Professional Documents
Culture Documents
QUESTION
BANK
UNIT-1
1.The term client/server was first used in the 1980 in reference to personal computers (PC) on a ___.
Ans.Network
2.The ___ software architecture is a versatile, message-based and modular infrastructure that is
intended to improve usability, flexibility, interoperability and scalability as compared to centralized,
mainframe, time sharing computing.
Ans.Client/Server
3.A ___ machine can be both a client and server depending on the software configuration.
Ans.Single
Ans.Client Server.
-1-
Client Server Architecture MSC IT SEM-4 / MSC TT SEM-3 Question Bank
6.With mainframe software architectures all intelligence is within the ____ computer.
Ans.Central host
Ans.Hardware
8.The original PC Networks are based on the ___ architecture, where the server downloads files
from the shared location to the desktop environment.
Ans.file sharing
9.Using a relational database management system, user queries could be answered ___.
Ans.Directly
10.The ___ architecture reduced network traffic by providing a query response rather than total file
transfer.
Ans.Client/Server
12.___ statements are typically used to communicate between the client and server.
-2-
Client Server Architecture MSC IT SEM-4 / MSC TT SEM-3 Question Bank
16. The ___ is an integrated system services they provide an integrated distributed environment
which incorporates technology from industry.
17.The DCE is a set of integrated system services they provide an inter operable and flexible
distributed environment with the primary goal of solving ___ problems in heterogeneous,
networked environments.
Ans.interoperability
18.___ provides a reference implementation (source code) on which all DCE products are based.
20. ___ service, which provides a simple, portable, programming model for building concurrent
applications.
Ans. Thread
-3-
Client Server Architecture MSC IT SEM-4 / MSC TT SEM-3 Question Bank
11.__ service, which provides the network wit authentication, authorization and user account
management services to maintain the integrity, privac and authenticity of the distributed system.
Ans. Security
22.___ provides and users with capabilities built upon the fundamental distributed services.
23. ___ which interoperates with the network file system to provide a high-performance, scalable
and secure files access system.
24. Diskless support, which allows low-cst workstation to use disks on servers, possibily reducing the
need/cost for local disks and provides performance enchancements to ___.
25. The DCE support International open systems Interconnection (OSI) standards, which are critical
to ___ interconnectivity.
Ans. Global
27. The ___ supports Internet standards such as the TCP/IP transport and network protocols, as well
as the Domain Name system and Network Time protocol provided by the Internet.
Ans.DCE
28. The DCE is written in standard C and uses standard operating system service interfaces like ___
and ___.
-4-
Client Server Architecture MSC IT SEM-4 / MSC TT SEM-3 Question Bank
29.DEC works internally with he ___ model and is well-suited for development of applications that
are structured according to this model.
Ans. Client/Server
30. For DCE ___ communication is optimized and relatively secure and transparent.
Ans. intra-cell
31.In 2-tier client server architecture, __ is typically used to communicate between the client and
server.
Ans.RPC
32.The ___ is likely to have support for stored procedures and triggers.
Ans.Server
33. The 2-tiered client/server architecture has proven to be very effective in solving ___ problems.
Ans.Workgroup
34. The two tier design allocates the user system interface exclusively to the ___.
Ans.Client
35. The __ requires minimal operator intervention and is frequently used in non-computer, non-time
critical information processing systems.
Ans.Two-tier architecture
36. The two tier design will scale-up to service __ users on a network.
Ans.100
-5-
Client Server Architecture MSC IT SEM-4 / MSC TT SEM-3 Question Bank
Ans. batch
38. The ___ provides process management where business logic and rules are executed and can
accommodate hundreds of users by providing functions such as queuing, application execution and
database staging.
39. The ___ tier control transactions and asynchronous queuing to ensure reliable completion of
transactions.
40. The middle tier manages distributed database integrity by the ___ commit process.
UNIT-2
1.____ is usually a concern only in an environment that contains dissimilar fundamental hardware or
software services (that is, a heterogeneous environment).
Ans. Interoperability
2. One of the most widely used models in the development of distributed applications is the ___
model.
Ans. Client/Server
3. As in a stand-alone system, the ability to retrieve information associated with a name (object) is a
___ of the distributed system.
-6-
Client Server Architecture MSC IT SEM-4 / MSC TT SEM-3 Question Bank
4. The user community prefers to support ___ (that is, standard interfaces and protocols) as a means
of increasing the opportunity to share information and services.
5. In the stand-alone environment, the standard means for execution spaces to exchange data is
through ___.
Ans. Network
7. In the stand-alone environment, there are at least ___ types of event ordering.
Ans. two
8. ____ is used an open process to design the architectural framework as part of its distributed
computing environment request for technology effort.
9. Distributed file system technology provides the ability to access and store data at ___ locations.
Ans. Remote
10. DCE DFS uses a set of tokens to keep track of ___ information.
Ans. cached
-7-
Client Server Architecture MSC IT SEM-4 / MSC TT SEM-3 Question Bank
UNIT-3
01.The ___ language and platform provide a base for distributed computing that changes the
approach to designing distributed systems.
Ans.Java
02.A ___ listener is an object that is interested in the occurrence of some kinds of events in some
other object.
Ans.remote event
03.A ____ is an object is an object that is passed fro an event generator to a remote event listener to
indicate that an event of a particular kind has occured.
04.An event is something that happen in an object, corresponding to some change in the abstract
state of the ____.
Ans.Object
05.A ___ application has a different set of characteristics and requirements that a single-address
space event application.
Ans.distributed event
Ans.distributed systems
07.___ allows objects to identify state changes that might be of interest to other objects in a
distributed application.
Ans.Events
-8-
Client Server Architecture MSC IT SEM-4 / MSC TT SEM-3 Question Bank
08.Event-based programming is common in a single address space, and is often used for interactive
applications that react to ___ events.
Ans.user-generated
Ans.transaction
Ans.Transactions
UNIT-4
01.Microsoft Distributed COM (DCOM) extends the component object model (COM) to support
communication among objects on different computers - on a LAN, a WAN or even the ___.
Ans.Internet
Ans.Distributed applications
Ans.DCOM
Ans.interact
05.A reference implementation of COM and DCOM in ___ form will be available for licensing through
the Open Group in 1997.
Ans.source-code
-9-
Client Server Architecture MSC IT SEM-4 / MSC TT SEM-3 Question Bank
06.The COM run-time provides ____ services to clients and components and uses RPC and the
security provider to generate standard network packets than conform to the DCOM ___ standard.
07.One of the most basic requirements of a distributed system is the ability to create ___.
Ans.Components
09.The ____ look up the appropriate binary (dynamic-link library or executable) in the system
registry , create the object and return an interface pointer to the caller.
Ans.COM libraries
10.For DCOM, the object creation mechanism in the COM libraries is enhanced to allow object
creation on other ___.
Ans. machines
UNIT-5
Ans.heterogeneous
-10-
Client Server Architecture MSC IT SEM-4 / MSC TT SEM-3 Question Bank
04. The Java platform provides a _____ object infrastructure that works on every major operating
system.
Ans.portable
05.CORBA provides the ____ transparency, Java provides the ___ transparency.
Ans.network, implementation
07.The Common Object Request Broker Architecture (CORBA) is an emerging open distributed object
computing infrastructure being standardized by the ____.
08.___ are domain-independent interfaces that are ued by many distributed object programs.
Ans.Object Services
Ans.Servant
-11-