HPC Mid2 Obj Ans
HPC Mid2 Obj Ans
HPC Mid2 Obj Ans
M.TECH II YEAR III Semester (MR 22) II Mid Question Bank 2022-23 (Subjective)
MODULE-III
1 Each node in the clustered systems contains the cluster?
A) Hardware
B) software
C) Both A and B
D) Can not say
2 In which type of clusters, the nodes in the system share the workload to provide a better
performance?
A) High Availability Clusters
B) Load Balancing Clusters
C) Both A and B
D) None of the above
3 Which of the following are Benefits of Clustered Systems?
A) Clustered systems result in high performance
B) Clustered systems are quite fault tolerant
C) Clustered systems are quite scalable
D) All of the above
4 Clustered systems have ___________ CPUs.
A) zero
B) one
C) two
D) multiple
5 Each computer in a cluster is connected using __________
A) UTP
B)Rj-45
C) STP
D)Coaxial cable
6 The set of loosely connected computers are called as __________
A) LAN
B) WAN
C) Workstation
D) Cluster
7 The computer cluster architecture emerged as a result of _________
A) ISA B) Workstation
C) Super computers D) Distributed systems
8 The software which governs the group of computers is __________
A) Driver Rd45
B) Interface UI
C) Clustering middleware
D) Distributor
9 The simplest form of a cluster is __________ approach.
A) Beowolf
B) Sequoia
C) Stone
D) None of the mentioned
1 The cluster formation in which the work is divided equally among the systems is______
0 A) Load-configuration
B) Load-Division
C) Light head
D) Both Load-configuration and Load-Division
1 In the client server model of the cluster _________ approach is used.
1 A) Load configuration
B) FIFO
C) Bankers algorithm
D) Round robin
1 The beowolf structure follows the __________ approach of a relationship between the
2 systems.
A) Master-slave
B) Asynchronous
C) Synchronous
D) Isochronous
1 The most common modes of communication in clusters are ______
3 A)Message queues
B) Message passing interface
C) PVm
D) Both Message passing interface and PVm
1 The method followed in case of node failure, wherein the node gets disabled is _______
4 A) STONITH
B) Fibre channel
C) Fencing
D) None of the mentioned
1 Which of the following is not the function of Operating System?
5 A) Process Management
B) Memory Management
C) Device Management
D) Clock Management
MODULE-IV
1 main properties for UbiCom Systems were proposed by Weiser
A)1 B) 2 C) 3 D) 4
2 Which of the following is not a key characteristic of Ubicomp System ?
A) Distributed
B) Ihci
C) Context – awareness
D) Pay as you go
3 When connecting a wearable device to the cloud, what software is required to run a
custom service?
A) Database
B) Operating System
C) http server
D) All of above
4 IrDA support……
A) Sql server ce
B) Device specific controls
C) High performance jit compiler
D) All of the above
5 What does RFID stand for
A) Radio frequency issue date
B) Radio frequency identification
C) Real field identification
D) Real far identification
6 What applications run on a SMART Board?
A) any applicaiton on the computer
B) internet browsers like explorer and navigator only
C) powerpoint only
D) None of these
7 The SMART Board Software is called
A) Notepage
B) Note book
C) Spriral page
D) All of above
8 It takes the output signal from the transmission channel and delivers
A) Transmitter B)transmission channel
C)receiver D)hardware
9 Which of the Following is used in banking industary.....
A) micr B) omr
B) C)all of these D) none of these
1 WAP?
1 A)wireless application protocol B)wired allication protocol
C)wide application protocol D)none of the above
The tag can be used to activate the task when the user clicks on a word on the screen?
1 A) True
2 B) False
C) Both
D) None of these
1 WAP is designed for?
3 A) internet explorer b)web browser
c)micro browser d)macro browser
1 Limitations of Short Messaging Service (SMS)
4 A) limited to 160 characters or less
B) message latency is one minute or more
C) poor security at the application level
D) all of the above
1 DoCoMo Stands for ...............
5 A) documentation over the mobile network
B) do communications over the mobile network
C) documentation & communications over the mobile network
D) none of the above
1 Mobile Web Service design often uses a three tier ...............
6 A) thin client, client proxy, server architecture
B) network, client proxy, server architecture
C) internet,cilent & server
D) none of the above
1 Mobile code is any .........
7 A) program b)application
c) content d) all of the above
1 Sandboxes ..........
8 A) that limit the local services that code can access.
B) which ensures that code originates from a trusted source.
C) machines that can access the internet
D) that carries explicit proof of its security.
1 What types of protocols are used in VPNs?
9 A) application level protocols
B) tunnelling protocols
C) network protocols
D) mailing protocols
2 Which types of VPNs are used for corporate connectivity across companies residing in
0 different geographical location?
A)remote access vpns B)site-to-site vpns
C)peer-to-peer vpns D)country-to-country vpns
2 Which of the statements are not true to classify VPN systems?
1 A) protocols used for tunnelling the traffic
B) whether vpns are providing site-to-site or remote access connection
C) securing the network from bots and malwares
D) levels of security provided for sending and receiving data privately
2 A firewall needs to be------so that it can grow proportionally with the network that it
2 protects.
A) robust
B) expansive
C) fast
D) scalable
2 A proxy firewall filters at
3 A)physical layer B)data link layer
C)network layer D)application layer
2 A firewall is installed at the point where the secure internal network and untrusted
4 external network meet which is also known as
A)chock point B)meeting point C)firewall point D)secure point
2 Which of the following standard committee specifies Bluetooth and other Personal Area
5 Networks (PAN)?