CSSE4004 Lecture 1

Question 1 of 14

Medal-premium 1

Which of these is not a form of transparency?

Select one of the following:

  • Retry

  • Relocation

  • Concurrency

  • Access

Question 2 of 14

Medal-premium 1

Which of these is not a form of transparency?

Select one of the following:

  • Access control

  • Location

  • Replication

  • Failure

Question 3 of 14

Medal-premium 1

Which of these is a situation when Decentralized algorithms should be used?

Select one of the following:

  • Failure of one machine does not ruin the algorithm

  • Every machine has complete information about the system state

  • Machines make decisions based only on global information

  • There is a global clock

Question 4 of 14

Medal-premium 1

Which scaling technique does "Split and spread functionality across the system" describe

Select one of the following:

  • Distribution

  • Decentralised algorithms

  • Concurrency

  • Heterogeneity

Question 5 of 14

Medal-premium 1

What are the dimensions of scalability?

Select one of the following:

  • Size, Geographically, Administrativley

  • Size, Geographically

  • Users, Resources

  • CPU, RAM, number of nodes

Question 6 of 14

Medal-premium 1

What does ACID stand for?

Select one of the following:

  • Atomicity, Consistency, Isolation, Durability

  • Atomicity, Correctness, Isolation, Durability

  • Atomicity, Consistency, Independence, Durability

  • Atomicity, Consistency, Isolation, Dependability

Question 7 of 14

Medal-premium 1

Which of these achieves hiding communication latencies?

Select one of the following:

  • Asynchronous communication

  • Caching

  • Multicast

  • Dual network interface

Question 8 of 14

Medal-premium 1

What is the goal of middleware?

Select one of the following:

  • Provide distribution transparency

  • Offer local services to remote clients

  • Hide differences between different systems

  • To provide network reliability

Question 9 of 14

Medal-premium 1

What are Hiding communication latencies, Distribution and Replication?

Select one of the following:

  • Scaling techniques

  • Middleware features

  • Reliability methods

  • The difference between a NOS and DOS

Question 10 of 14

Medal-premium 1

When latency is a problem, which technique should be used if asynchronous communication cannot be used?

Select one of the following:

  • Communication should be reduced

  • Compression should be used

  • You should make multiple concurrent requests while the user is waiting

  • You should upgrade the connection capabilities, eg. to get a gigabit connection

Question 11 of 14

Medal-premium 1

What are the properties of openness?

Select one of the following:

  • Interoperability, Portability, Heterogeneity

  • Cross-platform, XML, Dynamic Invocation

  • Interoperability, Dynamic, Heterogeneity

  • Heterogeneity, Standardization, Interoperability

Question 12 of 14

Medal-premium 1

Which of these are all forms of transparency?

Select one of the following:

  • Access, Location, Concurrency

  • Relocation, Replication, Caching

  • Mitigation, Replication, Failure

  • Access, Connectivity, Migration

Question 13 of 14

Medal-premium 1

What type of transparency is "Hide that a resource may move to another location"

Select one of the following:

  • Migration

  • Location

  • Relocation

  • Transferral

Question 14 of 14

Medal-premium 1

Which of these is NOT a false assumption often made by first time distributed systems developers?

Select one of the following:

  • All systems have the same software

  • Bandwidth is infinite

  • The network is secure

  • There is one administrator

  • The topology does not change

  • The network is homogeneous

Icon_fullscreen

CSSE4004 Lecture 1

tb22
Quiz by , created over 1 year ago

To provide network reliability

Eye 26
Pin 0
Balloon-left 0
Tags
tb22
Created by tb22 over 1 year ago
Close