1exam Flashcards

1
Q

It is a main motivation for contructing distributed system

A

The sharing of resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When all computer systems can fail and the responsibility of system designers is to plan for the consequences of it, is called

A

Independent failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It is one in which components located at networked computers communicate and coordinate

A

A distributed systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

They are three examples of distributed systems

A

Internet, Intranet, and ubiquitous computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

It is the capacity of system to handle shared resources can be increased by adding more resources to the network

A

Concurrency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Its role is to protect an intranet by preventing unauthorized messages leaving or entering

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The portability of many of these devices, together with their ability to
connect conveniently to networks in different places, make this type of
computing possible.

A

Mobile computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It is the harnessing of many small, cheap computacional devices that are
present in user physical environments, including the home, office and
elsewhere.

A

Ubiquitous computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

It is a portion of the Internet that is separately administered and has a
boundary that can be configured to enforce local security polices.

A

An intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

It is a vast interconnected collection of computer networks of many
different types, programs running on the computers connected to it
interact by passing messages, employing a common means of
communication.

A

The internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

They are three of the challenges in
distributed systems that must be meet by
designers to be aware of them are:

A

Heterogeneity, Openness and Scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The Web is based on three main standard
technological components:

A

HTML, URL, and the client-server system architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

They are transparencies that must meet
the distributed systems.

A

Location, failure and performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This challenge is defined as the
concealment from the user and the
application programmer of the separation
of components in a distributed system, so
that the system is perceived as a whole
rather than as a collection of independent
components

A

Transparency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In this challenge both services and
applications provide resources that can be
shared by clients in a distributed systems.

A

Concurrency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This is the lowest-layer which bring the system’s programming
interface up to a level that facilities communication and
coordination between processes.

A

System Platform

17
Q

It is concerned with the placement of a distributed system parts
and the relationships between them.

A

The architectural model of DS

18
Q

It is a layer of software whose purpose is to mask heterogeneity
and provide a convenient programming model to application
programmers.

A

Middleware

19
Q

In this architecture model, a cache is a store of recently used
data objects that is closer than the objects themselves.

A

Proxy servers and caches

20
Q

This term referres to the structuring of software as layers or
modules in a single computer and in terms of services offered
and requested between processes located in the same or
different computers

A

Software architecture design

21
Q

It is a running program that
travels from one computer to
another in a network carrying
out a task on someone’s
behalf, such as collecting
information, eventually
returning with the results.

A

A mobile agent

22
Q

This is the architecture model
that is most cited when
distributed systems are
discussed.

A

Client-Server model

23
Q

It is the form of distribution
that integrates mobile devices
and other devices into a given
network with easy connection,
easy integration, limited
connectivity, etc

A

Spontaneous networking

24
Q

Performance issues arising
from the limited processing
and communication capacities
of computers and networks are
considered under the following
subheadings:

A

Responsiveness, throughput and balancing computational loads.

25
In this architecture all of the processes play similar roles, interacting cooperatively as peers to perform a distributed activity or computation without any distinction between clients and servers.
Peer processes
26
Dependability issues is a requirement in most application domains. We defined the dependability of computer systems as:
Correctness, security and fault tolerance.
27
This is performed when in many cases, we are interested in knowing whether an event (sending or receiving a message) at one process occurred before, after concurrently with another event at another process.
Event ordering
28
In this type of Distributed System, the time to execute each step pf a process has know lower and upper bounds
Synchronous Distributed Systems
29
Each computer in a distributed system has its own internal clock, which can be used by local processes to obtain the value of the current time. This concept refers to the relative amount that a computer clock differs from a perfect reference clock.
Clock drift rate
30
In this type of Distributed System, process execution speed, this is that each step may take an arbitrarily long time.
Asynchronous Distributed Systems
31
When it does not transport a message from p’s outgoing message buffer to q’s incoming message buffer which is known as ‘dropping message’ we are talking about:
Communication omission failures
32
When we say that a process has crashed we mean that it has halted and will no execute any further steps of its program ever, this is a type of:
Process omission failure.
33
To model security threats, we postulate that this element is capable of sending any message to any process and reading or copying any message between a pair of processes.
The enemy in the securoty model
34
In this, we talk about the security of a distributed system that can be achieved by securing the processes and the channels used for their interactions and by protecting the objects that they encapsulate against unauthorized access
The security model
35
Encryption, authentication and Identification some times are used to build __________ as a service layer on top of existing communication services.
Secure channels