Distributed Computing - Quiz 3 - BITS WILP - Mtec Software Systems - 2017


Distributed Computing - Quiz 3
BITS WILP - Mtec Software Systems - 2017 

1. Which of the following is not a part of Job Management System of a cluster?
Select one:
job scheduler
user server
resource manager
recovery manager

Ans: recovery manager

2. Which of the following is not a semantic index?
Select one:
database key
document name
index given by a hash mechanism
keyword

Ans: index given by a hash mechanism

3. In the Byzantine agreement problem
Select one:
there can be more than one source process
there is no source process
only one process is the source process
all processes are source processes


Ans: only one process is the source process

4. Which of the following is not a feature of P2P networks?
Select one:
self replicating
distributed control
self organizing
anonymity

Ans: self replicating

5. If the total number of faulty processes present in a synchronous system is k, then the recursive formulation of the Byzantine agreement

tree algorithm runs for
Select one:
k + 2 rounds
k + 1 rounds
k rounds
2k rounds

Ans: k + 1 rounds

6. For a Chord ring having n nodes, the local space requirement at each node is
Select one:
O(n2)
O(log n)
O(n)
O(1)

Ans: O(log n)

7. The Byzantine agreement tree algorithm is initiated by
Select one:
a single lieutenant
all commanders
a single commander
all lieutenants

Ans: a single commander

8. In scalable lookup for Chord, the routing table of each node is termed as
Select one:
finger table
search table
lookup table
hash table

Ans: finger table

9. For a list L, the operation head(L) gives
Select one:
the first member of list L
the list L after deleting the last member of L
the list L after deleting the first member of L
the last member of list L

Ans: the first member of list L

10. In context of cluster computing, SSI stands for
Select one:
Single System Image
System Service Interdependence
Synchronous System Infrastructure
Secure System Interaction

Ans: Single System Image

11. In the iterative formulation of the Byzantine agreement tree algorithm for n processes,  each node at level h - 1 of the tree data

structure at a non-initiator has
Select one:
n child nodes
n + h - 1 child nodes
n - h child nodes
n - (h + 1) child nodes

Ans: n - (h + 1) child nodes

12. In the Byzantine agreement problem
Select one:
50% of the processes must agree on a value
50% of the non-faulty processes must agree on a value
all processes must agree on a value
all non-faulty processes must agree on a value

Ans: all non-faulty processes must agree on a value

13. Authenticated messages help
Select one:
in detection of message loss
in detection of forgery
in detection of process failure
in detection of channel failure
Previous pageNext page
Skip Quiz navigation

Ans: in detection of forgery

14. The agreement variable in any agreement algorithm
Select one:
should be multivalued
should be boolean
should be an integer
may be boolean or multivalued

Ans: may be boolean or multivalued

15. Gnutella uses
Select one:
remote indexing
distributed indexing
local indexing
centralized indexing


Ans: local indexing

16. Which type of failure occurs temporarily?
Select one:
permanent failure
transient failure
total failure
unplanned failure

Ans: transient failure

17. In the interactive consistency problem
Select one:
all faulty processes must agree on an array of values
all non-faulty processes must agree on an array of values
all non-faulty processes must agree on a single value
all faulty processes must agree on a single value

Ans: all faulty processes must agree on an array of values

18. Unstructured overlays use
Select one:
centralized indexing
distributed indexing
local indexing
random indexing

Ans: local indexing

19. In a P2P network, the rapid joining and departure of nodes is termed as
Select one:
power law property
churn
scale free property
small world phenomemon

Ans: churn

20. Availability is calculated as
Select one:
MTTF / MTTR
MTTR / (MTTF + MTTR)
MTTF / (MTTF + MTTR)
MTTR / MTTF

Ans: MTTF / (MTTF + MTTR)

21. Expanding ring strategy is a refinement of
Select one:
random walk
flooding
guided search
blind search

Ans: flooding

22. The total number of message types used by Gnutella is
Select one:
5
3
4
6

Ans: 4

23. In the recursive formulation of the Byzantine agreement tree algorithm, the number of parameters present in each oral message is
Select one:
3
5
4
2

Ans: 4

24. In a synchronous system, if there are 19 processes, then the Byzantine agreement problem is solvable if there are
Select one:
at most 6 faulty processes
8 faulty processes
at least 6 faulty processes
7 faulty processes

Ans: at most 6 faulty processes

25. In the consensus problem
Select one:
each process has an initial value
only one process has an initial value
at most 50% of the processes have initial values
at most two processes have initial values

Ans: each process has an initial value

Network Security - Quiz 2 BITS WILP - Mtec Software Systems - 2017

Network Security - Quiz 2
BITS WILP - Mtec Software Systems - 2017

1. "RC4" is a block cipher
Select one:
True
False

Ans: False

2. In Cipher Block Chaining mode any ciphertext block depends on all previous plaintext blocks (except the first block)
Select one:
True
False

Ans: True

3. Electronic Code Book Mode can be parallelize

Select one:
True
False

Ans: True

4. In AES speed of decryption of a ciphertext is same as the speed of encryption of a plaintext when the on-the-fly generation of subkeys is used.

Select one:
True
False

Ans: False

5. In "AES", diffusion is achieved by MixColumn layer only.
Select one:
True
False

Ans: False

6. AES is a modern block cipher with block size 128 / 192 / 256 bits.

Select one:
True
False

Ans: False

7. OTP is unconditionally secure if key is used once.

Select one:
True
False

Ans: True

8. Cipher Block Chaining Mode has Probabilistic approach

Select one:
True
False

Ans: True

9. Electronic Code Book Mode has Deterministic approach

Select one:
True
False

Ans: True

10. Cipher Block Chaining Mode can be parallelize

Select one:
True
False

Ans: False

11. AES is a 128/192/256 key bits cipher.

Select one:
True
False

Ans: True

12. AES have a Feistel structure.
Select one:
True
False

Ans: False

13. In "AES", confusion is achieved in ShiftRows layer
Select one:
True
False

Ans: False

14. "AES" is a block cipher
Select one:
True
False

Ans: True

15. The Electronic Code Book  mode is susceptible to substitution attacks

Select one:
True
False

Ans: True

16. AES layers computations are based on Galois field.
Select one:
True
False

Ans: True

Distributed Computing Quiz 2 - BITS WILP - Mtec Software Systems - 2017

Distributed Computing - Quiz 2
BITS WILP - Mtec Software Systems - 2017 

1. The number of messages exchanged by the Chandy–Misra–Haas algorithm for the AND model in order to detect a deadlock in a distributed system consisting of n sites and m processes is

Select one:
mn
(m(n−1))/2
(n(m−1))/2
(mn)/2

Ans: (m(n−1))/2

2. The ASSIGN_PRIVILEGE routine is executed by

Select one:
Raymond’s Tree-Based Algorithm
Chandy-Misra-Haas algorithm
Maekawa's algorithm
Lamport's algorithm

Ans: Raymond’s Tree-Based Algorithm

3. Which of the following is not an approach for implementing mutual exclusion in distributed systems?

Select one:
quorum-based approach
token-based approach
non-token-based approach
causal-ordering based approach

Ans: causal-ordering based approach

4. For a spanning tree having n nodes, a broadcast procedure requires

Select one:
2n messages
n2 messages
(n -  1) messages
n messages

Ans: (n -  1) messages

5. Which of the following local variables is not used in Synchronous Single-Initiator Spanning Tree algorithm using flooding?

Select one:
child
depth
parent
visited

Ans: child

6. For the single-resource model, maximum out-degree of a node in a WFG can be

Select one:
exactly 2
more than 1
any positive number
at most 1

Ans: at most 1

7. The termination criterion for the Asynchronous Single-Initiator Spanning Tree Algorithm using flooding is

Select one:
(Children ∪ Unrelated) = (Neighbors \ {parent})
Children = Neighbors
(Neighbors ∪ Unrelated) = Children
(Children ∪ Unrelated) = Neighbors

Ans: (Children ∪ Unrelated) = (Neighbors \ {parent})

8. In Lamport's algorithm for implementing distributed mutual exclusion, a site that wants to enter the critical section sends REQUEST messages to

Select one:
a subset of all the sites
all the other sites
only a single specific site
a predesignated leader site

Ans: all the other sites

9. The type of communication used in the Birman-Schiper-Stephenson protocol is

Select one:
convergecast
unicast
multicast
broadcast

Ans: broadcast

10. For a distributed system consisting of k processes, Raynal–Schiper–Toueg algorithm uses SENT arrays each of size

Select one:
k2
2k
k
k x k

Ans: k x k

11. In a distributed system, when a process sends a message to a subset of the processes then the type of communication is called

Select one:
multicasting
convergecasting
unicasting
broadcasting

Ans: multicasting

12. For a distributed system having K sites, the number of messages required by Lamport's algorithm for implementing distributed mutual exclusion per critical section invocation is

Select one:
K - 1
K
2(K - 1)
3(K - 1)

Ans: 3(K - 1)

13. The Chandy–Misra–Haas algorithm for the OR model uses

Select one:
request and response messages
probe messages
inquire messages
query and reply messages

Ans: query and reply messages

14. The synchronization delay for the Ricart–Agrawala algorithm is equal to

Select one:
twice the average message delay
thrice the average message delay
the average message delay
half of the average message delay

Ans: the average message delay

15. Liveness property with regard to causal ordering of messages states that

Select one:
a message that a process decides to send must eventually be sent
a message that arrives at a process must eventually be delivered to the process
a message that is in transit must eventually reach the destination process
a message that is lost during transmission must eventually be retransmitted

Ans: a message that arrives at a process must eventually be delivered to the process

16. For the Asynchronous Single-Initiator Spanning Tree Algorithm using flooding, ACCEPT messages are sent along

Select one:
the back edges
the cross edges
the tree edges
all edges

Ans: the tree edges

17. How many types of messages are used by the Asynchronous Single-Initiator Spanning Tree algorithm using flooding?

Select one:
2
3
5
4

Ans: 3

18. In a distributed system consisting of x processes, the space requirement at each process for the Raynal–Schiper–Toueg algorithm is

Select one:
O(x2) integers
O(x3) integers
O(x) integers
O(x4) integers

Ans: O(x2) integers

19. The system throughput for a distributed mutual exclusion algorithm is defined as

Select one:
the rate at which the system executes requests for the critical section
the rate at which the system sends messages to enable a process to enter the critical section
the rate at which the system receives requests for the critical section
the rate at which a process in the system sends requests for entering the critical section

Ans: the rate at which the system executes requests for the critical section

20. The safety property in context of distributed mutual exclusion algorithms states that

Select one:
at any instant, atmost a certain number of processes can execute the critical section
at any instant, atmost 2 processes can execute the critical section
at any instant, some process should be executing the critical section
at any instant, only one process can execute the critical section

Ans: at any instant, only one process can execute the critical section

21. For handling deadlocks, Maekawa’s algorithm uses the following types of messages

Select one:
REQUEST, FAILED, INQUIRE
REQUEST, REPLY, INQUIRE
FAILED, INQUIRE, YIELD
REQUEST, INQUIRE, YIELD

Ans: FAILED, INQUIRE, YIELD

22. The local space complexity at a node for the Synchronous Single-Initiator Spanning Tree algorithm using flooding is of the order of

Select one:
the degree of edge incidence
the sum of the diameter and the degree of edge incidence
the number of edges of the graph
the product of the number of edges and the number of nodes of the graph

Ans: the degree of edge incidence

23. For which of the algorithms for implementing distributed mutual exclusion, each process maintains a request-deferred array?

Select one:
Maekawa’s algorithm
Lamport's algorithm
Ricart–Agrawala algorithm
Suzuki–Kasami’s broadcast algorithm

Ans: Ricart–Agrawala algorithm

24. The number of rounds that are executed in the Synchronous Single-Initiator Spanning Tree algorithm using flooding is equal to

Select one:
the number of edges in the graph
the length of the longest path in the graph
the diameter of the graph
the number of nodes in the graph

Ans: the diameter of the graph

25. Which of the following type of multicast algorithm uses a token?

Select one:
communication history-based algorithm
moving sequencer algorithm
fixed sequencer algorithm
destination agreement algorithm

Ans: moving sequencer algorithm

Data Warehousing - Quiz 2 BITS WILP - Mtec Software Systems - 2017

Data Warehousing - Quiz 2
BITS WILP - Mtec Software Systems - 2017

1.Dimension table is related to fact-table in which kind of relationship?
Select one:
a. one-to-one.
b. many-to-many.
c. one-to-many.
d. many-to-one.

Ans: b. many-to-many.

2.Snowflake schema is more normalized compared to star schema.
Select one:
a. True
b. False

Ans: a. True

3.In case of Retail Store Database, Customer Dimension is which kind of dimension?
Select one:
a. Junk Dimension
b. Slowly Changing Dimension
c. Rapidly Changing Dimension
d. Miscellaneous Dimension

Ans: b. Slowly Changing Dimension



4.Which of the following is/are not data transformation task(s)?
Select one:
a. Conversion
b. Selection
c. Rearrangement
d. Reduction

Ans: d. Reduction

5.Data loading requires data warehouse to be in offline mode.
Select one:
a. False
b. True

Ans: a. False

6.Which of the following is not one of the principles pertaining to Type-2 change?
Select one:
a. There is a need to preserve history in Data Warehouse.
b. They ae used to compare performance across the transitions.
c. This type of change partitions the history in the Data Warehouse.
d. Every change for the same attribute must be preserved.

Ans: b. They ae used to compare performance across the transitions.

7.In this technique of Data Loading, if primary key of incoming record matches with that of some already existing record, matching target record is updated
Select one:
a. Destructive Merge
b. Load
c. Constructive Merge
d. Append

Ans: a. Destructive Merge

8.Immediate extraction of data using special stored procedures that are fired when certain pre-defined events occur is called _____________
Select one:
a. Capture through Transaction Logs
b. Capture through Database Triggers
c. Capture based on date and timestamp
d. Capture in Source Application

Ans: b. Capture through Database Triggers

9.The type of key that does not have any built-in meaning and is simply system generated sequence numbers is ________________
Select one:
a. Surrogate Key
b. Concatenated Primary Key
c. Primary Key
d. Foreign Key

Ans: a. Surrogate Key

10.Which of the following is NOT a fully additive measure?
Select one:
a. Products returned
b. Percentage of profit
c. Revenue generated in rupees
d. Products ordered

Ans: b. Percentage of profit