Anda di halaman 1dari 5

RAJALAKSHMI ENGINEERING COLLEGE

DEPARTMENT OF INFORMATION TECHNOLOGY


Subject Code: CS6601

Subject Name: Distributed Systems

Regulation:

Year/Class: III/IT B

2013

Introduction about the Activity:

A Quiz shall consist of a series of questions to be asked alternately to each team. Each
Quiz team shall consist of up to 10 students.
Questions shall be read once only and a team shall have 10 seconds in which to
answer the question.
The first answer given by a team to any question shall be the only accepted.
Team members may confer with each other on any question and any member of the
team may answer the question.
A team shall be awarded 2 points for each correct answer and 0 points for each
incorrect answer.
If a team fails to answer a question or answers it incorrectly, its opponent shall be
allowed to attempt an answer within a time limit of 2 seconds.
If the opponent team answers correctly, it shall be awarded 1 bonus point.
The team with the highest number of points at the end of the game shall be the winner.
If teams are tied after the initial series of questions, they shall be asked 3 tie-breaker
questions each following the rules above.

Activity Questions and Answers:


1. If one site fails in distributed system
a) the remaining sites can continue operating
b) all the sites will stop working
c) directly connected sites will stop working
d) none of the mentioned
Answer:a.
2. Which routing technique is used in distributed system?
a) fixed routing
b) virtual routing
c) dynamic routing
d) all of the mentioned
Answer:d

3. In distributed systems, link and site failure is detected by


a) polling
b) handshaking
c) token passing

d) none of the mentioned


Answer:b
4. The capability of a system to adapt the increased service load is called
a) scalability
b) tolerance
c) capacity
d) none of the mentioned
Answer:a
5. Internet provides _______ for remote login.
a) telnet
b) http
c) ftp
d) RPC
Answer:a
6. What are the different ways in which clients and servers are dispersed across
machines ? (Choose Two)
a) Servers may run on dedicated machines
b) Servers and clients can be on same machines
c) Distribution cannot be interposed between a OS and the file system
d) OS cannot be distributed with the file system a part of that distribution
Answer : a & b
7. What are the characteristics of a DFS? (Choose Two)
a) login transparency and access transparency
b) Files need not contain information about their physical location
c) No Multiplicity of users
d) No Multiplicity if files
Answer : a & b
8) Which of the following delay is faced by the packet in travelling from one end system
to another ?
a) Propagation delay
b) Queuing delay
c) Transmission delay
d) All of the mentioned
Answer: d
9) In a network, If P is the only packet being transmitted and there was no earlier
transmission, which of the following delays could be zero
a) Propogation delay
b) Queuing delay
c) Transmission delay

d) Processing delay
Answer: b
10) Transmission delay does not depend on
a) Packet length
b) Distance between the routers
c) Transmission rate
d) None of the mentioned
Answer: b
11) Propagation delay depends on
a) Packet length
b) Transmission rate
c) Distance between the routers
d) None of the mentioned
Answer: c
12) Which of the following is a form of DoS attack?
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
Answer: d
13) Packet sniffers involve
a) Active receiver
b) Passive receiver
c) Both of the mentioned
d) None of the mentioned
Answer: b
14) Firewalls are often configured to block
a) UDP traffic
b) TCP traffic
c) Both of the mentioned
d) None of the mentioned
Answer: a
15)This allows to check if a domain is available for registration.
a) Domain Check
b) Domain Dossier
c) Domain Lookup

d) None of the mentioned


Answer: a
16) Choose the wrong statement
a) Nslookup is used to query a DNS server for DNS data
b) Ping is used to check connectivity
c) Pathping combines the functionality of ping with that of route
d) Ifconfig can configure TCP/IP network interface parameters
Answer: c
17) When a DNS server accepts and uses incorrect information from a host that has no
authority giving that information, then it is called
a) DNS lookup
b) DNS hijacking
c) DNS spoofing
d) none of the mentioned
Answer:c

18) To join the internet, the computer has to be connected to a


a) internet architecture board
b) internet society
c) internet service provider
d) none of the mentioned
Answer:c
19) Internet access by transmitting digital data over the wires of a local telephone
network is provided by
a) leased line
b) digital subscriber line
c) digital signal line
d) none of the mentioned
Answer:b
20) Internet works on
a) packet switching
b) circuit switching
c) both (a) and (b)

d) none of the mentioned


Answer:a
21) Which protocol assigns IP address to the client connected in the internet?
a) DHCP
b) IP
c) RPC
d) none of the mentioned
Answer:a
22) The IP protocol is primarily concerned with
(a) Routing packets through the network.
(b) Reliable delivery of packets between directly connected machines.
(c) Reliable delivery of large (multi-packet) messages between machines that are not
necessarily directly connected.
(d) Dealing with differences among operating system architectures.
Answer:a
23) A home network router a. makes home computers run faster
b. enables safe sharing of resources among network devices in the home
c. helps people build Web sites
d. connects a computer to a television so that the video can be shared
Answer:b
24) Limewire, Kazaa and Bearshare are all examples of a. brand names of networking hardware products
b. Web sites that store MP3 music files
c. wireless network communication protocols
d. software applications for peer-to-peer (P2P) file sharing
Answer: d
25) A computer must have an IP address when a. connecting to a home network router
b. connecting to a Wi-Fi hotspot
c. communicating with another computer using TCP
d. all of the above
Answer: d

Anda mungkin juga menyukai