Coming soon.... from FEB 15

Coming soon......

Wednesday, January 5, 2011

MSC IT IV CSA

PART A

Q.1
For multiprocess operating systems, global
space is ____________

A)
Process

B)
Collection of all processes

C)
Same as execution space

D)
Same as execution space



Q.2
MIS in it re engineered organization would be
____

A)
Process centered

B)
Evaluating customer satisfaction

C)
Expectations and perceptions

D)
All the above



Q.3
is used to enable clients to transparently
locate and invoke persistent objects on servers
in the CORBA environment.

A)
orbd

B)
ORB

C)
IDL

D)
DS1



Q.4
A mechanism that allows the distributed
application to maintain it self is ______

A)
Cloning

B)
Ceasing

C)
Leasing

D)
Hashing



Q.5
Two-tier client server architectures are
appropriate alternatives to the three-tier
architecture, during situation

A)
number of users are greater than 100.

B)
number of users are less than 10

C)
number of users are less than 100

D)
number of users are greater than 1000



Q.6
The types of data validations are

A)
Error specification and error execution

B)
Error detection and error execution

C)
Error detection and error correction

D)
Error execution and error correction



Q.7
Which among these is not a type of video
conferencing?

A)
One way video and one way audio

B)
One way video and two way audio

C)
Two way video and two way audio

D)
None of the above



Q.8
________defines a bounded sequence of
not more than 10 strings.

A)
Sequence

B)
String

C)
Sequence
<10, String>

D)
String
<10, Sequence>



Q.9
_______ in CORBA, provides dynamic
dispatch to the objects.

A)
Dynamic Invocation Interface

B)
Dynamic Stub Interface

C)
Dynamic Skeleton Interface

D)
All of the above



Q.10
Which of the following languages interact
well with DCOM?

A)
Micro Focus COBOL

B)
Microsoft Visual Basic

C)
Delphi

D)
All of the above



Q.11
______ DCOM applications can easily scale
from small single processor machines to huge
multiprocessor systems by seamlessly taking
advantage of support for symmetric
multiprocessing.

A)
DOS

B)
Windows NT

C)
Windows 95

D)
Windows 98



Q.12
_____architecture do not easily support
graphical user interfaces or access to multiple
databases from geographically dispersed sites.

A)
Collaborative enterprise architecture

B)
Client/Server

C)
Mainframe

D)
File sharing



Q.13
ODBMS stands for

A)
Open Database Management Service

B)
Object Database Management System

C)
Open Database Management System

D)
Open Database Manipulating Service



Q.14
DCE products are based on the source code
provided by __

A)
Closed Systems Foundation

B)
Open Systems Foundation

C)
Remote Procedure Call

D)
All of the above



Q.15
_______object is one that is not yet
instantiated in a JVM, but which can be brought
into an active state.

A)
Dead

B)
Passive

C)
Live

D)
Open



Q.16
Disadvantage of two-tier architecture is

A)
Different to administer and maintain

B)
Not effective in running batch programs

C)
Cannot service more than 100 users

D)
All of the above



Q.17
RMI uses a standard mechanism for
communicating with remote objects
called______

A)
Skelton

B)
Sub & Proxy

C)
Skelton

D)
None of the above_



Q.18
Messaging provides another technology to
implement 3 tier computing and is available
from ___________ company/companies.

A)
IBM

B)
Sybase

C)
Oracle

D)
All of the above



Q.19
Once a group is created, subsequent calls
to the current group ID method will return tile
identifier for this group until tile group becomes

A)
Inactive

B)
Active

C)
Passive

D)
Dead



Q.20
Architecture is based on object request
broker technology.

A)
Distributive Collaborative enterprise

B)
File sharing

C)
Mainframe

D)
None of the above



Q.21
Server's Main( ) method of server class

A)
Gets the root naming context

B)
Creates and initializes an ORB instance

C)
Waits for invocations of the new object from the client

D)
All of the above



Q.22
____ is the use of optical character
recognition to convert paper to microfilm
records to a digital format for storage in a
secondary storage device for easy retrieval and
processing
<!--[if !supportLineBreakNewLine]-->
<!--[endif]-->

A)
Teleconferencing

B)
Facsimile transmission

C)
Videotex

D)
Imaging



Q.23
In three-tier software architecture, tier
provides process management.

A)
Top laver

B)
Bottom laver

C)
Middle layer

D)
All of the above



Q.24
OMG IDL supports long data type of
___bit.

A)
8

B)
4

C)
32

D)
64


http://smumodelquestion.blogspot.com/

Q.25
_______function creates initializes it from a
file.

A)
CoCreatelnstance(Ex)

B)
CoCreatInstance From File

C)
CoGetInstanceFromFile

D)
CoGetInstanceFromURL



Q.26
_______ component in CORBA ORB
architecture assists ORB with delivering
requests to the object and with activating the
object

A)
ORB Interface

B)
ORB

C)
DSI

D)
Object Adapter



Q.27
Which of the following are RMI system's
client visible interfaces that are available in the
java.rmi package?

A)
Remote Interface

B)
Remote Exception Class

C)
Naming Class

D)
All of the above



Q.28
The study of managing information and its
allied components is referred to as

A)
Internal Resources Management

B)
Advanced Resources Management

C)
Advanced Component Management

D)
Information Resources Management



Q.29
_____ can be passed as an argument to a
remote___ object.

A)
Primitive types

B)
Remote objects

C)
Non-remote objects

D)
All of the above



Q.30
______is a client server architecture
infrastructure that increases the
interoperability, portability and 11cxibility of' an
application by allowing the application to be
distributed over multiple heterogeneous
platforms.

A)
Message Oriented Middleware

B)
Object Oriented Design

C)
Remote Procedure Call

D)
Both A) and C)



Q.31
To specify an exception in IDL, the
interface designer uses _______keyword.

A)
raises

B)
throws

C)
exception

D)
None of the above



Q.32
_______class library enables low level
communication between java IDL applications
and other CORBA-complaint applications.

A)
ORC

B)
BOR

C)
Object Request Broker

D)
Object reply broker



Q.33
___method returns the non-package –
qualified class name of the reference type to be
serialized onto the output stream â€Å“streamout"

A)
ServerRef

B)
getRefClass

C)
Remote ref

D)
Remote class



Q.34
________is a CORBA service that allows
CORBA objects to be named by means of
binding a name to an object reference.

A)
Object naming

B)
Server naming

C)
Both A) and B)

D)
Naming Service



Q.35
_______ is defined as a requester of
services.

A)
Server

B)
Client

C)
Both A) and B)

D)
None of the above



Q.36
CORBA system exceptions are descendants
of

A)
java.Runtime.lang

B)
java.runtimeException

C)
java.lang.RuntimeException

D)
java.lang



Q.37
DCOM can be implemented on platform.

A)
Apple Macintosh

B)
Windows

C)
UNIX/Mainframe

D)
All of the above



Q.38
_________is the feature of surrogate
process.

A)
One surrogate process can service only one client.

B)
One surrogate process can service multiple clients simultaneously

C)
One surrogate process can service only 2 clients

D)
Faults in the surrogate process are isolated into the in-process server.



Q.39
RPC causes ______of' all application

A)
Increase in complexity

B)
Increase in flexibility

C)
Reduction of interoperability

D)
All of the above



Q.40
___________architecture is preferred for
commercial and military distributed
client/server environment.

A)
Three tier architecture

B)
Two tier architecture

C)
Both A) and B)

D)
Neither A) nor B)



Q.41
A method of load balancing, in which
certain users are permanently assigned to
certain servers running the same application is
called as ______

A)
Dynamic load balancing

B)
Static load balancing

C)
Permanent balancing

D)
Improper balancing



Q.42
Functions of an ORB technology are

A)
Interface definition

B)
Location and possible activation of remote objects

C)
Communication between clients and object

D)
All of the above



Q.43
In three-tier architecture, middle laver is
______developed in language.

A)
C++

B)
HTML

C)
SQL

D)
GI



Q.44
The activation Group is responsible for
creating new instances of activable objects in
its group, informing its activation monitor,
about

A)
when does its objects become active

B)
when does its objects become inactive

C)


D)
when does the group as a whole becomes inactive



Q.45
Full form of DCOM is

A)
Distributed Component Object Model

B)
Direct Computations of Open Model

C)
Distributed Computing Object Modem

D)
Developing Component Object Model



Q.46
A DSS particularly useful in ____
environments

A)
Medium risk

B)
High risk

C)
Low risk

D)
Both A) and B)



PART B

Q.1
State True(T) or False(F)
a. MOM supports asynchronous calls between
the client and server applications
b. MOM reduces the involvement of application
developers

A)
a-F, b-F

B)
a-T, b-T

C)
a-F, b-T

D)
a-T, b-F



Q.2
Following are the disadvantages of a.
Difficult to administer and maintain b. Not
effective in running batch programs C. Limits
interoperability by using stored procedures to
implement complex processing logic

A)
Collaborative architecture

B)
Three-tier architecture

C)
Distributed architecture

D)
Two-tier architecture



Q.3
In _____ multitasking is achieved by
running code on more than one processor at
the same time and in _______ multitasking is
achieved by swapping out processes that are
waiting for another event to complete and
swapping in another proc

A)
Multiprocessor System, Multiprocessor System

B)
Unprocessed, Multiprocessor

C)
Multiprocessor, Uniprocessor

D)
Time-Slicing System, Multiprocessor



Q.4
In the stand-alone execution space, _ is
responsible for controlling process objects and
is responsible for controlling file objects.

A)
Local operating system, Local file system

B)
Local file system, Local file system

C)
Local file system, Local operating system

D)
Local operating system, Local operating system



Q.5
State True (T) or False (F)
a. Object Request broker is not an example of
messaging communication component.
b. Messaging communication hides the
implementation details of networking and
protocols.

A)
a-T, b-T

B)
a-F, b-F

C)
a-F, b-T

D)
a-T, b-F



Q.6
Advantages of distributed computing
environment is/are
a. Resource sharing
b. Availability of services
c. Performance

A)
Only a and b

B)
Only b and c

C)
Only a

D)
All the above



Q.7
______is designed around intelligence in
the message and ______places the system
intelligence in the monitor or the process logic
of the application server.

A)
Message server architecture, TP monitor environment

B)
Message server architecture, Message server architecture

C)
TP monitor environment, Message server architecture

D)
TP monitor environment, TP monitor environment



Q.8
State True (T) or False (F)
a. CORBA provides a distributed object
framework, services to support framework and
interoperability with other languages.
b. Java platform provides a portable object
infrastructure that works on every major

A)
a-T, b-F

B)
a-F, b-T

C)
a-T, b-T

D)
a-F, b-F



Q.9
Select true statements for Java RMI
technology.
a. It is available on any platform with JDK
software compliant technologies
b. Provides communication in a homogeneous
or heterogeneous environment.

A)
a-F, b-F

B)
a-T, b-F

C)
a-F, b-T

D)
a-T, b-T



Q.10
An activation identifier for an object can be
obtained by registering an object with the
activation system. This registration can be
accomplished
a. via the activable. register method
b. via the first or second activable.constructor <b

A)
a and b

B)
Only c

C)
b and c

D)
a, b and c



Q.11
In OMG reference model architecture_____
are domain independent interfaces that are
used by many distributed object programs and
______is a runtime component that can be
used for distributed computing using HOP
communication.

A)
Object services, Object Request Broker

B)
Object services, Domain Interfaces

C)
Application interfaces, ORB

D)
Domain interfaces, Application Interfaces



Q.12
Which of the following characteristics help
to distinguish a distributed environment from a
stand- alone environment?
a. Scalability
b. Administrative autonomy
c. Heterogeneity

A)
Only b

B)
a, b and c

C)
a and c

D)
None of the above



Q.13
In CORBA, standard system exceptions are
fully specified by ________ and user exceptions
are defined by _________

A)
OMG, OMG

B)
Individual application programmer, Any Application programmer

C)
OMG, Individual application programmer

D)
None of the above



Q.14
With respect to autonomy, which of the
following features must be met by a technology
developer?
a. Minimize the number of system parameter
that can be reconfigured.
b. Minimize the number of predetermined
execution and management

A)
a and b

B)
Only a

C)
Only b

D)
None of the above



Q.15
In RMI, when skeleton receives an incoming
method invocation, it_____ the parameters for
the remote method and _____ the result to the
caller.

A)
Unmarshals, Marshals

B)
Marshals, Marshals

C)
Unmarshals, Uninarshals

D)
Marshals, Unmarshals



Q.16
State True (T) or False (T)
a. Java IDL is a technology for objects
interacting on different platforms across a
network.
b. Java IDL is based on an industry standard
distributed object model.

A)
a-F, b-F

B)
a-T, b-F

C)
a-T, b-T

D)
a-F, b-T



Q.17
_______is a container for an object that
allows the object to be passed as a parameter
in an RMI call, but postpones descializing the object at the receiver until the application
explicitly requests the object.

A)
ActivationGrouplD Class

B)
ActivationGroup Class

C)
Marshalled Object Class

D)
RemoteStub Class



Q.18
______are the requirements of TP ACID
a. Atomicity
b. Durability
C. Isolation
d. Consistency

A)
a and b

B)
a and d

C)
c and d

D)
a, b, c and d



Q.19
_____ is a way to synchronize threads
access to shared data and ____are used to
provide graceful and reliable thread
termination.

A)
Alerts, mutexes

B)
Mutexes, condition variables

C)
Mutexes, Alerts

D)
Alerts, condition variables



Q.20
Distributed object applications need to
a. locate remote objects
b. communicate with remote objects
C. load byte codes for objects that are passed
as parameters as return values

A)
b and c

B)
a and c

C)
a and b

D)
a, b and c



PART C

Q.1
Select the statements true for RMI.
a. RMI distributed applications use the registry
to obtain reference to a remote object.
b. RMI provides the necessary mechanisms for
loading an object's code, but not for
transmitting its data.

A)
b, d and e

B)
a, c and e

C)
Only b

D)
a, c, d and e



Q.2
Which of the following steps will make the
transition from two-tier architecture to threetier
architecture less costly and of lower risk?
a. Place service elements into separate
directories or files in the source code.
b. Eliminate app

A)
b and d

B)
a and c

C)
a, c and d

D)
a, b, c, d and e



Q.3
State True(T) or False(F)
a. DCE is portable and flexible
b. DCE provides an architecture in which new
technologies can be included.
c. DCE infrastructure does not support the
construction and integration of client/server
applicat

A)
a-T, b-T, c-F, d-F, e-T

B)
a-T, b-F, c-T, d-T, e-T

C)
a-F, b-F, c-T, d-T, e-F

D)
a-F, b-T, c-F, d-F, e- T



Q.4
Arrange the following steps to suggest,
what st;n; t to happens when the client and
server attempt to access the naming service'?
a. Client uses an object reference to invoke
methods on the target object.
b. Server invokes the bind or

A)
b, c, a and d

B)
b, c, d and a

C)
a, c, d and b

D)
b, a, d and c



Q.5
Match Set A with Set 11
Set A
a. Access Security
b. Security identity
C. Launch Security
d. Authentication
e. Connection Policy
Set B
1. Controls the object
2. Protecting the object
3. Protecting the server machine

A)
a-2, b-1, c-3, d-5, e4

B)
a-1, b-2, c-3, d-5, e4

C)
a-2, b-1, c-3, d4, e-5

D)
a-I, b-2, c4, d-5, e-3



Q.6
Which of the following conditions must be
satisfied to load in-process server into a
surrogate process?
a. DLL specified in the InProcServer32 key must
exist.
b. The CLS ID key contains the InProcServer32
sub key.
C. There shou

A)
b, d and e

B)
a, d and e

C)
a, b, c, d and e

D)
a and d



Q.7
Following paragraph is related to Directory
service.
In directory services _____ is the ability to
perform straight forward name-to-entry lookups
and ______ is the ability to perform lookups
based on object attributes. ______is the abi

A)
tink service, group service, white pages, yellow pages

B)
White pages, yellow pages, alias service, group service

C)
Link service, yellow pages, white pages, group service

D)
White pages, yellow pages, group service, alias service.



Q.8
Select the features of OMG IDL.
a. It is a declarative language, not a
programming language.
b. Provides exception definitions to define
exceptional conditions that may arise during the
course of an operation.
c. Provides features

A)
b, d and e

B)
a, b, c and e

C)
a, c and e

D)
b and d



Q.9
_________characteristics are true for
leasing, a mechanism that allows distributed
application to maintain itself
a. During the period of a lease, a lease cannot
be cancelled by the entity holding the lease.
b. A lease is a time perio

A)
a, b, c, d and e

B)
a, c and d

C)
b and e

D)
a, d and e



Q.10
Select the statements which are not true for
RPC. '
a. RPC implementations support peer to peer,
synchronous client-server interaction.
b. RPC is well suited for applications involving
distributed objects or object oriented
program

A)
a, b, d and e

B)
a and b

C)
a, c and d

D)
a and e



Q.11
Distributed file system component of OSF's
DCE focuses on
a. DCE DFS uses a set of tokens, which are
allocated to a server by a client, when the client
caches data.
b. DCE DFS is compatible with the UNIX file
system.
C. DCE DFS

A)
a, b, c, d and e

B)
a and d

C)
b, c and e

D)
a, c and d



Q.12
What happens when a stub method is
invoked?
a. Initiates a connection with the remote JVM
containing the remote object.
b. Writes and transmits the parameters to the
remote JVM.
C. Waits for the result of the method
invocation

A)
a, b, c, d and e

B)
b and d

C)
Only d

D)
a, b, c and e



Q.13
Interoperable Naming Service (INS)
provides following features:
a. Capability to resolve using string field names
b. ORB arguments for bootstrapping.
c. URLs for CORBA object references
d. Standard APIs in Naming Context for
conver

A)
None of the above

B)
a and d

C)
a, b, c and d

D)
Only c



Q.14
The activation Instantiator is responsible for
a. Determining the class for the object using
the descriptor's getClassName method.
b. Creating instance of activable objects.
c. Returning a Marshalled object containing the
remote object

A)
None of the above

B)
All of the above

C)
a and d

D)
b and c



Q.15
Which of the following multiple security
providers are supported by Windows NT
Security architecture?
a. Kerberos Version 8 authentication protocol
b. Windows NT NTLM authentication protocol
C. Secure channel security servicev
d. D

A)
b, c, d and e

B)
a, b, c, d and e

C)
a and e

D)
c and d

No comments:

Post a Comment