In distributed systems, link and site failure
is detected by ___________
a) polling
b) handshaking
c) token passing
d) none of the mentioned

1 Answer

Answer :

handshaking

Related questions

Description : In the _______ method, the primary device controls the link; thesecondary devices follow its instructions. A) reservation B) polling C) token passing D) none of the above

Last Answer : polling

Description : Inthe _________ method, a special packet called a ______ circulates through the ring. A) reservation: control frame B) polling: poll request C) token passing: token D) none of the above

Last Answer : token passing: token

Description : In the _______ method, each station has a predecessorand a successor. A) reservation B) polling C) token passing D) none of the above

Last Answer : token passing

Description : In the _______ method, thestations in a network areorganizedin a logical ring. A) reservation B) polling C) token passing D) none of the above

Last Answer : token passing

Description : In the ______ method, all dataexchanges mustbe made throughthe primarydevice even when theultimate destinationis a secondary device. A) reservation B) polling C) token passing D) none of the above

Last Answer : polling

Description : In the _____ method, time isdivided into intervals. In each interval, a reservation frameprecedes the dataframes sent in that interval. A) reservation B) polling C) token passing D) none of the above

Last Answer : reservation

Description : In the ________ method, a stationneeds to make a reservationbefore sending data. Time is divided into intervals. A) reservation B) polling C) token passing D) none of the above

Last Answer : reservation

Description : The process wherein the processor constantly checks the status flags is called as ___________ a) Polling b) Inspection c) Reviewing d) Echoing

Last Answer : Polling

Description : In distributed system, each processor has its own ___________ a) local memory b) clock c) both local memory and clock d) none of the mentioned

Last Answer : both local memory and clock

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) The Distributed ... CardSpace specifications support the authentication type of data object d) None of the mentioned

Last Answer : The OpenID and

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) Services that provide digital ... a domain as belonging to a set of assigned addresses d) None of the mentioned

Last Answer : IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses

Description : Point out the correct statement. a) Cloud computing by its very nature spans same jurisdictions b) SaaS is much more than simply providing an anonymous service token to an identity c) A Compliance as a Service application would need to serve as a trusted third party d) All of the mentioned

Last Answer : A Compliance as a Service application would need to serve as a trusted third party

Description : Point out the wrong statement. A. Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems B. The Distributed Audit ... CardSpace specifications support the authentication type of data object D. All of the above

Last Answer : The OpenID and CardSpace specifications support the authentication type of data object

Description : Which amongst the following is not an advantage of Distributed systems? a) Resource sharing b) Incremental growth c) Reliability d) None of the above

Last Answer : Reliability

Description : Which of the following allows a distributed ID system to write and enforce custom policy expressions? a) XACML b) XML c) SOAP d) None of the mentioned

Last Answer : XACML

Description : Which of the following allows a distributed ID system to write and enforce custom policy expressions? a) XACML b) XML c) SOAP d) None of the mentioned

Last Answer : XACML

Description : Which of the following standard connect distributed hosts or tenants to their provisioned storage in the cloud? a) CDMI b) OCMI c) COA d) All of the mentioned

Last Answer : CDMI

Description : Point out the wrong statement. a) You can use proxy and brokerage services to separate clients from direct access to shared cloud storage b) Any distributed application has a much ... doesn't have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications d) All of the mentioned

Last Answer : Cloud computing doesn’t have CSE-R17.BLOGSPOT.COM vulnerabilities associated with Internetapplications

Description : Point out the correct statement. a) Service Oriented Architecture (SOA) describes a standard method for requesting services from distributed components and managing the results b) SOA provides the ... written in different languages and can use multiple messaging protocols d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following standard connect distributed hosts or tenants to their provisioned storage in the cloud? a) CDMI b) OCMI c) COA d) All of the mentioned

Last Answer : CDMI

Description : Point out the correct statement. a) Service Oriented Architecture (SOA) describes a standard method for requesting services from distributed components and managing the results b) SOA provides the ... written in different languages and can use multiple messaging protocols d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following describes a message-passing taxonomy for a component- based architecture that provides services to clients upon demand? a) SOA b) EBS c) GEC d) All of the mentioned

Last Answer : SOA

Description : Which of the following describes a message-passing taxonomy for a component- based architecture that provides services to clients upon demand? a) SOA b) EBS c) GEC d) All of the mentioned

Last Answer : SOA

Description : Open-system ___________ tends to evolve more quickly than proprietary systems. A. hardware B. software C. hardware and software D. None of the above

Last Answer : hardware and software

Description : Processes on the remote systems are identified by ___________ a) host ID b) host name and identifier c) identifier d) process ID

Last Answer : host name and identifier

Description : ___________ is a function of the particular enterprise and application in an on-premises deployment. a) Vendor lock b) Vendor lock-in c) Vendor lock-ins d) None of the mentioned

Last Answer : Vendor lock-in

Description : The method of accessing the I/O devices by repeatedly checking the status flags is ___________ a) Program-controlled I/O b) Memory-mapped I/O c) I/O mapped CSE-R17.BLOGSPOT.COM d) None of the mentioned

Last Answer : Program-controlled I/O

Description : The capability of a system to adapt the increased service load is called ___________ a) scalability b) tolerance c) capacity d) none of the mentioned

Last Answer : scalability

Description : Transmission system for a multidrop network A. Taken passing B. Polling C. Switching D. CSMA/CD

Last Answer : B. Polling

Description : ________ is the assignment of a network identity to a specific MAC address that allows systems to be found on networks. a) Internet Hardware Addresses b) Ethernet Software Addresses c) Ethernet Hardware Addresses d) None of the mentioned

Last Answer : Ethernet Hardware Addresses

Description : Point out the wrong statement. a) SaaS applications come in all shapes and sizes b) Every computer user is familiar with SaaS systems c) SaaS software is not customizable d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the correct statement. a) Platforms cannot be based on specific types of development languages, application frameworks, or other constructs b) PaaS systems offer a way to create user ... customers may interact with the software to enter and retrieve data d) All of the mentioned

Last Answer : PaaS systems offer a way to create user interfaces

Description : Which of the following is a virtual machine technology now owned by Oracle that can run various operating systems? a) Vmachines b) VirtualBox c) ThoughtPolice d) None of the mentioned

Last Answer : VirtualBox

Description : Point out the correct statement. a) Cloud computing is a natural extension of many of the design principles, protocols, plumbing, and systems b) Platforms are used to create more easy software c) All SLAs are enforceable as contracts d) All of the mentioned

Last Answer : Cloud computing is a natural extension of many of the design principles, protocols, plumbing, and systems

Description : Point out the wrong statement. a) Large cloud providers with geographically dispersed sites worldwide, therefore, achieve reliability rates that are hard for private systems to achieve b) Private data ... ) A network backbone is a very low-capacity network connection d) None of the mentioned

Last Answer : A network backbone is a very low-capacity network connection

Description : Point out the wrong statement. a) The massive scale of cloud computing systems was enabled by the popularization of the Internet b) Soft computing represents a real paradigm shift in the way in ... with a pay-as-you-go, infinitely scalable, universally available system d) All of the mentioned

Last Answer : Soft computing represents a real paradigm shift in the way in which systems are deployed

Description : Point out the wrong statement. a) Load balancing virtualizes systems and resources by mapping a logical address to a physical address b) Multiple instances of various Google applications are running on different hosts c) Google uses hardware virtualization d) All of the mentioned

Last Answer : Google uses hardware virtualization

Description : Point out the wrong statement. a) AWS S3 essentially lets you create your own cloud storage b) AWS created Availability Zones within regions, which are sets of systems that are isolated from ... adds redundancy to its IaaS systems by allowing EC2 virtual machine instances d) None of the mentioned

Last Answer : None of the mentioned

Description : Which of the following can manage data from CIFS and NFS file systems over HTTPnetworks? a) StorageGRID b) DataGRID c) DiskGRID d) All of the mentioned

Last Answer : StorageGRID

Description : Which of the following feature make cloud-based storage systems highly reliable? a) Redundant networks b) Redundant name servers c) Replication d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) SaaS applications come in all shapes and sizes b) Every computer user is familiar with SaaS systems c) SaaS software is not customizable d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the correct statement. a) Different types of cloud computing service models provide different levels of security services b) Adapting your on-premises systems to a cloud model requires that ... be transferred and stored in an encrypted format for security purpose d) All of the mentioned

Last Answer : Data should be transferred and stored in an encrypted format for security purpose d) All of the mentioned

Description : _________ allows different operating systems to run in their own memory space. a) VGM b) VMc c) VMM d) All of the mentioned

Last Answer : VMM

Description : What is Onion diagram illustrates? a) It illustrates the connection between the layers in communications protocols, such as the International Standards Organization Open Systems Interconnection (ISO OSI) model,or the ... with the kernel at the core c) All of the mentioned d) None of the mentioned

Last Answer : None of the mentioned

Description : .Which of the following feature make cloud-based storage systems highly reliable? a) Redundant networks b) Redundant name servers c) Replication d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) SaaS applications come in all shapes and sizes b) Every computer user is familiar with SaaS systems c) SaaS software is not customizable d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the wrong statement. a) Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware ... A process virtual machine instantiates when a command begins a process d) All of the mentioned

Last Answer : Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host VM

Description : Point out the wrong statement. a) Load balancing virtualizes systems and resources by mapping a logical address to a physical address b) Multiple instances of various Google applications are running on different hosts c) Google uses hardware virtualization d) All of the mentioned

Last Answer : Google uses hardware virtualization

Description : Point out the wrong statement. a) The massive scale of cloud computing systems was enabled by the popularization of the Internet b) Soft computing represents a real paradigm shift in the way in ... with a pay-as-you-go, infinitely scalable, universally available system d) All of the mentioned

Last Answer : Soft computing represents a real paradigm shift in the way in which systems are deployed

Description : Pods are aggregated into pools within an IaaS region or site called an _________ zone. a) restricted b) unavail c) availability d) none of the mentioned

Last Answer : availability