Distributed Computing Quiz 2 - BITS WILP - Mtec Software Systems - 2017

Distributed Computing - Quiz 2
BITS WILP - Mtec Software Systems - 2017 

1. The number of messages exchanged by the Chandy–Misra–Haas algorithm for the AND model in order to detect a deadlock in a distributed system consisting of n sites and m processes is

Select one:
mn
(m(n−1))/2
(n(m−1))/2
(mn)/2

Ans: (m(n−1))/2

2. The ASSIGN_PRIVILEGE routine is executed by

Select one:
Raymond’s Tree-Based Algorithm
Chandy-Misra-Haas algorithm
Maekawa's algorithm
Lamport's algorithm

Ans: Raymond’s Tree-Based Algorithm

3. Which of the following is not an approach for implementing mutual exclusion in distributed systems?

Select one:
quorum-based approach
token-based approach
non-token-based approach
causal-ordering based approach

Ans: causal-ordering based approach

4. For a spanning tree having n nodes, a broadcast procedure requires

Select one:
2n messages
n2 messages
(n -  1) messages
n messages

Ans: (n -  1) messages

5. Which of the following local variables is not used in Synchronous Single-Initiator Spanning Tree algorithm using flooding?

Select one:
child
depth
parent
visited

Ans: child

6. For the single-resource model, maximum out-degree of a node in a WFG can be

Select one:
exactly 2
more than 1
any positive number
at most 1

Ans: at most 1

7. The termination criterion for the Asynchronous Single-Initiator Spanning Tree Algorithm using flooding is

Select one:
(Children ∪ Unrelated) = (Neighbors \ {parent})
Children = Neighbors
(Neighbors ∪ Unrelated) = Children
(Children ∪ Unrelated) = Neighbors

Ans: (Children ∪ Unrelated) = (Neighbors \ {parent})

8. In Lamport's algorithm for implementing distributed mutual exclusion, a site that wants to enter the critical section sends REQUEST messages to

Select one:
a subset of all the sites
all the other sites
only a single specific site
a predesignated leader site

Ans: all the other sites

9. The type of communication used in the Birman-Schiper-Stephenson protocol is

Select one:
convergecast
unicast
multicast
broadcast

Ans: broadcast

10. For a distributed system consisting of k processes, Raynal–Schiper–Toueg algorithm uses SENT arrays each of size

Select one:
k2
2k
k
k x k

Ans: k x k

11. In a distributed system, when a process sends a message to a subset of the processes then the type of communication is called

Select one:
multicasting
convergecasting
unicasting
broadcasting

Ans: multicasting

12. For a distributed system having K sites, the number of messages required by Lamport's algorithm for implementing distributed mutual exclusion per critical section invocation is

Select one:
K - 1
K
2(K - 1)
3(K - 1)

Ans: 3(K - 1)

13. The Chandy–Misra–Haas algorithm for the OR model uses

Select one:
request and response messages
probe messages
inquire messages
query and reply messages

Ans: query and reply messages

14. The synchronization delay for the Ricart–Agrawala algorithm is equal to

Select one:
twice the average message delay
thrice the average message delay
the average message delay
half of the average message delay

Ans: the average message delay

15. Liveness property with regard to causal ordering of messages states that

Select one:
a message that a process decides to send must eventually be sent
a message that arrives at a process must eventually be delivered to the process
a message that is in transit must eventually reach the destination process
a message that is lost during transmission must eventually be retransmitted

Ans: a message that arrives at a process must eventually be delivered to the process

16. For the Asynchronous Single-Initiator Spanning Tree Algorithm using flooding, ACCEPT messages are sent along

Select one:
the back edges
the cross edges
the tree edges
all edges

Ans: the tree edges

17. How many types of messages are used by the Asynchronous Single-Initiator Spanning Tree algorithm using flooding?

Select one:
2
3
5
4

Ans: 3

18. In a distributed system consisting of x processes, the space requirement at each process for the Raynal–Schiper–Toueg algorithm is

Select one:
O(x2) integers
O(x3) integers
O(x) integers
O(x4) integers

Ans: O(x2) integers

19. The system throughput for a distributed mutual exclusion algorithm is defined as

Select one:
the rate at which the system executes requests for the critical section
the rate at which the system sends messages to enable a process to enter the critical section
the rate at which the system receives requests for the critical section
the rate at which a process in the system sends requests for entering the critical section

Ans: the rate at which the system executes requests for the critical section

20. The safety property in context of distributed mutual exclusion algorithms states that

Select one:
at any instant, atmost a certain number of processes can execute the critical section
at any instant, atmost 2 processes can execute the critical section
at any instant, some process should be executing the critical section
at any instant, only one process can execute the critical section

Ans: at any instant, only one process can execute the critical section

21. For handling deadlocks, Maekawa’s algorithm uses the following types of messages

Select one:
REQUEST, FAILED, INQUIRE
REQUEST, REPLY, INQUIRE
FAILED, INQUIRE, YIELD
REQUEST, INQUIRE, YIELD

Ans: FAILED, INQUIRE, YIELD

22. The local space complexity at a node for the Synchronous Single-Initiator Spanning Tree algorithm using flooding is of the order of

Select one:
the degree of edge incidence
the sum of the diameter and the degree of edge incidence
the number of edges of the graph
the product of the number of edges and the number of nodes of the graph

Ans: the degree of edge incidence

23. For which of the algorithms for implementing distributed mutual exclusion, each process maintains a request-deferred array?

Select one:
Maekawa’s algorithm
Lamport's algorithm
Ricart–Agrawala algorithm
Suzuki–Kasami’s broadcast algorithm

Ans: Ricart–Agrawala algorithm

24. The number of rounds that are executed in the Synchronous Single-Initiator Spanning Tree algorithm using flooding is equal to

Select one:
the number of edges in the graph
the length of the longest path in the graph
the diameter of the graph
the number of nodes in the graph

Ans: the diameter of the graph

25. Which of the following type of multicast algorithm uses a token?

Select one:
communication history-based algorithm
moving sequencer algorithm
fixed sequencer algorithm
destination agreement algorithm

Ans: moving sequencer algorithm

No comments:

Post a Comment