Coming soon.... from FEB 15

Coming soon......

Wednesday, January 5, 2011

BSC IT II SMU Questiion Long


Long Question

MIS

Group A
1
The texts and ____________in electronic forms are effective in communicating
ideas from source to destination.
a) Ideas
b) Representations
c) Images
d) Graphics

2 MIS helps in identifying a proper mechanism of ____________ of data.
a)storage
b)distribution
c)collection
d)elimination



3
Some of the processes like artificial intelligence, generating management
related information, providing aid in decision making, necessary support
systems, executive information system are the classification of MIS
a) Functionality
b)Utility
c)area of application
d)processing type


4
A information is easy to process further.
a)managhement
b)unstructured
c)structured
d)generated


5
The is automated to work on the knowledge based
data and information required in a particular domain of
management activity.
a) Transaction processing systems
b) Knowledge based systems
c)On line analytical processing systems
d) Executive information systems







6
_____ refers to a system in which there are predefined multiple
instances of various modules used in business applications.
a) Transaction processing systems
b) Knowledge based systems
c)On line analytical processing systems
d) Executive information systems


7
It is a system developed as model which are representative of real world
cases.
a) TPS
b) DSS
c) KBS
d) OOS


8
A complete business systems requires models from three different
perspective – State model, interaction model and _____ model.
a) entity
b) global
c) data
d) class


9
Under Porter's framework, enterprises have four generic strategies available
to them whereby they can attain above-average performance. They are cost
focus, differentiation, focus differentiotion and _______ .
a) objective leadership
b) price leadership
c) point leadership
d) cost leadership


10
Business process redesign is part of the revolutionary level which
involves more thorough re-evaluation of the enterprise _____and the
production process.
a) value chain
b) efficiency
c) issues
d) network


11
_______ involves reconfiguration of the scope and tasks of the business network.
a) Business network redesign
b) Business process redesign
c) Business process enterprise
d) Business network enterprise


12
____ and Internal Integration are the two levels belonging to the evolutionary levels.
a) business scope rdefinition
b) business network redesign
c) business process redesign
d) localized exploitation





13
The process in which the existing system in the organization is totally reexamined
and radically modified for incorporating the latest technology is known as _____.
a) business process re-engineering
b) change management
c) changing technology
d) redesigning


14
______ helps in reorganization of the entire work force along with various flows,
minimizing the wastages, and giving the system a new dimension.
a) business product redefinition
b) business process reengineering
c) business product reeingineering
d) business process redefinition


15
This process of change for the betterment of the organization is
called as ______ .
a)Business process re-engineering
b)Business process engineering
c)Business process re-inventing
d)Business process innovation


16
In the Lewins model of implementing of MIS in an organization, the first
step is _____ .
a) unfreezing
b) refreezing
c) choosing
d) analyzing


17
Implementation of MIS in an organization is a process where
organizational transformation takes place. _____ model can be used
bring the transformation.
a) Johnson
b) Lewin
c) Abraham
d) Porter


18
In the _____ step of Lewin's model, the change is consolidated and equilibrium is
reinforced.
a) unfreezing
b) refreezing
c) choosing
d) analyzing


19
The _______ strategic plan should be the basis for the MIS strategic plan.
a) employee's
b) organization's
c) manager's
d) customer's






20
One can define the as the information required by a
number of personnel, departments and divisions or the functions in
the organisation.
a)operational information
b)functional managerial information
c)decision support information
d)organisational information


21
______ is largely factual, statistical and detailed in multi-dimensions of the
function.
a)operational information
b)functional information
c)decision support information
d)organisational information


22
The functional information is used by a manager to plan and ____ the function.
a) execute
b) monitor
c) track
d) control


23
Information can be determined by constructing a ____ of information versus user as
per the table given below.
a) matrix
b) table
c) diagram
d) chart


24
Middle management and operations management people use the information class
of type _______ .
a) functional managerial knowledge
b) organizational
c) Decision Support
d) Operational


25
The functional information can be assessed on the following three
parameters – the _______, the responsibility and the functional
objectives.
a) work
b) people
c) organization
d) software characteristics


26
_________is used in a decision support system for model building and
problem solving.
a) data
b) information
c) object
d) knowledge






27
Decision made about what task has to be done, when it has to be done, by
whom and how it has to be done is known as ____ .
a) planning
b) exection
c) deciding
d) managing


28
The planning is adopted by the ____ level executives in the organization.
a) middle
b) top
c) bottom
d) intermediate


29
The operational planning decides on the ______ and cost control.
a) estimate
b) investment
c) escalation
d) quality


30
____ and costing of products is also an important aspect of operational
planning.
a) estimating
b) pricing
c) analysing
d) quality


31
ERP stands for .
a)Enterprise Reserve planning
b)Enterprise Resource Planning
c)Elementary Resource planning
d)Elementary Resource planning


32
The _____ database is a collection of current or historical data from a number of
applications or groups.
a)TPS
b)DSS
c)ESS
d)KBS




33
The business decision-making is in nature.
a)distributed
b)sequential
c)random
d)parallel


34
The Decision Support System helps in making a decision and also in its ____ .
a) performance evaluation
b) design assessment
c) developmental evaluation
d) parametric evaluation






35
A new trend is the creation of an IT leadership team comprising the______
and the Chief Technology Officer.
a) Chief Executive Officer
b) Chief Information Officer
c) Chief Financial Officer
d) Chief Operations Officer


36
The business management process has changed from function
management to ________ management.
a)process
b)product
c)consumer
d)service


37
______ are used to solve extremely complex problems like mapping of
human genome, forecasting weather an modelling complex processes
like nuclear fission.
a) Mini computers
b) Super computers
c) Mainframe computers
d) Desktop computers


38
A _________ is processed with reference to business rules, it is
scrutinised for conformance to the rules, policy or guidelines before it is
taken up for further processing.
a) information
b) transaction
c) operation
d) data


39
__________ assures the accuracy, validity and proprietary of information
system activities.
a) Administrative control
b) information systems control
c)procedural control
d) physical facility control


40
Before any transaction can be input into the system, a specific code
should be assigned to it called as .
a)transaction codes
b)verification
c)control totals
d)labels






Group B
41
MIS classification depends on the following aspects :
functionality, ____, ____ , processing type and frequency of
usage .
a) organization structure and people
b) size , infrastructure
c) people , usage
d) utility , area of application


42
A complete business systems requires models from three
different perspective – class model, _____ model and _____
model.
a) entity, interaction
b) global, interaction
c) state, interaction
d) class, global


43
Business process redesign is part of the revolutionary level which
involves more thorough re-evaluation of the enterprise _____and the
________.
a) value chain and production process
b) efficiency and effectiveness
c) issues and efficiency
d) network and effectivensss


44
The process reengineering brings about a radical change in the
_____ of the information and related _____ from one business
function to another very efficiently.
a) production, documents
b) flow , documents
c) abstraction , documents
d) generation, documents


45
In the refreezing step of Lewin's model, the change is _____ and
equilibrium is ______.
a) evident , established
b) made , disturbed
c) consolidated , reinforced
d) analyzed , established


46
In the systems lifecycle the desing phase leads to _____ and ____ .
a) requirements collection , prototyping
b) prototyping , implementation
c) feasibility study , validation
d) testing, feasibility study






47
The managers in the functional areas of management are responsible for
achieving the targets and accomplishing the _____ and _____.
a) goals and objectives
b) vision and mission
c) vision and objectives
d) mission and goals


48
The functional information can be assessed on the following three
parameters – the _______, the __________ and the functional
objectives.
a) work, responsibility
b) people, commitment
c) organization, approach
d) software characteristics, personnel


49
All organizations have their own ____ and ______ arising from differences in
interest groups.
a) methods and procedures
b) objectives and procedures
c) policies and ventures
d) cultures and policies


50

A business decision making process depends upon the level of_____ and
_______ involved in the problem.
a) uncertainty, certainty
b) risk, uncertainty
c) management , variables
d) business, parameters


51
Neural Networks can be used in various business applications like ________,
__________, market analysis etc.
a) forecasting, stock analysis
b) graphical analysis, linear analysis
c) budgeting, costing
d) monitoring , controlling


52
The basis of conventional organisation design is command & control
which is now _____ and _____ .
a)collaborate & control.
b)communicate & control
c)command & collaborate
d)command & communicate


53
The four business models that work together in an e-enterprise
organization are ________ , ________ , ebusiness and ecommerce.
a) eshopping, ebuying
b) ebuying , eselling
c) ecommunication, ecollaborationb
d) etrading, eordering






54
In reality, there is no right or wrong decision but a ____ or _____
decision.
a) big , small
b) rational , irrational
c) optimistic, pessimistic
d) good, bad


55
Decision making at the middle level is of type_____ and that at the top level is of type _____ .
a) certainty, risk
b) uncertainty, risk
c) certainty, uncertainty
d) risk, uncertainty


56
The _____and _____of information also changes depending upon the risk in decision-
making.
a) value , scope
b) quantum , structure
c) quantum , scope
d) quantum , value


57
Management Science models are developed on the principles of ______
, ______ , _____________.
a) Networking, behaviour, hierarchy
b) business management, accounting, econometrics
c) accounting, systems, HR
d) economics, engineering, and science


58
A _____ provides a single, pre-established WAN communications path from
the customer premises through a carrier network, such as a telephone company,
to a _____ network.
a)Wide area network, local
b)local area network , remote
c)Metropolitan area network, local
d)Point-to-point Links, remote


59
________ and _________are the protocols by which data is transmitted
over networks.
a) HTTP, FTP
b) TCP, FTP
c) HTTP, UDP
d) TCP , UDP


60
As a monitor, the CIO must scan the external environment to keep up with
________and __________.
a) technical changes , competition
b) market changes , technical changes
c) development, competition
d) control factors, competitive pricing






P) TPS x) The system adopted is capable of quick data
acquisition and interpretation of the data which is
necessary in decision making.
Q) KBS Y) Helps the management in decision-making by
providing them with reports and different statistical tools.
R) MRS Z) Helps in conducting the daily routine activities like
sales order entry, airline reservations, payroll etc.
Group C
61
Match the following :




The correct answer is :
a) P-X, Q-Y, R-Z
b) P-Y, Q-Z, R-X
c) P-Z, Q-X, R-Y
d) P-X, Q-Z, R-Y


62
In implementing a computer based information systems the
major behavioural factors which affect the system are : _____ ,
need for _____, organizational _____ , _____ to change and
organizational climate.
a) decision making, change, behaviour, willingness
b) decision structure, change, behaviour, acceptance
c) decision styles, explanation, expectations, resistance
d) decision support, explanation, changes, willingness


63
Under Porter's framework, enterprises have four generic strategies
available to them whereby they can attain above-average
performance. They are :
a) cost leadership, differentaiotion, product focus, focused differentiation
b) cost leadership, integration, product focus, focused differentiation
c) cost leadership, differentiation, cost focus, focused differentiaion
d) cost leadership, integration, cost focus, focused differentiation


64
Match the following:
P) Six sigma X) measuring performances against standards
Q) Customer focus Y) specific measure of quality
R) Benchmarking z) service, product features, quality

Which of the following is correct?

a) P-X, Q-Y, R-Z
b) P-Y, Q-Z, R-X
c) P-Z, Q-X, R-Y
d) P-Y, Q-X, R-Z






65
DFD uses symbols like circle, rectangles etc to represent dataflows and
illustrate relationships among ___ , ____ , ____ and _____ .
a) data, flows, external entities and stores
b) data, object, product, stores
c) data, product, item, stores
d) data, list, entities, blocks


66
Consider the following statements :
P) The design of the MIS should consider the class of information as a whole
and provide suitable information system architecture to generate the information
for various users in the organisation.
Q) The functional information is defined as a set of information required by the
customer conducting the administration and management of the function.
Which of hte following is correct?
a) Both Statements are true
b) Both statements are false
c) Statement P is True and Statement Q is False
d) Statement P is False and Statement Q is True


67
Match the following :
P) manufacturing X) accounts payable, receivable, fixed assets
Q) Financials Y) workflow management, quality control, BOM
R) Human Resources Z) benefits, training, payroll
Which of the following is correct ?
a) P-X, Q-Y, R-Z
b) P-Y, Q-X, R-Z
c) P-Y, Q-Z, R-X
d) P-X, Q-Z, R-Y


68
Consider the following statements :
P) A DSS helps manager to take a decision whereas an ES acts as a decision maker or
an advisor to the manager.
Q)A DSS is meant only for decision making whereas an ES provides expertise to the
manager.
Which of the following is correct ?
a) Both Statements are true
b) Both statements are false
c) Statement P is True and Statement Q is False
d) Statement P is False and Statement Q is True


69
The core business processes of the organisation are procurement,
manufacturing, _________, _________, __________and _________.
a) selling, distribution, delivery, accounting
b) buying, selling, accounting, pricing
c) buying, selling, distribution, pricing
d) selling, accounting, pricing, taxing


70
Which among the following are the types of rationality as differentiated by Simon Herbert.
a) Objectively, structurally, consciously, organizationally
b) Objectively, subjectively, consciously, organizationally
c) Objectively, subjectively, structurally, organizationally
d) Objectively, subjectively, consciously, structurally












71
Match the following :
P) Behaviour model X) trend analysis
Q) Management Science model Y) principles of business management
R) Operations Research model Z) mathematical
Which of the following is correct ?
a) P-X, Q-Y, R-Z
b) P-Y, Q-X, R-Z
c) P-Y, Q-Z, R-X
d) P-X, Q-Z, R-Y


72
Consider the following statements :
P) An internet is a private network that uses Internet protocols, network
connectivity, and possibly the public telecommunication system to securely
share part of an organization's information or operations with suppliers, vendors,
partners, customers or other businesses.
Q) There is often an attempt to use Internet technologies to provide new
interfaces with corporate "legacy" data and information systems.
Which of the following is correct ?
a) Both Statements are true
b) Both statements are false
c) Statement P is True and Statement Q is False
d) Statement P is False and Statement Q is True


73
Modernization project is carried out which can include any combination of
_______, _________ and __________ .
a) migration, employment, creation
b) selection, creation, redevelopment
c) employement, infrastructure, transformation
d) migration, transformation, redevelopment


74
The selection criteria for evaluation have the following dimensions to be
satisfied simultaneously :
a) technical, operational, financial
b) utility, performance, output units
c) financial, economical, performance
d) modularity, funcionality, utility


75
Information system control assures the _______, _______and ______ of
information system activities.
a) precision, requirements, functionality
b) precision, utility, modularity
c) accuracy, validity, functionality
d) accuracy, validity, proprietary

MSC IT IV CSA

PART A

Q.1
For multiprocess operating systems, global
space is ____________

A)
Process

B)
Collection of all processes

C)
Same as execution space

D)
Same as execution space



Q.2
MIS in it re engineered organization would be
____

A)
Process centered

B)
Evaluating customer satisfaction

C)
Expectations and perceptions

D)
All the above



Q.3
is used to enable clients to transparently
locate and invoke persistent objects on servers
in the CORBA environment.

A)
orbd

B)
ORB

C)
IDL

D)
DS1



Q.4
A mechanism that allows the distributed
application to maintain it self is ______

A)
Cloning

B)
Ceasing

C)
Leasing

D)
Hashing



Q.5
Two-tier client server architectures are
appropriate alternatives to the three-tier
architecture, during situation

A)
number of users are greater than 100.

B)
number of users are less than 10

C)
number of users are less than 100

D)
number of users are greater than 1000



Q.6
The types of data validations are

A)
Error specification and error execution

B)
Error detection and error execution

C)
Error detection and error correction

D)
Error execution and error correction



Q.7
Which among these is not a type of video
conferencing?

A)
One way video and one way audio

B)
One way video and two way audio

C)
Two way video and two way audio

D)
None of the above



Q.8
________defines a bounded sequence of
not more than 10 strings.

A)
Sequence

B)
String

C)
Sequence
<10, String>

D)
String
<10, Sequence>



Q.9
_______ in CORBA, provides dynamic
dispatch to the objects.

A)
Dynamic Invocation Interface

B)
Dynamic Stub Interface

C)
Dynamic Skeleton Interface

D)
All of the above



Q.10
Which of the following languages interact
well with DCOM?

A)
Micro Focus COBOL

B)
Microsoft Visual Basic

C)
Delphi

D)
All of the above



Q.11
______ DCOM applications can easily scale
from small single processor machines to huge
multiprocessor systems by seamlessly taking
advantage of support for symmetric
multiprocessing.

A)
DOS

B)
Windows NT

C)
Windows 95

D)
Windows 98



Q.12
_____architecture do not easily support
graphical user interfaces or access to multiple
databases from geographically dispersed sites.

A)
Collaborative enterprise architecture

B)
Client/Server

C)
Mainframe

D)
File sharing



Q.13
ODBMS stands for

A)
Open Database Management Service

B)
Object Database Management System

C)
Open Database Management System

D)
Open Database Manipulating Service



Q.14
DCE products are based on the source code
provided by __

A)
Closed Systems Foundation

B)
Open Systems Foundation

C)
Remote Procedure Call

D)
All of the above



Q.15
_______object is one that is not yet
instantiated in a JVM, but which can be brought
into an active state.

A)
Dead

B)
Passive

C)
Live

D)
Open



Q.16
Disadvantage of two-tier architecture is

A)
Different to administer and maintain

B)
Not effective in running batch programs

C)
Cannot service more than 100 users

D)
All of the above



Q.17
RMI uses a standard mechanism for
communicating with remote objects
called______

A)
Skelton

B)
Sub & Proxy

C)
Skelton

D)
None of the above_



Q.18
Messaging provides another technology to
implement 3 tier computing and is available
from ___________ company/companies.

A)
IBM

B)
Sybase

C)
Oracle

D)
All of the above



Q.19
Once a group is created, subsequent calls
to the current group ID method will return tile
identifier for this group until tile group becomes

A)
Inactive

B)
Active

C)
Passive

D)
Dead



Q.20
Architecture is based on object request
broker technology.

A)
Distributive Collaborative enterprise

B)
File sharing

C)
Mainframe

D)
None of the above



Q.21
Server's Main( ) method of server class

A)
Gets the root naming context

B)
Creates and initializes an ORB instance

C)
Waits for invocations of the new object from the client

D)
All of the above



Q.22
____ is the use of optical character
recognition to convert paper to microfilm
records to a digital format for storage in a
secondary storage device for easy retrieval and
processing
<!--[if !supportLineBreakNewLine]-->
<!--[endif]-->

A)
Teleconferencing

B)
Facsimile transmission

C)
Videotex

D)
Imaging



Q.23
In three-tier software architecture, tier
provides process management.

A)
Top laver

B)
Bottom laver

C)
Middle layer

D)
All of the above



Q.24
OMG IDL supports long data type of
___bit.

A)
8

B)
4

C)
32

D)
64


http://smumodelquestion.blogspot.com/

Q.25
_______function creates initializes it from a
file.

A)
CoCreatelnstance(Ex)

B)
CoCreatInstance From File

C)
CoGetInstanceFromFile

D)
CoGetInstanceFromURL



Q.26
_______ component in CORBA ORB
architecture assists ORB with delivering
requests to the object and with activating the
object

A)
ORB Interface

B)
ORB

C)
DSI

D)
Object Adapter



Q.27
Which of the following are RMI system's
client visible interfaces that are available in the
java.rmi package?

A)
Remote Interface

B)
Remote Exception Class

C)
Naming Class

D)
All of the above



Q.28
The study of managing information and its
allied components is referred to as

A)
Internal Resources Management

B)
Advanced Resources Management

C)
Advanced Component Management

D)
Information Resources Management



Q.29
_____ can be passed as an argument to a
remote___ object.

A)
Primitive types

B)
Remote objects

C)
Non-remote objects

D)
All of the above



Q.30
______is a client server architecture
infrastructure that increases the
interoperability, portability and 11cxibility of' an
application by allowing the application to be
distributed over multiple heterogeneous
platforms.

A)
Message Oriented Middleware

B)
Object Oriented Design

C)
Remote Procedure Call

D)
Both A) and C)



Q.31
To specify an exception in IDL, the
interface designer uses _______keyword.

A)
raises

B)
throws

C)
exception

D)
None of the above



Q.32
_______class library enables low level
communication between java IDL applications
and other CORBA-complaint applications.

A)
ORC

B)
BOR

C)
Object Request Broker

D)
Object reply broker



Q.33
___method returns the non-package –
qualified class name of the reference type to be
serialized onto the output stream â€Å“streamout"

A)
ServerRef

B)
getRefClass

C)
Remote ref

D)
Remote class



Q.34
________is a CORBA service that allows
CORBA objects to be named by means of
binding a name to an object reference.

A)
Object naming

B)
Server naming

C)
Both A) and B)

D)
Naming Service



Q.35
_______ is defined as a requester of
services.

A)
Server

B)
Client

C)
Both A) and B)

D)
None of the above



Q.36
CORBA system exceptions are descendants
of

A)
java.Runtime.lang

B)
java.runtimeException

C)
java.lang.RuntimeException

D)
java.lang



Q.37
DCOM can be implemented on platform.

A)
Apple Macintosh

B)
Windows

C)
UNIX/Mainframe

D)
All of the above



Q.38
_________is the feature of surrogate
process.

A)
One surrogate process can service only one client.

B)
One surrogate process can service multiple clients simultaneously

C)
One surrogate process can service only 2 clients

D)
Faults in the surrogate process are isolated into the in-process server.



Q.39
RPC causes ______of' all application

A)
Increase in complexity

B)
Increase in flexibility

C)
Reduction of interoperability

D)
All of the above



Q.40
___________architecture is preferred for
commercial and military distributed
client/server environment.

A)
Three tier architecture

B)
Two tier architecture

C)
Both A) and B)

D)
Neither A) nor B)



Q.41
A method of load balancing, in which
certain users are permanently assigned to
certain servers running the same application is
called as ______

A)
Dynamic load balancing

B)
Static load balancing

C)
Permanent balancing

D)
Improper balancing



Q.42
Functions of an ORB technology are

A)
Interface definition

B)
Location and possible activation of remote objects

C)
Communication between clients and object

D)
All of the above



Q.43
In three-tier architecture, middle laver is
______developed in language.

A)
C++

B)
HTML

C)
SQL

D)
GI



Q.44
The activation Group is responsible for
creating new instances of activable objects in
its group, informing its activation monitor,
about

A)
when does its objects become active

B)
when does its objects become inactive

C)


D)
when does the group as a whole becomes inactive



Q.45
Full form of DCOM is

A)
Distributed Component Object Model

B)
Direct Computations of Open Model

C)
Distributed Computing Object Modem

D)
Developing Component Object Model



Q.46
A DSS particularly useful in ____
environments

A)
Medium risk

B)
High risk

C)
Low risk

D)
Both A) and B)



PART B

Q.1
State True(T) or False(F)
a. MOM supports asynchronous calls between
the client and server applications
b. MOM reduces the involvement of application
developers

A)
a-F, b-F

B)
a-T, b-T

C)
a-F, b-T

D)
a-T, b-F



Q.2
Following are the disadvantages of a.
Difficult to administer and maintain b. Not
effective in running batch programs C. Limits
interoperability by using stored procedures to
implement complex processing logic

A)
Collaborative architecture

B)
Three-tier architecture

C)
Distributed architecture

D)
Two-tier architecture



Q.3
In _____ multitasking is achieved by
running code on more than one processor at
the same time and in _______ multitasking is
achieved by swapping out processes that are
waiting for another event to complete and
swapping in another proc

A)
Multiprocessor System, Multiprocessor System

B)
Unprocessed, Multiprocessor

C)
Multiprocessor, Uniprocessor

D)
Time-Slicing System, Multiprocessor



Q.4
In the stand-alone execution space, _ is
responsible for controlling process objects and
is responsible for controlling file objects.

A)
Local operating system, Local file system

B)
Local file system, Local file system

C)
Local file system, Local operating system

D)
Local operating system, Local operating system



Q.5
State True (T) or False (F)
a. Object Request broker is not an example of
messaging communication component.
b. Messaging communication hides the
implementation details of networking and
protocols.

A)
a-T, b-T

B)
a-F, b-F

C)
a-F, b-T

D)
a-T, b-F



Q.6
Advantages of distributed computing
environment is/are
a. Resource sharing
b. Availability of services
c. Performance

A)
Only a and b

B)
Only b and c

C)
Only a

D)
All the above



Q.7
______is designed around intelligence in
the message and ______places the system
intelligence in the monitor or the process logic
of the application server.

A)
Message server architecture, TP monitor environment

B)
Message server architecture, Message server architecture

C)
TP monitor environment, Message server architecture

D)
TP monitor environment, TP monitor environment



Q.8
State True (T) or False (F)
a. CORBA provides a distributed object
framework, services to support framework and
interoperability with other languages.
b. Java platform provides a portable object
infrastructure that works on every major

A)
a-T, b-F

B)
a-F, b-T

C)
a-T, b-T

D)
a-F, b-F



Q.9
Select true statements for Java RMI
technology.
a. It is available on any platform with JDK
software compliant technologies
b. Provides communication in a homogeneous
or heterogeneous environment.

A)
a-F, b-F

B)
a-T, b-F

C)
a-F, b-T

D)
a-T, b-T



Q.10
An activation identifier for an object can be
obtained by registering an object with the
activation system. This registration can be
accomplished
a. via the activable. register method
b. via the first or second activable.constructor <b

A)
a and b

B)
Only c

C)
b and c

D)
a, b and c



Q.11
In OMG reference model architecture_____
are domain independent interfaces that are
used by many distributed object programs and
______is a runtime component that can be
used for distributed computing using HOP
communication.

A)
Object services, Object Request Broker

B)
Object services, Domain Interfaces

C)
Application interfaces, ORB

D)
Domain interfaces, Application Interfaces



Q.12
Which of the following characteristics help
to distinguish a distributed environment from a
stand- alone environment?
a. Scalability
b. Administrative autonomy
c. Heterogeneity

A)
Only b

B)
a, b and c

C)
a and c

D)
None of the above



Q.13
In CORBA, standard system exceptions are
fully specified by ________ and user exceptions
are defined by _________

A)
OMG, OMG

B)
Individual application programmer, Any Application programmer

C)
OMG, Individual application programmer

D)
None of the above



Q.14
With respect to autonomy, which of the
following features must be met by a technology
developer?
a. Minimize the number of system parameter
that can be reconfigured.
b. Minimize the number of predetermined
execution and management

A)
a and b

B)
Only a

C)
Only b

D)
None of the above



Q.15
In RMI, when skeleton receives an incoming
method invocation, it_____ the parameters for
the remote method and _____ the result to the
caller.

A)
Unmarshals, Marshals

B)
Marshals, Marshals

C)
Unmarshals, Uninarshals

D)
Marshals, Unmarshals



Q.16
State True (T) or False (T)
a. Java IDL is a technology for objects
interacting on different platforms across a
network.
b. Java IDL is based on an industry standard
distributed object model.

A)
a-F, b-F

B)
a-T, b-F

C)
a-T, b-T

D)
a-F, b-T



Q.17
_______is a container for an object that
allows the object to be passed as a parameter
in an RMI call, but postpones descializing the object at the receiver until the application
explicitly requests the object.

A)
ActivationGrouplD Class

B)
ActivationGroup Class

C)
Marshalled Object Class

D)
RemoteStub Class



Q.18
______are the requirements of TP ACID
a. Atomicity
b. Durability
C. Isolation
d. Consistency

A)
a and b

B)
a and d

C)
c and d

D)
a, b, c and d



Q.19
_____ is a way to synchronize threads
access to shared data and ____are used to
provide graceful and reliable thread
termination.

A)
Alerts, mutexes

B)
Mutexes, condition variables

C)
Mutexes, Alerts

D)
Alerts, condition variables



Q.20
Distributed object applications need to
a. locate remote objects
b. communicate with remote objects
C. load byte codes for objects that are passed
as parameters as return values

A)
b and c

B)
a and c

C)
a and b

D)
a, b and c



PART C

Q.1
Select the statements true for RMI.
a. RMI distributed applications use the registry
to obtain reference to a remote object.
b. RMI provides the necessary mechanisms for
loading an object's code, but not for
transmitting its data.

A)
b, d and e

B)
a, c and e

C)
Only b

D)
a, c, d and e



Q.2
Which of the following steps will make the
transition from two-tier architecture to threetier
architecture less costly and of lower risk?
a. Place service elements into separate
directories or files in the source code.
b. Eliminate app

A)
b and d

B)
a and c

C)
a, c and d

D)
a, b, c, d and e



Q.3
State True(T) or False(F)
a. DCE is portable and flexible
b. DCE provides an architecture in which new
technologies can be included.
c. DCE infrastructure does not support the
construction and integration of client/server
applicat

A)
a-T, b-T, c-F, d-F, e-T

B)
a-T, b-F, c-T, d-T, e-T

C)
a-F, b-F, c-T, d-T, e-F

D)
a-F, b-T, c-F, d-F, e- T



Q.4
Arrange the following steps to suggest,
what st;n; t to happens when the client and
server attempt to access the naming service'?
a. Client uses an object reference to invoke
methods on the target object.
b. Server invokes the bind or

A)
b, c, a and d

B)
b, c, d and a

C)
a, c, d and b

D)
b, a, d and c



Q.5
Match Set A with Set 11
Set A
a. Access Security
b. Security identity
C. Launch Security
d. Authentication
e. Connection Policy
Set B
1. Controls the object
2. Protecting the object
3. Protecting the server machine

A)
a-2, b-1, c-3, d-5, e4

B)
a-1, b-2, c-3, d-5, e4

C)
a-2, b-1, c-3, d4, e-5

D)
a-I, b-2, c4, d-5, e-3



Q.6
Which of the following conditions must be
satisfied to load in-process server into a
surrogate process?
a. DLL specified in the InProcServer32 key must
exist.
b. The CLS ID key contains the InProcServer32
sub key.
C. There shou

A)
b, d and e

B)
a, d and e

C)
a, b, c, d and e

D)
a and d



Q.7
Following paragraph is related to Directory
service.
In directory services _____ is the ability to
perform straight forward name-to-entry lookups
and ______ is the ability to perform lookups
based on object attributes. ______is the abi

A)
tink service, group service, white pages, yellow pages

B)
White pages, yellow pages, alias service, group service

C)
Link service, yellow pages, white pages, group service

D)
White pages, yellow pages, group service, alias service.



Q.8
Select the features of OMG IDL.
a. It is a declarative language, not a
programming language.
b. Provides exception definitions to define
exceptional conditions that may arise during the
course of an operation.
c. Provides features

A)
b, d and e

B)
a, b, c and e

C)
a, c and e

D)
b and d



Q.9
_________characteristics are true for
leasing, a mechanism that allows distributed
application to maintain itself
a. During the period of a lease, a lease cannot
be cancelled by the entity holding the lease.
b. A lease is a time perio

A)
a, b, c, d and e

B)
a, c and d

C)
b and e

D)
a, d and e



Q.10
Select the statements which are not true for
RPC. '
a. RPC implementations support peer to peer,
synchronous client-server interaction.
b. RPC is well suited for applications involving
distributed objects or object oriented
program

A)
a, b, d and e

B)
a and b

C)
a, c and d

D)
a and e



Q.11
Distributed file system component of OSF's
DCE focuses on
a. DCE DFS uses a set of tokens, which are
allocated to a server by a client, when the client
caches data.
b. DCE DFS is compatible with the UNIX file
system.
C. DCE DFS

A)
a, b, c, d and e

B)
a and d

C)
b, c and e

D)
a, c and d



Q.12
What happens when a stub method is
invoked?
a. Initiates a connection with the remote JVM
containing the remote object.
b. Writes and transmits the parameters to the
remote JVM.
C. Waits for the result of the method
invocation

A)
a, b, c, d and e

B)
b and d

C)
Only d

D)
a, b, c and e



Q.13
Interoperable Naming Service (INS)
provides following features:
a. Capability to resolve using string field names
b. ORB arguments for bootstrapping.
c. URLs for CORBA object references
d. Standard APIs in Naming Context for
conver

A)
None of the above

B)
a and d

C)
a, b, c and d

D)
Only c



Q.14
The activation Instantiator is responsible for
a. Determining the class for the object using
the descriptor's getClassName method.
b. Creating instance of activable objects.
c. Returning a Marshalled object containing the
remote object

A)
None of the above

B)
All of the above

C)
a and d

D)
b and c



Q.15
Which of the following multiple security
providers are supported by Windows NT
Security architecture?
a. Kerberos Version 8 authentication protocol
b. Windows NT NTLM authentication protocol
C. Secure channel security servicev
d. D

A)
b, c, d and e

B)
a, b, c, d and e

C)
a and e

D)
c and d