Which of the following statements is incorrect for Parallel Virtual Machine (PVM)? (A) The PVM Communication model provides asynchronous blocking send, asynchronous blocking receive and non-blocking receive function. (B) Message buffers are allocated dynamically. (C) The PVM communication model assumes that any task can send a message to any other PVM task and that there is no limit to the size or number of such messages. (D) In PVM Model, the message order is not preserved. 

1 Answer

Answer :

(D) In PVM Model, the message order is not preserved.

Related questions

Description : The Internet Control Message Protocol (ICMP) A. allows gateways to send error acontrol messages toother gateways or hosts B. provides communication between the Internet Protocol Software on one machine ... and takeaction to correct theproblem D. All of theabove E. None of the above

Last Answer : All of theabove

Description : Are Facebook messages preserved after blocking?

Last Answer : answer:Just tested this: The messages stay, but you’ll no longer be able to reply.

Description : Which of the following is not valid with reference to Message Passing Interface (MPI)? (A) MPI can run on any hardware platform (B) The programming model is a distributed memory model. (C) All ... implicit. (D) MPI - Comm - Size returns the total number of MPI processes in specified communication.

Last Answer : (C) All parallelism is implicit.

Description : A process that execute only in main memory is referred to as ……………… and that allocated in disk is referred to a ……………. A) virtual memory, true memory B) virtual memory, real memory C) real memory, virtual memory D) imaginary memory, real memory

Last Answer : C) real memory, virtual memory

Description : In ________ TDM, slots are dynamically allocated to improvebandwidth efficiency. A) synchronous B) statistical C) isochronous D) none of the above

Last Answer : statistical

Description : The name of the protocol which provides virtual terminal in TCP/IP model is. A) Telnet B) SMTP C) HTTP

Last Answer : A) Telnet

Description : Consider the following statements: (a) Depth - first search is used to traverse a rooted tree. (b) Pre - order, Post-order and Inorder are used to list the vertices of an ordered rooted tree. (c) Huffman's algorithm is used to find an optimal ... (d) (C) (a) , (b) and (c) (D) (a), (b) , (c) and (d)

Last Answer : (D) (a), (b) , (c) and (d)

Description : Consider the following two statements: (a) A publicly derived class is a subtype of its base class. (b) Inheritance provides for code reuse. Which of the following statements is correct? (A) Both the statements ( ... ) is correct and (b) is incorrect (D) Statement (a) is incorrect and (b) is correct

Last Answer : Answer: A

Description : Which one of the following statements, related to the requirements phase in Software Engineering, is incorrect ? (A) Requirement validation is one of the activities in the requirements phase. (B) ... . (D) Function points is one of the most commonly used size metric for requirements. 

Last Answer : (C) “Modelling-oriented approach” is one of the methods for specifying the functional specifications. 

Description : Which of the following statement is incorrect? a. The difference between synchronous and asynchronous transmission is the clocking derived from the data in synchronous transmission. b. Half ... in online activities d. Batch processing is the prefered processing mode for telecommunication operation.

Last Answer : Batch processing is the prefered processing mode for telecommunication operation.

Description : PubNub publishes and subscribes _________ in order to send and receive messages. a) Network b) Account c) Portal d) Keys

Last Answer : d) Keys

Description : In asynchronous serial communication the physical layer provides ___________ a. start and stop signalling b. flow control c. both start & stop signalling and flow control d. only start signalling

Last Answer : c. both start & stop signalling and flow control

Description : Match the following. i) Mutual exclusion a) A process may hold allocated resources while waiting assignment. ii) Hold and wait b) No resource can be forcibly removed from a process holding it. iii) No preemption c) Only one process may use ... , ii-c, iii-b C) i-b, ii-c, iii-a D) i-c, ii-a, iii-b

Last Answer : D) i-c, ii-a, iii-b

Description : Match the following mechanisms for interrupting the execution of a process and their uses. i) Interrupt a) Call to an operating system function ii) Trap b) Reaction to an asynchronous external event iii) Supervisor Call c) Handling of a error ... -a, iii-b C) i-b, ii-c, iii-a D) i-a, ii-c, iii-b

Last Answer : C) i-b, ii-c, iii-a

Description : The compiled java program can run on any ..................... plateform having Java Virtual Machine (JVM) installed on it. A) program B) java C) hardware D) non java

Last Answer : C) hardware

Description : ………. Involves treating main memory as a resource to be allocated to and shared among a number of active processes. A) Partition management B) Memory management C) Disk management D) All of the above

Last Answer : B) Memory management

Description : Suppose that the number of instructions executed between page faults is directly proportional to the number of page frames allocated to a program. If the available memory is doubled, the mean interval between page faults is also ... memory were available? (A) 60 sec (B) 30 sec (C) 45 sec (D) 10 sec

Last Answer : Answer: C Explanation: T = Ninstr x 1µs + 15,000 x 2,000 µs = 60s Ninstr x 1µs = 60,000,000 µs - 30,000,000 µs = 30,000,000 µs Ninstr = 30,000,000 The number of instruction ... doesn't mean that the program runs twice as fast as on the first system. Here, the performance increase is of 25%.

Description : What is redundancy in messages? (a) Information that recipient has already receive (b) Extra information to persuade the receiver to accept and act upon the message (c) Parts of the message that have no meaning and could be eliminated (d) Message that have no purpose and need not be retained

Last Answer : (b) Extra information to persuade the receiver to accept and act upon the message 

Description : Which of the following is incorrect for virtual memory? (1) Large programs can be written (2) More I/O is required (3) More addressable memory available (4) Faster and easy swapping of process

Last Answer : Answer: 2

Description : Which statement best describes the Software as a Service cloud delivery model? A. A virtual machine provisioned and provided from the cloud which allows the customer to deploy custom ... and run the application on the customer's own computers and simplifying maintenance and support.

Last Answer : An application delivered to the client from the cloud which eliminates the need to install and run the application on the customer's own computers and simplifying maintenance and support.

Description : Which transmission mode is used for data communication along telephone lines? (A) Parallel (B) Serial (C) Synchronous (D) Asynchronous

Last Answer : (B) Serial

Description : ..................... provides a larger sized of virtual memory but require virtual memory which provides multidimensional memory. A) Paging method B) Segmentation method C) Paging and segmentation method D) None of these

Last Answer : B) Segmentation method

Description : Which is the correct statement(s) for Non Recursive predictive parser? S1: First(α) = {t | α => * t β for some string β } => *tβ S2: Follow(X) = { a | S => * αXa β for some strings ... and S2 is correct. (C) S1 is correct and S2 is incorrect. (D) Both statements S1 and S2 are correct. 

Last Answer : (D) Both statements S1 and S2 are correct.

Description : Why would my cellphone not receive/send messages to one particular person, when all other text messages seem to be going through?

Last Answer : Do you two have different cell phone service providers? I am guessing one of you has a low end company.

Description : Which layer of OSI reference model is responsible for decomposition of messages and generation of sequence numbers to ensure correct re-composition from end to end of the network? (A) Physical (B) Data-link (C) Transport (D) Application

Last Answer : (C) Transport 

Description : I am not able to send or receive MMS messages from my phone?

Last Answer : You probably need the settings sent to the phone by your network provider.

Description : If i get an unlocked cell phone, some people say that i wont be able to send/receive MMS messages, is this true?

Last Answer : Some people say that the earth is flat. The phone will not change simple because it is locked or unlocked. The features that you mention will be available as long as the carrier that you use supports them.

Description : Is there any SMS software that will allow me to send and receive text messages from my computer?

Last Answer : I have some SMS software called VisualGSM, and it's worked really well. Utilize premium send SMS to send bulk SMS messages.

Description : The model that assumes that effort and development time are functions of product size alone is (A) Basic COCOMO model (B) Intermediate COCOMO model (C) Detailed COCOMO model (D) All the three COCOMO models

Last Answer : (A) Basic COCOMO model

Description : You have to sort a list L, consisting of a sorted list followed by a few ‘random’ elements. Which of the following sorting method would be most suitable for such a task ? (A) Bubble sort (B) Selection sort (C) Quick sort (D) Insertion sort

Last Answer : (D) Insertion sort

Description : Application layer protocol defines ____ a.types of messages exchanged b.message format, syntax and semantics c.rules for when and how processes send and respond to messages d.all of the mentioned

Last Answer : d.all of the mentioned

Description : The distributed system is a collection of (P) and communication is achieved in distributed system by (Q) , where (P) and (Q) are : (A) Loosely coupled hardware on tightly ... message passing ,respectively. (D) Loosely coupled software on tightly coupled hardware and file sharing, respectively.

Last Answer : (C) Tightly coupled software on loosely coupled hardware and message passing ,respectively. 

Description : Which of the following is not required by PSA No. 315, "Consideration of Fraud in a Financial Statement Audit"? a. Conduct a continuing assessment of the risks of material ... professional skepticism, which includes an attitude that assumes balances are incorrect until verified by the audito

Last Answer : Conduct the audit with professional skepticism, which includes an attitude that assumes balances are incorrect until verified by the audito

Description : In______, each station is allocated a band to send its data. In other words, each band is reservedfor a specific station,and it belongs to the station all the time. A) FDMA B) TDMA C) CDMA D) none of the above

Last Answer : FDMA

Description : The essential difference between traps and interrupts is (A) traps are asynchronous and interrupts are synchronous with the program (B) traps are synchronous and interrupts are asynchronous with the program ( ... synchronous and interrupts are asynchronous with the I/O devices. (D) None of these.

Last Answer : (B) traps are synchronous and interrupts are asynchronous with the program

Description : ……………. Can be defined as the permanent blocking of a set of processed that either complete for system resources or communicate with each other. A) Deadlock B) Permanent lock C) Starvation D) Mutual exclusion

Last Answer : A) Deadlock

Description : Station A uses 32 byte packets to transmit messages to station B using sliding window protocol. The round trip delay between A and B is 40 milli seconds and the bottleneck bandwidth on the path between A and B is 64 kbps. The optimal window size of A is (1) 20 (2) 10 (3) 30 (4) 40

Last Answer : (2) 10

Description : The term ________ means that IP provides no error checking or tracking. IP assumes the unreliabilityof the underlying layers and does its best to get a transmission throughto its destination,but with ... ) reliable delivery B) connection-oriented delivery C) best-effort delivery D) noneof the above

Last Answer : best-effort delivery

Description : I have the iPhone with AT&T, when I receive a multi-media message a text message pops up and provides u w/ a message ID and password and a link to viewmymessage.com, well sometimes the site won't ... the server stopped responding" I have full signal when this happens, any ideas on what I can do?"?

Last Answer : It doesn’t work with mobile Safari. You need to use a computer.

Description : Consider the following statements for priority queue: S1: It is a data structure in which the intrinsic ordering of the elements does determine the result of its basic operations. S2: The elements of a priority queue ... . (C) SI is incorrect and S2 is correct. (D) Both S1 and S2 are correct.

Last Answer : (D) Both S1 and S2 are correct.

Description : Which one of the following statements is incorrect ? (A) Pareto analysis is a statistical method used for analyzing causes, and is one of the primary tools for quality management. (B) Reliability of ... (D) In white-box testing, the test cases are decided from the specifications or the requirements.

Last Answer : (D) In white-box testing, the test cases are decided from the specifications or the requirements.

Description : The virtual address generated by a CPU is 32 bits. The Translation Lookaside Buffer (TLB) can hold total 64 page table entries and a 4-way set associative (i.e. with 4- cache lines in the set). The page size is 4 KB. The minimum size of TLB tag is (A) 12 bits (B) 15 bits (C) 16 bits (D) 20 bits

Last Answer : (C) 16 bits Explanation: VirtualAddress = 32 bits PageSize = 4KB = 12 bits therefore : VPNTag = 20 bits, OffsetTag = 12 bits TLBEntryLength = VPNTag = 20 bits TotalTLBEntries = 64, 4-way implies ... therefore : TLBIndex = 4 bits TLBTag = TLBEntryLength - TLBIndex = 20 - 4 = 16 bits

Description : A virtual memory has a page size of 1K words. There are eight pages and four blocks. The associative memory page table contains the following entries:  Which of the following list of virtual addresses (in ... 1234, 4012, 5000, 6200 (C) 1020, 3012, 6120, 8100 (D) 2021, 4050, 5112, 7100

Last Answer : Answer: C Explanation: The pages which are not in main memory are: 1020 will not cause page fault (1024-2047) 3012 will not cause page fault (3072-4095) 6120 will not cause page fault (4096-5119) 8100 will not cause page fault (6144-7167)

Description : $ Minerals such as carbonates and phosphates acts as buffers. ! Biomolecules contain only 25 elements out of the 109 known elements.

Last Answer : $ Minerals such as carbonates and phosphates acts as buffers. ! Biomolecules contain only 25 elements out of ... wrong D. If both As and R are wrong.

Description : Which one of the following statements about buffers is false? a. They work inside cells. b. They consist of a weak acid and weak base. c. They prevent pH shifts. d. They enhance chemical reactions.

Last Answer : d. They enhance chemical reactions.

Description : Which of the following statements on DRAM are correct? i) Page mode read operation is faster than RAS read. ii) RAS input remains active during column address strobe. iii) The row and column addresses are strobed into the ... RAS and CAS inputs respectively. a) i & iii b) i & ii c) all d) iii

Last Answer : d) iii

Description : Which of the following statements is/are true w.r.t. Enterprise Resource Planning (ERP)? (A) ERP automates and integrates majority of business processes. (B) ERP provides access to information in a Real Time Environment. (C) ERP is ... (A) and (B) true; (C) false (4) (A) true; (B) and (C) are false

Last Answer : Answer: 3

Description : In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is ................ (1) 2 bytes (2) 1 byte (3) 4 bytes (4) 5 bytes

Last Answer : (4) 5 bytes