synchronous / Indirect

17. Which of the following are true about REST (Representational State Transfer)

Always contain XML

Are client-server

Are Stateless

Provide a uniform interface

18. A service oriented architecture (SOA) aligns services (web) with

Technical strategy

Business Value

Implementation effectiveness

Location Transparency

19. Which of the following are true about SOAP (Simple Object Access Protocol)

Contains XML headers and bodies

Contains directives for message processing

Contains layout tags

Can contain encrypted sections

20. Which of the following are characteristics of paravirtualization ?

Multiple O/S Guests per Host

Same O/S Guests per Host

Streamlined Hardware Invocation

Modified Guest Kernel

Emulated Hardware Invocation

Potential License Savings on Guests

21. RPC (Remote Procedure Call) is

Direct Communication

Time uncoupled

Space Coupled

Asynchronous

22. Which network device is responsible for connecting the local area network to the internet?

Switch

Router

VPN

Firewall

Proxy

23. Which of the remote invocation methodologies best align with the context of object oriented programming

Request/Reply

Remote Procedure Call

Remote Method Invocation

24. Which of the following are characteristics of cloud computing

Massive Scale

Maximize Resource Utilization

Network Tolerance

On Demand Access

Space Uncoupled

Data Intensive

25. Which of the following indexing methodologies produces the most network bandwidth for peer to peer networks?

DHT

Random Walk

Query flood

Centralized

26. Which of the following are characteristics of "FULL" of virtualization ?

Multiple O/S guests per host

Same O/S Guests per host

Streamlined Hardware Invocation

Modified Guest Kernel

Emulated Hardware Invocation

Potential Licensing Savings on Guests

27. Which of the following is true about the tenants of transperancy

Access transparency may conflict with security

Mobility transparency may conflict with replication Location transparency may conflict with scaling

Concurrency transparency may conflict with performance

28. What is middleware

A layer of software to mask heterogeniety

A medium in which to connect end points

A way to connect hardware and software

Supports abstraction for process communication

29. What is the difference between tiered and layered architectures

Tiered deals with vertical organization of abstraction

Layering deals with placement of functionality across hosts or nodes

Tiered deals with the application stacks

Layering deals with the placement of nodes

Tiered deals with the placement of applications across layers

Layered deals with the placement of application across Tiers

30. Which of the following are benefits of a monolithic kernel?

Easier to Maintain

Efficient Execution

Dynamic Code

Mature Code

31. In Naptster's music sharing service which of the following are NOT true?

Changed the dynamics of music and media distribution for ever

The courts would hold Napster liable for its centralized music indexing and ultimately force the closure of the service

Responses to Napster download queries were guaranteed

Napster's network overlay compensated for fluctuations in network dynamics

apster demonstrated one of the first at scale storage systems

32. Which of the following protocols assists in the routing of messages in a packet-switched network?

NAT

RIP

TCPIP

VLAN

ARP

33.Which of the following defines network latency?

The time from the start of the transmission to the end of the receipt of the transmission

The time from the end of the send of the transmission to the beginning of the receipt of the transmission

The time from the start of the transmission to the beginning of the receipt of the transmission

The time from the end of the send of the transmission to the end of the receipt of the transmission

34. Which object oriented principles are distributed objects built on

encapsulation

constraint

data abstraction

regular expression

object classification

35. Asynchronous communication is

A reliable form of communication

Time-Uncoupled

A direct form of communcation

Space coupled

36. Which networking device extends an internal network beyond the security perimeter

Firewall

Proxy

VPN

Switch

Router

37. Which of the following are characteristics of OS Partitioning Style of Virtualization

Multiple O/S guests per host

Same O/S Guests

Streamlined Hardware Invocation

Modified Guest Kernel

Emulated Hardware Invocation

Potential Licensing Savings on Guests

38.Interprocess communication in distributed systems can warrant multicast in which of the following cases

when messages require guaranteed delivery

when multiple event are to be delivered to multiple recipients

when messages require send order

when a single message is to be delivered to multiple recipients

39. Which of the following are benefits of a micro kernel ?

Easier to Maintain

Efficient Execution

Dynamic Code

Mature Code

40. Which of the following are true about UDP

Variable size

Guaranteed Delivery

Guaranteed Send Order

Bandwidth Efficient

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Power Bi And Azure Integrating Cloud Analytics For Scalable Solutions

Authors: Kiet Huynh

1st Edition

B0CMHKB85L, 979-8868959943

More Books

Students also viewed these Databases questions

Question

to encourage a drive for change by developing new ideas;

Answered: 1 week ago

Question

4 What are the alternatives to the competences approach?

Answered: 1 week ago