PART A
Q.1 | For multiprocess operating systems, global space is ____________ | |
A) | Process | |
B) | Collection of all processes | |
C) | Same as execution space | |
D) | Same as execution space | |
Q.2 | MIS in it re engineered organization would be ____ | |
A) | Process centered | |
B) | Evaluating customer satisfaction | |
C) | Expectations and perceptions | |
D) | All the above | |
Q.3 | is used to enable clients to transparently locate and invoke persistent objects on servers in the CORBA environment. | |
A) | orbd | |
B) | ORB | |
C) | IDL | |
D) | DS1 | |
Q.4 | A mechanism that allows the distributed application to maintain it self is ______ | |
A) | Cloning | |
B) | Ceasing | |
C) | Leasing | |
D) | Hashing | |
Q.5 | Two-tier client server architectures are appropriate alternatives to the three-tier architecture, during situation | |
A) | number of users are greater than 100. | |
B) | number of users are less than 10 | |
C) | number of users are less than 100 | |
D) | number of users are greater than 1000 | |
Q.6 | The types of data validations are | |
A) | Error specification and error execution | |
B) | Error detection and error execution | |
C) | Error detection and error correction | |
D) | Error execution and error correction | |
Q.7 | Which among these is not a type of video conferencing? | |
A) | One way video and one way audio | |
B) | One way video and two way audio | |
C) | Two way video and two way audio | |
D) | None of the above | |
Q.8 | ________defines a bounded sequence of not more than 10 strings. | |
A) | Sequence | |
B) | String | |
C) | Sequence <10, String> | |
D) | String <10, Sequence> | |
Q.9 | _______ in CORBA, provides dynamic dispatch to the objects. | |
A) | Dynamic Invocation Interface | |
B) | Dynamic Stub Interface | |
C) | Dynamic Skeleton Interface | |
D) | All of the above | |
Q.10 | Which of the following languages interact well with DCOM? | |
A) | Micro Focus COBOL | |
B) | Microsoft Visual Basic | |
C) | ||
D) | All of the above | |
Q.11 | ______ DCOM applications can easily scale from small single processor machines to huge multiprocessor systems by seamlessly taking advantage of support for symmetric multiprocessing. | |
A) | DOS | |
B) | Windows NT | |
C) | Windows 95 | |
D) | Windows 98 | |
Q.12 | _____architecture do not easily support graphical user interfaces or access to multiple databases from geographically dispersed sites. | |
A) | Collaborative enterprise architecture | |
B) | Client/Server | |
C) | Mainframe | |
D) | File sharing | |
Q.13 | ODBMS stands for | |
A) | Open Database Management Service | |
B) | Object Database Management System | |
C) | Open Database Management System | |
D) | Open Database Manipulating Service | |
Q.14 | DCE products are based on the source code provided by __ | |
A) | Closed Systems Foundation | |
B) | Open Systems Foundation | |
C) | Remote Procedure Call | |
D) | All of the above | |
Q.15 | _______object is one that is not yet instantiated in a JVM, but which can be brought into an active state. | |
A) | Dead | |
B) | Passive | |
C) | Live | |
D) | Open | |
Q.16 | Disadvantage of two-tier architecture is | |
A) | Different to administer and maintain | |
B) | Not effective in running batch programs | |
C) | Cannot service more than 100 users | |
D) | All of the above | |
Q.17 | RMI uses a standard mechanism for communicating with remote objects called______ | |
A) | Skelton | |
B) | Sub & Proxy | |
C) | Skelton | |
D) | None of the above_ | |
Q.18 | Messaging provides another technology to implement 3 tier computing and is available from ___________ company/companies. | |
A) | IBM | |
B) | Sybase | |
C) | Oracle | |
D) | All of the above | |
Q.19 | Once a group is created, subsequent calls to the current group ID method will return tile identifier for this group until tile group becomes | |
A) | Inactive | |
B) | Active | |
C) | Passive | |
D) | Dead | |
Q.20 | Architecture is based on object request broker technology. | |
A) | Distributive Collaborative enterprise | |
B) | File sharing | |
C) | Mainframe | |
D) | None of the above | |
Q.21 | Server's | |
A) | Gets the root naming context | |
B) | Creates and initializes an ORB instance | |
C) | Waits for invocations of the new object from the client | |
D) | All of the above | |
Q.22 | ____ is the use of optical character recognition to convert paper to microfilm records to a digital format for storage in a secondary storage device for easy retrieval and processing <!--[if !supportLineBreakNewLine]--> <!--[endif]--> | |
A) | Teleconferencing | |
B) | Facsimile transmission | |
C) | Videotex | |
D) | Imaging | |
Q.23 | In three-tier software architecture, tier provides process management. | |
A) | Top laver | |
B) | Bottom laver | |
C) | Middle layer | |
D) | All of the above | |
Q.24 | OMG IDL supports long data type of ___bit. | |
A) | 8 | |
B) | 4 | |
C) | 32 | |
D) | 64 | |
| http://smumodelquestion.blogspot.com/ |
Q.25 | _______function creates initializes it from a file. | |
A) | CoCreatelnstance(Ex) | |
B) | CoCreatInstance From File | |
C) | CoGetInstanceFromFile | |
D) | CoGetInstanceFromURL | |
Q.26 | _______ component in CORBA ORB architecture assists ORB with delivering requests to the object and with activating the object | |
A) | ORB Interface | |
B) | ORB | |
C) | DSI | |
D) | Object Adapter | |
Q.27 | Which of the following are RMI system's client visible interfaces that are available in the java.rmi package? | |
A) | Remote Interface | |
B) | Remote Exception Class | |
C) | Naming Class | |
D) | All of the above | |
Q.28 | The study of managing information and its allied components is referred to as | |
A) | Internal Resources Management | |
B) | Advanced Resources Management | |
C) | Advanced Component Management | |
D) | Information Resources Management | |
Q.29 | _____ can be passed as an argument to a remote___ object. | |
A) | Primitive types | |
B) | Remote objects | |
C) | Non-remote objects | |
D) | All of the above | |
Q.30 | ______is a client server architecture infrastructure that increases the interoperability, portability and 11cxibility of' an application by allowing the application to be distributed over multiple heterogeneous platforms. | |
A) | Message Oriented Middleware | |
B) | Object Oriented Design | |
C) | Remote Procedure Call | |
D) | Both A) and C) | |
Q.31 | To specify an exception in IDL, the interface designer uses _______keyword. | |
A) | raises | |
B) | throws | |
C) | exception | |
D) | None of the above | |
Q.32 | _______class library enables low level communication between java IDL applications and other CORBA-complaint applications. | |
A) | ORC | |
B) | BOR | |
C) | Object Request Broker | |
D) | Object reply broker | |
Q.33 | ___method returns the non-package – qualified class name of the reference type to be serialized onto the output stream â€Å“streamout" | |
A) | ServerRef | |
B) | getRefClass | |
C) | Remote ref | |
D) | Remote class | |
Q.34 | ________is a CORBA service that allows CORBA objects to be named by means of binding a name to an object reference. | |
A) | Object naming | |
B) | Server naming | |
C) | Both A) and B) | |
D) | Naming Service | |
Q.35 | _______ is defined as a requester of services. | |
A) | Server | |
B) | Client | |
C) | Both A) and B) | |
D) | None of the above | |
Q.36 | CORBA system exceptions are descendants of | |
A) | java.Runtime.lang | |
B) | java.runtimeException | |
C) | java.lang.RuntimeException | |
D) | java.lang | |
Q.37 | DCOM can be implemented on platform. | |
A) | Apple Macintosh | |
B) | Windows | |
C) | UNIX/Mainframe | |
D) | All of the above | |
Q.38 | _________is the feature of surrogate process. | |
A) | One surrogate process can service only one client. | |
B) | One surrogate process can service multiple clients simultaneously | |
C) | One surrogate process can service only 2 clients | |
D) | Faults in the surrogate process are isolated into the in-process server. | |
Q.39 | RPC causes ______of' all application | |
A) | Increase in complexity | |
B) | Increase in flexibility | |
C) | Reduction of interoperability | |
D) | All of the above | |
Q.40 | ___________architecture is preferred for commercial and military distributed client/server environment. | |
A) | Three tier architecture | |
B) | Two tier architecture | |
C) | Both A) and B) | |
D) | Neither A) nor B) | |
Q.41 | A method of load balancing, in which certain users are permanently assigned to certain servers running the same application is called as ______ | |
A) | Dynamic load balancing | |
B) | Static load balancing | |
C) | Permanent balancing | |
D) | Improper balancing | |
Q.42 | Functions of an ORB technology are | |
A) | Interface definition | |
B) | Location and possible activation of remote objects | |
C) | Communication between clients and object | |
D) | All of the above | |
Q.43 | In three-tier architecture, middle laver is ______developed in language. | |
A) | C++ | |
B) | HTML | |
C) | SQL | |
D) | GI | |
Q.44 | The activation Group is responsible for creating new instances of activable objects in its group, informing its activation monitor, about | |
A) | when does its objects become active | |
B) | when does its objects become inactive | |
C) | ||
D) | when does the group as a whole becomes inactive | |
Q.45 | Full form of DCOM is | |
A) | Distributed Component Object Model | |
B) | Direct Computations of Open Model | |
C) | Distributed Computing Object Modem | |
D) | Developing Component Object Model | |
Q.46 | A DSS particularly useful in ____ environments | |
A) | Medium risk | |
B) | High risk | |
C) | Low risk | |
D) | Both A) and B) | |
PART B
Q.1 | State True(T) or False(F) a. MOM supports asynchronous calls between the client and server applications b. MOM reduces the involvement of application developers | |
A) | a-F, b-F | |
B) | a-T, b-T | |
C) | a-F, b-T | |
D) | a-T, b-F | |
Q.2 | Following are the disadvantages of a. Difficult to administer and maintain b. Not effective in running batch programs C. Limits interoperability by using stored procedures to implement complex processing logic | |
A) | Collaborative architecture | |
B) | Three-tier architecture | |
C) | Distributed architecture | |
D) | Two-tier architecture | |
Q.3 | In _____ multitasking is achieved by running code on more than one processor at the same time and in _______ multitasking is achieved by swapping out processes that are waiting for another event to complete and swapping in another proc | |
A) | Multiprocessor System, Multiprocessor System | |
B) | Unprocessed, Multiprocessor | |
C) | Multiprocessor, Uniprocessor | |
D) | Time-Slicing System, Multiprocessor | |
Q.4 | In the stand-alone execution space, _ is responsible for controlling process objects and is responsible for controlling file objects. | |
A) | Local operating system, Local file system | |
B) | Local file system, Local file system | |
C) | Local file system, Local operating system | |
D) | Local operating system, Local operating system | |
Q.5 | State True (T) or False (F) a. Object Request broker is not an example of messaging communication component. b. Messaging communication hides the implementation details of networking and protocols. | |
A) | a-T, b-T | |
B) | a-F, b-F | |
C) | a-F, b-T | |
D) | a-T, b-F | |
Q.6 | Advantages of distributed computing environment is/are a. Resource sharing b. Availability of services c. Performance | |
A) | Only a and b | |
B) | Only b and c | |
C) | Only a | |
D) | All the above | |
Q.7 | ______is designed around intelligence in the message and ______places the system intelligence in the monitor or the process logic of the application server. | |
A) | Message server architecture, TP monitor environment | |
B) | Message server architecture, Message server architecture | |
C) | TP monitor environment, Message server architecture | |
D) | TP monitor environment, TP monitor environment | |
Q.8 | State True (T) or False (F) a. CORBA provides a distributed object framework, services to support framework and interoperability with other languages. b. Java platform provides a portable object infrastructure that works on every major | |
A) | a-T, b-F | |
B) | a-F, b-T | |
C) | a-T, b-T | |
D) | a-F, b-F | |
Q.9 | Select true statements for Java RMI technology. a. It is available on any platform with JDK software compliant technologies b. Provides communication in a homogeneous or heterogeneous environment. | |
A) | a-F, b-F | |
B) | a-T, b-F | |
C) | a-F, b-T | |
D) | a-T, b-T | |
Q.10 | An activation identifier for an object can be obtained by registering an object with the activation system. This registration can be accomplished a. via the activable. register method b. via the first or second activable.constructor <b | |
A) | a and b | |
B) | Only c | |
C) | b and c | |
D) | a, b and c | |
Q.11 | In OMG reference model architecture_____ are domain independent interfaces that are used by many distributed object programs and ______is a runtime component that can be used for distributed computing using HOP communication. | |
A) | Object services, Object Request Broker | |
B) | Object services, Domain Interfaces | |
C) | Application interfaces, ORB | |
D) | Domain interfaces, Application Interfaces | |
Q.12 | Which of the following characteristics help to distinguish a distributed environment from a stand- alone environment? a. Scalability b. Administrative autonomy c. Heterogeneity | |
A) | Only b | |
B) | a, b and c | |
C) | a and c | |
D) | None of the above | |
Q.13 | In CORBA, standard system exceptions are fully specified by ________ and user exceptions are defined by _________ | |
A) | OMG, OMG | |
B) | Individual application programmer, Any Application programmer | |
C) | OMG, Individual application programmer | |
D) | None of the above | |
Q.14 | With respect to autonomy, which of the following features must be met by a technology developer? a. Minimize the number of system parameter that can be reconfigured. b. Minimize the number of predetermined execution and management | |
A) | a and b | |
B) | Only a | |
C) | Only b | |
D) | None of the above | |
Q.15 | In RMI, when skeleton receives an incoming method invocation, it_____ the parameters for the remote method and _____ the result to the caller. | |
A) | Unmarshals, Marshals | |
B) | Marshals, Marshals | |
C) | Unmarshals, Uninarshals | |
D) | Marshals, Unmarshals | |
Q.16 | State True (T) or False (T) a. Java IDL is a technology for objects interacting on different platforms across a network. b. Java IDL is based on an industry standard distributed object model. | |
A) | a-F, b-F | |
B) | a-T, b-F | |
C) | a-T, b-T | |
D) | a-F, b-T | |
Q.17 | _______is a container for an object that allows the object to be passed as a parameter in an RMI call, but postpones descializing the object at the receiver until the application explicitly requests the object. | |
A) | ActivationGrouplD Class | |
B) | ActivationGroup Class | |
C) | Marshalled Object Class | |
D) | RemoteStub Class | |
Q.18 | ______are the requirements of TP ACID a. Atomicity b. Durability C. Isolation d. Consistency | |
A) | a and b | |
B) | a and d | |
C) | c and d | |
D) | a, b, c and d | |
Q.19 | _____ is a way to synchronize threads access to shared data and ____are used to provide graceful and reliable thread termination. | |
A) | Alerts, mutexes | |
B) | Mutexes, condition variables | |
C) | Mutexes, Alerts | |
D) | Alerts, condition variables | |
Q.20 | Distributed object applications need to a. locate remote objects b. communicate with remote objects C. load byte codes for objects that are passed as parameters as return values | |
A) | b and c | |
B) | a and c | |
C) | a and b | |
D) | a, b and c | |
PART C
Q.1 | Select the statements true for RMI. a. RMI distributed applications use the registry to obtain reference to a remote object. b. RMI provides the necessary mechanisms for loading an object's code, but not for transmitting its data. | |
A) | b, d and e | |
B) | a, c and e | |
C) | Only b | |
D) | a, c, d and e | |
Q.2 | Which of the following steps will make the transition from two-tier architecture to threetier architecture less costly and of lower risk? a. Place service elements into separate directories or files in the source code. b. Eliminate app | |
A) | b and d | |
B) | a and c | |
C) | a, c and d | |
D) | a, b, c, d and e | |
Q.3 | State True(T) or False(F) a. DCE is portable and flexible b. DCE provides an architecture in which new technologies can be included. c. DCE infrastructure does not support the construction and integration of client/server applicat | |
A) | a-T, b-T, c-F, d-F, e-T | |
B) | a-T, b-F, c-T, d-T, e-T | |
C) | a-F, b-F, c-T, d-T, e-F | |
D) | a-F, b-T, c-F, d-F, e- T | |
Q.4 | Arrange the following steps to suggest, what st;n; t to happens when the client and server attempt to access the naming service'? a. Client uses an object reference to invoke methods on the target object. b. Server invokes the bind or | |
A) | b, c, a and d | |
B) | b, c, d and a | |
C) | a, c, d and b | |
D) | b, a, d and c | |
Q.5 | Match Set A with Set 11 Set A a. Access Security b. Security identity C. Launch Security d. Authentication e. Connection Policy Set B 1. Controls the object 2. Protecting the object 3. Protecting the server machine | |
A) | a-2, b-1, c-3, d-5, e4 | |
B) | a-1, b-2, c-3, d-5, e4 | |
C) | a-2, b-1, c-3, d4, e-5 | |
D) | a-I, b-2, c4, d-5, e-3 | |
Q.6 | Which of the following conditions must be satisfied to load in-process server into a surrogate process? a. DLL specified in the InProcServer32 key must exist. b. The CLS ID key contains the InProcServer32 sub key. C. There shou | |
A) | b, d and e | |
B) | a, d and e | |
C) | a, b, c, d and e | |
D) | a and d | |
Q.7 | Following paragraph is related to Directory service. In directory services _____ is the ability to perform straight forward name-to-entry lookups and ______ is the ability to perform lookups based on object attributes. ______is the abi | |
A) | tink service, group service, white pages, yellow pages | |
B) | White pages, yellow pages, alias service, group service | |
C) | Link service, yellow pages, white pages, group service | |
D) | White pages, yellow pages, group service, alias service. | |
Q.8 | Select the features of OMG IDL. a. It is a declarative language, not a programming language. b. Provides exception definitions to define exceptional conditions that may arise during the course of an operation. c. Provides features | |
A) | b, d and e | |
B) | a, b, c and e | |
C) | a, c and e | |
D) | b and d | |
Q.9 | _________characteristics are true for leasing, a mechanism that allows distributed application to maintain itself a. During the period of a lease, a lease cannot be cancelled by the entity holding the lease. b. A lease is a time perio | |
A) | a, b, c, d and e | |
B) | a, c and d | |
C) | b and e | |
D) | a, d and e | |
Q.10 | Select the statements which are not true for RPC. ' a. RPC implementations support peer to peer, synchronous client-server interaction. b. RPC is well suited for applications involving distributed objects or object oriented program | |
A) | a, b, d and e | |
B) | a and b | |
C) | a, c and d | |
D) | a and e | |
Q.11 | Distributed file system component of OSF's DCE focuses on a. DCE DFS uses a set of tokens, which are allocated to a server by a client, when the client caches data. b. DCE DFS is compatible with the UNIX file system. C. DCE DFS | |
A) | a, b, c, d and e | |
B) | a and d | |
C) | b, c and e | |
D) | a, c and d | |
Q.12 | What happens when a stub method is invoked? a. Initiates a connection with the remote JVM containing the remote object. b. Writes and transmits the parameters to the remote JVM. C. Waits for the result of the method invocation | |
A) | a, b, c, d and e | |
B) | b and d | |
C) | Only d | |
D) | a, b, c and e | |
Q.13 | Interoperable Naming Service (INS) provides following features: a. Capability to resolve using string field names b. ORB arguments for bootstrapping. c. URLs for CORBA object references d. Standard APIs in Naming Context for conver | |
A) | None of the above | |
B) | a and d | |
C) | a, b, c and d | |
D) | Only c | |
Q.14 | The activation Instantiator is responsible for a. Determining the class for the object using the descriptor's getClassName method. b. Creating instance of activable objects. c. Returning a Marshalled object containing the remote object | |
A) | None of the above | |
B) | All of the above | |
C) | a and d | |
D) | b and c | |
Q.15 | Which of the following multiple security providers are supported by Windows NT Security architecture? a. Kerberos Version 8 authentication protocol b. Windows NT NTLM authentication protocol C. Secure channel security servicev d. D | |
A) | b, c, d and e | |
B) | a, b, c, d and e | |
C) | a and e | |
D) | c and d | |
No comments:
Post a Comment