System Administrator 2026
In distributed file system, file name does not reveal the file’s ___________
  • A. Local name
  • B. Physical storage location
  • C. Both local name and physical storage location
  • D. None of the mentioned
Which one of the following is a distributed file system?
  • A. Andrew file system
  • B. Network file system
  • C. Novel network
  • D. All of the mentioned
In distributed systems, a logical clock is associated with ______________
  • A. Each instruction
  • B. Each process
  • C. Each register
  • D. None of the mentioned
If timestamps of two events are same, then the events are ____________
  • A. Concurrent
  • B. Non-concurrent
  • C. Monotonic
  • D. Non-monotonic
If a process is executing in its critical section ____________
  • A. Any other process can also execute in its critical section
  • B. No other process can execute in its critical section
  • C. One more process can execute in its critical section
  • D. None of the mentioned
A process can enter into its critical section ____________
  • A. Anytime
  • B. When it receives a reply message from its parent process
  • C. When it receives a reply message from all other processes in the system
  • D. None of the mentioned
For proper synchronization in distributed systems ____________
  • A. Prevention from the deadlock is must
  • B. Prevention from the starvation is must
  • C. Prevention from the deadlock & starvation is must
  • D. None of the mentioned
In the token passing approach of distributed systems, processes are organized in a ring structure ____________
  • A. Logically
  • B. Physically
  • C. Both logically and physically
  • D. None of the mentioned
In distributed systems, what will the transaction coordinator do?
  • A. Starts the execution of transaction
  • B. Breaks the transaction into number of sub transactions
  • C. Coordinates the termination of the transaction
  • D. All of the mentioned
In case of failure, a new transaction coordinator can be elected by ____________
  • A. Bully algorithm
  • B. Ring algorithm
  • C. Both bully and ring algorithm
  • D. None of the mentioned