1.
Definition
Q1. A distributed system is:
a) A group of tightly coupled devices
b) A single powerful mainframe
c) A collection of autonomous computing elements that appears as a single coherent system
d) A high-performance standalone computer
2. Characteristics
Q2. In a distributed system, each node:
a) Shares a global clock
b) Depends on a master node for time synchronization
c) Has its own notion of time
d) Works synchronously with others
3. Overlay Networks
Q3. In an overlay network, communication between nodes typically happens:
a) Only via the operating system
b) Through direct messages via TCP/IP or UDP
c) Over a single shared memory
d) Without any protocol involvement
4. Overlay Types
Q4. A structured overlay network has:
a) A well-defined set of neighbors
b) A completely random topology
c) No rules for connection
d) Only broadcast-based communication
5. Distribution Transparency
Q5. The transparency that hides where an object is located is called:
a) Access transparency
b) Location transparency
c) Concurrency transparency
d) Migration transparency
6. Middleware
Q6. In distributed systems, middleware is primarily responsible for:
a) Managing resources and providing common services
b) Designing network hardware
c) Replacing the local operating system
d) Executing all application code
7. Transparency Limitations
Q7. Why is full distribution transparency often not achievable?
a) Users demand visible distribution
b) Communication latency and failure hiding are hard or impossible
c) Nodes don’t support transparency
d) Middleware blocks transparency
8. Openness
Q8. An open distributed system must:
a) Support well-defined interfaces and interoperability
b) Be closed to external systems
c) Only support internal communication
d) Use proprietary standards
9. Scalability
Q9. Which of the following is not a component of scalability?
a) Size scalability
b) Protocol scalability
c) Geographical scalability
d) Administrative scalability
10. Problems with Replication
Q10. What is the main problem when using replication in distributed systems?
a) Data gets lost
b) It increases latency
c) It may lead to inconsistencies between copies
d) Replication consumes too much memory
11. Pitfalls
Q11. Which of the following is a false assumption often made in distributed systems?
a) The network supports caching
b) The network is secure
c) The system needs to scale
d) Users can tolerate delay
12. Transparency Types
Q12. Which transparency hides the differences in data representation and how an object is
accessed?
a) Location transparency
b) Access transparency
c) Replication transparency
d) Concurrency transparency
Q13. Concurrency transparency ensures:
a) Faster processing of tasks
b) One user at a time can access data
c) Users can work concurrently without interference
d) Access is restricted to one replica
Q14. Replication transparency means:
a) Replicas are manually synchronized
b) Users know which replica they are using
c) Replication is disabled
d) Users are unaware of multiple object copies
Q15. Failure transparency implies that:
a) System halts on any failure
b) Users are unaware that a component has failed
c) Failures are reported to all clients
d) System logs are hidden from users
Q16. Migration transparency hides:
a) Replication of services
b) Movement of objects without user knowledge
c) Physical network layout
d) Object deletion from memory
Q17. Performance transparency ensures:
a) The system is always fast
b) Users manage system resources
c) The system adapts automatically to load
d) Services are manually tuned by users
Q18. Scaling transparency allows:
a) Users to manually manage scaling
b) The system to expand without user intervention
c) Scaling only at deployment time
d) No need for scalability
19. Openness and Standards
Q19. The openness of a distributed system is determined by:
a) Closed interfaces and proprietary protocols
b) The speed of internal processes
c) Its ability to be extended and interact with other systems
d) Number of physical machines used
Q20. Standardization in open distributed systems helps in:
a) Limiting third-party access
b) Ensuring portability and interoperability
c) Reducing compatibility
d) Encouraging vendor lock-in
21. Scalability Challenges
Q21. Which of the following is a scalability challenge in distributed systems?
a) Managing replicated data across multiple nodes
b) Using a single operating system
c) Having only one database
d) Preventing remote access
Q22. Geographical scalability refers to:
a) Location transparency
b) Maintaining performance across large distances
c) Hosting services on one machine
d) The use of cloud only in one city
Q23. Administrative scalability involves:
a) Using only one administrator
b) Managing more administrative domains effectively
c) Removing all admin interfaces
d) Increasing memory instead of users
24. False Assumptions in Distributed Systems
Q24. Which of the following is a false assumption about distributed systems?
a) The network is reliable
b) Latency is zero
c) Bandwidth is infinite
d) All of the above
Q25. A common design mistake in distributed systems is to assume:
a) Services will be unavailable
b) The topology won’t change
c) The network may be slow
d) Partial failure can happen
Developing Distributed Systems: Pitfalls
1. Which of the following is a false assumption often made in distributed systems?
A) The network is always congested
B) The network topology changes frequently
C) The network is secure
D) Latency is always high
Answer: C
2. What is a major consequence of false assumptions in distributed systems
development?
A) Simplified system integration
B) Reduced development time
C) Unnecessary complexity due to patching
D) Enhanced reliability
Answer: C
Types of Distributed Systems
3. Which of the following is NOT one of the three major types of distributed systems?
A) Distributed information systems
B) Distributed artificial intelligence systems
C) Distributed systems for pervasive computing
D) High performance distributed computing systems
Answer: B
Parallel Computing and Memory Models
4. Which of the following is a challenge of using multicomputers compared to
multiprocessors?
A) Too much shared memory
B) Easier programming model
C) Harder to implement shared-memory abstraction
D) High internal latency
Answer: C
Cluster vs Grid Computing
5. What distinguishes grid computing from cluster computing?
A) Grid computing is homogeneous
B) Cluster computing involves dispersed organizations
C) Grid computing is more suitable for wide-area networks
D) Cluster computing uses virtual organizations
Answer: C
Cloud Computing Layers
6. Which layer in cloud computing directly interacts with physical hardware?
A) Application
B) Platform
C) Infrastructure
D) Hardware
Answer: D
7. Which of the following is provided at the platform level of cloud computing?
A) Email services
B) Virtualized hardware
C) API-based storage management
D) Office applications
Answer: C
Cost Analysis of Cloud Migration
8. Which metric represents the benefits of migrating a compute-intensive component?
A) Bs
B) Bc
C) Ms
D) Mc
Answer: B
9. What must be preserved when creating a migration plan for cloud computing?
A) Unlimited bandwidth
B) No latency
C) Transaction correctness
D) One administrator policy
Answer: C
Middleware and Integration
10. What is the purpose of a Transaction Processing Monitor (TPM)?
A) To backup transactions across nodes
B) To isolate servers from clients
C) To coordinate execution of transactions across multiple servers
D) To encrypt transaction messages
Answer: C
11. Which middleware technique allows for time and space decoupling of
communication?
A) Remote Procedure Call
B) File Transfer Protocol
C) Message Oriented Middleware
D) Shared Databases
Answer: C
Pervasive and Mobile Computing
12. Which type of distributed system is characterized by being embedded in the
environment and continuously interacting with users?
A) Mobile computing system
B) Grid computing system
C) Sensor network
D) Ubiquitous computing system
Answer: D
13. Which feature is essential for mobile computing systems?
A) High-performance sensors
B) Static device location
C) Guaranteed connectivity
D) Discovery of local services
Answer: D
Sensor Networks and Energy Efficiency
14. What is a typical issue in duty-cycled sensor networks?
A) Excessive energy consumption due to continuous activity
B) Nodes may not wake up at the same time
C) Unlimited data processing
D) Sensor nodes have too much memory
Answer: B
15. How is synchronization maintained in duty-cycled networks?
A) Through global clocks
B) By keeping nodes always on
C) Through cluster merging using join messages
D) By eliminating duty cycles
Answer: C
Distributed Systems – Additional MCQs
1. Pitfalls in Developing Distributed Systems
1. Which of the following is a false assumption often made when designing distributed
systems?
a) The network latency is measurable
b) The network is secure
c) The network is observable
d) The administrator is always online
Answer: b) The network is secure
2. Which assumption leads to unexpected failures when nodes dynamically join and leave a
system?
a) Bandwidth is limited
b) Latency is zero
c) Topology does not change
d) There are multiple administrators
Answer: c) Topology does not change
2. Types of Distributed Systems
3. Which type of distributed system is most closely associated with context-aware smart
environments?
a) High-performance computing systems
b) Grid systems
c) Pervasive computing systems
d) Distributed database systems
Answer: c) Pervasive computing systems
4. What distinguishes distributed information systems from the other types?
a) They use high-speed interconnects
b) They manage loosely coupled web-based applications
c) They focus on embedded devices
d) They use cluster computing exclusively
Answer: b) They manage loosely coupled web-based applications
3. Cluster, Grid, and Cloud Computing
5. A cluster computing environment is usually:
a) Heterogeneous and geographically distributed
b) Homogeneous and managed by a single node
c) Serverless and elastic
d) Integrated through virtual organizations
Answer: b) Homogeneous and managed by a single node
6. In a grid computing system, what is a virtual organization?
a) A single admin-controlled data center
b) A cloud infrastructure provider
c) A logical group of users for shared resource access
d) A group of mobile devices
Answer: c) A logical group of users for shared resource access
7. Which layer in cloud computing is responsible for offering APIs for managing stored
data?
a) Application
b) Hardware
c) Infrastructure
d) Platform
Answer: d) Platform
8. What is the main benefit of cloud computing for enterprises?
a) Eliminates bandwidth costs
b) Reduces processor overhead
c) Outsourcing IT infrastructure
d) Decentralizing the administrative roles
Answer: c) Outsourcing IT infrastructure
4. Middleware and Application Integration
9. Which type of middleware uses a publish-subscribe model?
a) Remote Procedure Call (RPC)
b) RESTful API
c) Message-Oriented Middleware (MOM)
d) Shared Memory Middleware
Answer: c) Message-Oriented Middleware (MOM)
10. What advantage does messaging have over RPC in integrating applications?
a) Requires strict data schema
b) Strong coupling between sender and receiver
c) Decoupling in time and space
d) Real-time video processing
Answer: c) Decoupling in time and space
5. Pervasive and Mobile Computing
11. Which feature is NOT typically associated with ubiquitous systems?
a) High autonomy
b) Complete user control
c) Context awareness
d) Distributed and transparent networking
Answer: b) Complete user control
12. What is the major challenge of mobile computing systems?
a) User inattention
b) Latency measurement
c) Intermittent connectivity
d) File compression
Answer: c) Intermittent connectivity
13. Which concept describes the idea that people tend to return to specific locations over
time?
a) User-centric mobility
b) Predictive caching
c) Community detection
d) Temporal locality
Answer: d) Temporal locality
6. Sensor Networks
14. What is a key limitation of sensor networks?
a) Redundant memory storage
b) Excess processing power
c) Limited energy and communication capabilities
d) Incompatible with wireless communication
Answer: c) Limited energy and communication capabilities
15. What does a duty cycle define in a sensor node?
a) Storage speed over time
b) Active vs suspended time duration
c) Processor frequency
d) Number of connected nodes
Answer: b) Active vs suspended time duration
16. Why do nodes in low duty-cycle networks risk permanent disconnection?
a) Storage overflow
b) Network address conflicts
c) Clock drift and non-overlapping active periods
d) Excess signal strength
Answer: c) Clock drift and non-overlapping active periods
17. What is the goal of community detection in mobile sensor networks?
a) Restrict users from forming groups
b) Create global topologies
c) Discover localized groups through interactions
d) Reduce memory overhead
Answer: c) Discover localized groups through interactions
7. Miscellaneous
18. In distributed shared memory, what mechanism is typically used to simulate shared
memory across multicomputers?
a) File synchronization
b) Virtual memory mapping
c) TCP/UDP sockets
d) Middleware buffers
Answer: b) Virtual memory mapping
19. Why did distributed shared memory systems largely fail in practice?
a) Security flaws
b) Poor compatibility with Linux
c) Performance could not match multiprocessors
d) Lack of user demand
Answer: c) Performance could not match multiprocessors
20. In which scenario is a TP monitor most useful?
a) Integrating multimedia data
b) Synchronizing time clocks
c) Coordinating distributed transactions
d) Sending sensor readings to clients
Answer: c) Coordinating distributed transactions
Chapter 2
Layered Architecture
1. Which of the following is a benefit of the layered architecture style in distributed
systems?
a) Minimal communication overhead
b) High performance across all layers
c) Separation of concerns and modularity
d) Lack of scalability
✅ Correct answer: c)
2. In a typical layered architecture, the client interacts directly with:
a) The database layer
b) The core logic layer
c) The user interface layer
d) The business rules layer
✅ Correct answer: c)
3. A disadvantage of using a strictly layered architecture is:
a) Easy maintenance
b) Low coupling
c) Increased latency due to layer traversal
d) Reusability of components
✅ Correct answer: c)
Object-Based Architecture
4. Object-based architectural style is primarily characterized by:
a) Stateless interaction between components
b) Function-based interactions
c) Encapsulation of state and behavior
d) Central control
✅ Correct answer: c)
5. Which technology is an example of an object-based middleware system?
a) REST
b) SOAP
c) CORBA
d) MQTT
✅ Correct answer: c)
6. In object-based architecture, communication between objects typically involves:
a) Asynchronous message passing
b) Remote Procedure Calls (RPC) or method invocations
c) Polling mechanisms
d) Shared memory
✅ Correct answer: b)
Resource-Based (RESTful) Architecture
7. RESTful architecture treats everything as:
a) A function
b) A service
c) An object
d) A resource
✅ Correct answer: d)
8. Which HTTP method is typically used to retrieve a resource in REST?
a) POST
b) GET
c) PUT
d) DELETE
✅ Correct answer: b)
9. In RESTful systems, which of the following is NOT a constraint?
a) Statelessness
b) Uniform interface
c) Layered system
d) Object encapsulation
✅ Correct answer: d)
Publish-Subscribe Architecture
10. In the publish-subscribe model, which component is responsible for forwarding
messages to subscribers?
a) Publisher
b) Subscriber
c) Broker or middleware
d) Queue manager
✅ Correct answer: c)
11. A major advantage of the publish-subscribe model is:
a) Tight coupling between sender and receiver
b) Real-time direct communication
c) Loose coupling and scalability
d) Centralized resource sharing
✅ Correct answer: c)
12. Which of the following systems uses a publish-subscribe pattern?
a) HTTP
b) MQTT
c) FTP
d) SOAP
✅ Correct answer: b)
Middleware Design Patterns
13. The “interceptor” pattern in middleware is used to:
a) Provide a user interface
b) Perform transparent processing of requests
c) Handle system crashes
d) Establish static binding
✅ Correct answer: b)
14. The “wrapper” pattern in middleware is mainly used for:
a) Breaking existing services
b) Replacing components
c) Adapting legacy systems to new interfaces
d) Encrypting data
✅ Correct answer: c)
Centralized Architecture
15. In centralized architectures, all processing and control are typically handled by:
a) Multiple client devices
b) Distributed peers
c) A single central server
d) A set of cloud microservices
✅ Correct answer: c)
Client-Server Architecture
1. In a client-server model, the client is typically responsible for:
a) Handling all business logic
b) Managing data storage
c) Requesting services and displaying results
d) Synchronizing server nodes
✅ Correct answer: c)
2. Which of the following is a disadvantage of the client-server architecture?
a) Easy scalability
b) Single point of failure at the server
c) Strong fault tolerance
d) Full decentralization
✅ Correct answer: b)
3. The communication between client and server is typically:
a) Peer-to-peer
b) Broadcast-based
c) Request-response
d) One-way asynchronous
✅ Correct answer: c)
Peer-to-Peer (P2P) Architecture
4. What distinguishes peer-to-peer (P2P) systems from client-server systems?
a) Centralized server control
b) Hierarchical communication
c) Equal roles for all participating nodes
d) Limited scalability
✅ Correct answer: c)
5. Which of the following is a typical application of P2P architecture?
a) Cloud-based email service
b) File sharing (e.g., BitTorrent)
c) DNS servers
d) Web-based banking system
✅ Correct answer: b)
6. A challenge commonly associated with P2P systems is:
a) Lack of redundancy
b) Server bottlenecks
c) Trust and data consistency
d) High licensing cost
✅ Correct answer: c)
Service-Oriented Architecture (SOA)
7. SOA is primarily characterized by:
a) Static linking of services
b) Large monolithic applications
c) Loose coupling and reusability of services
d) Peer-to-peer message exchange
✅ Correct answer: c)
8. In SOA, services typically communicate using:
a) FTP
b) TCP sockets
c) Web protocols like SOAP or REST
d) USB interfaces
✅ Correct answer: c)
9. Which of the following is not a typical benefit of SOA?
a) Service reuse
b) Tight integration between modules
c) Interoperability
d) Scalability
✅ Correct answer: b)
Microservices Architecture
10. A key difference between microservices and traditional monolithic architecture is:
a) Use of a single deployment unit
b) Isolation of services and independent deployment
c) Shared data schema across services
d) Use of one language only
✅ Correct answer: b)
11. Each microservice in a microservices architecture:
a) Shares the same runtime and memory space
b) Operates independently and communicates via APIs
c) Depends on a central service registry for execution
d) Is deployed as part of a monolithic package
✅ Correct answer: b)
12. Which of the following is not an advantage of microservices?
a) Independent scaling of components
b) Faster development cycles
c) Simplified debugging and monitoring
d) Tightly coupled modules
✅ Correct answer: d)
Comparison & Application
13. Which architecture would best suit a real-time multiplayer game requiring fast peer
interactions?
a) Client-server
b) SOA
c) P2P
d) Microservices
✅ Correct answer: c)
14. Which architecture is most commonly used in e-commerce platforms that need to
scale different parts independently (e.g., payment, catalog, recommendations)?
a) Monolithic
b) Microservices
c) Peer-to-peer
d) Centralized
✅ Correct answer: b)
15. In which architecture style would you most likely find a service registry and service
discovery mechanism?
a) Client-server
b) SOA and Microservices
c) P2P
d) Layered
✅ Correct answer: b)
Vertical and Horizontal Distribution
1. Vertical distribution in a distributed system refers to:
a) Replicating data across multiple servers for fault tolerance
b) Running logically different layers of an application on separate servers
c) Distributing users across geographic regions
d) Compressing data before transmission
✅ Correct answer: b)
2. Which of the following is an example of vertical distribution?
a) Multiple web servers handling the same client requests
b) A database server, application server, and web server running on different machines
c) Clients storing replicated data
d) A server deployed in multiple geographic zones
✅ Correct answer: b)
3. Horizontal distribution involves:
a) Assigning different tasks to distinct physical layers
b) Splitting a client or server into identical components working on shared data
c) Replacing centralized components with edge nodes
d) Distributing the database and UI to separate servers
✅ Correct answer: b)
4. Which of the following best illustrates horizontal distribution?
a) Using one server for logic, one for database, and one for UI
b) Deploying multiple backend services across regions
c) Distributing identical processing tasks across multiple worker nodes
d) Distributing user interfaces across device types
✅ Correct answer: c)
5. The primary motivation behind horizontal distribution is to:
a) Separate functionality across system layers
b) Increase geographic redundancy
c) Balance workload across equivalent processing units
d) Reduce software complexity
✅ Correct answer: c)
Peer-to-Peer (P2P) Architecture
6. Which statement best describes a peer-to-peer architecture?
a) Each node acts only as a client or only as a server
b) Nodes act both as client and server simultaneously
c) Nodes rely on a centralized coordinator
d) Nodes only provide services without making requests
✅ Correct answer: b)
7. In P2P systems, the term "servant" refers to:
a) A slave node in a master-slave architecture
b) A specialized server managing peer discovery
c) A process acting as both client and server
d) A passive listener node
✅ Correct answer: c)
8. What is a key characteristic of processes in a P2P system?
a) Central management of all resources
b) Static client-server roles
c) Equal participation in providing and consuming services
d) Isolation from other peers
✅ Correct answer: c)
9. An advantage of P2P over client-server models is:
a) Simplified service logic
b) Reduced network latency
c) Elimination of single points of failure
d) Easier software maintenance
✅ Correct answer: c)
10. Which application scenario is most suitable for a peer-to-peer system?
a) Online banking
b) Content delivery networks
c) File sharing (e.g., torrents)
d) Centralized login systems
✅ Correct answer: c)