Imp Objective
Imp Objective
A. Bully Algorithm
B. Ricart-Agrawala Algorithm
C. Dijkstra's Algorithm
D. ALOHA Protocol
→ Correct Answer: B
B. The coordinator
D. A random process
→ Correct Answer: C
A. Safety
B. Fairness
C. Fault Tolerance
D. Liveness
→ Correct Answer: C
A. A single destination
B. All nodes
D. Random nodes
→ Correct Answer: C
The FLP Impossibility result states that:
→ Correct Answer: C
A. Consistency
B. Isolation
C. Atomicity
D. Durability
→ Correct Answer: C
A. Two-Phase Locking
B. Timestamp Ordering
D. Strict Locking
→ Correct Answer: C
→ Correct Answer: B
Which of the following is a pessimistic concurrency control method?
A. Versioning
B. Timestamp ordering
D. Lock-based protocol
→ Correct Answer: D
A. Two-Phase Locking
B. Two-Phase Commit
C. Wait-Die
D. Timeouts
→ Correct Answer: B
A. It is not atomic
B. It allows deadlocks
→ Correct Answer: C
A. Timestamp ordering
→ Correct Answer: B
Which property of transactions ensures that once committed, changes are not lost?
A. Atomicity
B. Consistency
C. Durability
D. Isolation
→ Correct Answer: C
A. Have sub-transactions
→ Correct Answer: C
A. Logical clocks
B. Physical clocks
C. Transaction timestamps
D. Wait-for graphs
→ Correct Answer: C
→ Correct Answer: C
Which of the following ensures that a replicated system continues functioning despite some
failures?
A. Load balancing
B. Fault tolerance
C. Caching
D. Encryption
→ Correct Answer: B
→ Correct Answer: C
A. Compress data
B. Allocate memory
→ Correct Answer: C
Which consistency model requires all processes to see memory operations in the same order?
A. Weak consistency
B. Causal consistency
C. Strict consistency
D. Eventual consistency
→ Correct Answer: C
Which of the following is not a design issue in Distributed Shared Memory?
A. Transparency
B. Memory allocation
C. Message formatting
D. Consistency maintenance
→ Correct Answer: C
Which type of replication updates one replica and then propagates the update to others?
A. Synchronous
B. Asynchronous
C. Broadcast
D. Round-robin
→ Correct Answer: B
→ Correct Answer: B
→ Correct Answer: B
Which of the following is true about transactions on replicated data?
→ Correct Answer: B
The ________ algorithm allows processes to request permission from all others before entering
the critical section.
→ Ricart-Agrawala
In the ________ algorithm, the process with the highest ID is selected as the coordinator.
→ Bully
→ Multicast
The problem of reaching agreement among distributed processes is known as the ________
problem.
→ Consensus
________ ensures that only one process is allowed to access a critical section at a time in a
distributed system.
→ Mutual exclusion
→ ACID
In ________ concurrency control, transactions proceed without restrictions and are validated
before commit.
→ Optimistic
→ Nested
→ Two-Phase Commit
Locks that allow multiple transactions to read a data item simultaneously are called ________
locks
→ Shared
→ Timestamp
A ________ occurs when two or more transactions wait indefinitely for one another to release
locks.
→ Deadlock
→ Distributed
________ control ensures multiple transactions can occur without interfering with each other.
→ Concurrency
→ Recovery
Replication improves system ________ by maintaining copies of data across nodes.
→ Availability
________ replication ensures all replicas execute operations in the same order.
→ Active
→ Strict
→ Reliable
In distributed systems, ________ services can continue operating correctly even when some
components fail.
→ Fault-tolerant
→ Eventual
A key implementation issue in DSM is managing ________, which keeps memory state
synchronized across nodes.
→ Consistency
→ Asynchronous
________ memory in DSM appears as a single memory space to all processes, though it's
distributed.
→ Shared
Transactions on replicated data must follow ________ control rules to maintain database
integrity.
→ Concurrency