1exam Flashcards

1
Q

It is a main motivation for contructing distributed system

A

The sharing of resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When all computer systems can fail and the responsibility of system designers is to plan for the consequences of it, is called

A

Independent failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It is one in which components located at networked computers communicate and coordinate

A

A distributed systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

They are three examples of distributed systems

A

Internet, Intranet, and ubiquitous computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

It is the capacity of system to handle shared resources can be increased by adding more resources to the network

A

Concurrency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Its role is to protect an intranet by preventing unauthorized messages leaving or entering

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The portability of many of these devices, together with their ability to
connect conveniently to networks in different places, make this type of
computing possible.

A

Mobile computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It is the harnessing of many small, cheap computacional devices that are
present in user physical environments, including the home, office and
elsewhere.

A

Ubiquitous computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

It is a portion of the Internet that is separately administered and has a
boundary that can be configured to enforce local security polices.

A

An intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

It is a vast interconnected collection of computer networks of many
different types, programs running on the computers connected to it
interact by passing messages, employing a common means of
communication.

A

The internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

They are three of the challenges in
distributed systems that must be meet by
designers to be aware of them are:

A

Heterogeneity, Openness and Scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The Web is based on three main standard
technological components:

A

HTML, URL, and the client-server system architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

They are transparencies that must meet
the distributed systems.

A

Location, failure and performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This challenge is defined as the
concealment from the user and the
application programmer of the separation
of components in a distributed system, so
that the system is perceived as a whole
rather than as a collection of independent
components

A

Transparency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In this challenge both services and
applications provide resources that can be
shared by clients in a distributed systems.

A

Concurrency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This is the lowest-layer which bring the system’s programming
interface up to a level that facilities communication and
coordination between processes.

A

System Platform

17
Q

It is concerned with the placement of a distributed system parts
and the relationships between them.

A

The architectural model of DS

18
Q

It is a layer of software whose purpose is to mask heterogeneity
and provide a convenient programming model to application
programmers.

A

Middleware

19
Q

In this architecture model, a cache is a store of recently used
data objects that is closer than the objects themselves.

A

Proxy servers and caches

20
Q

This term referres to the structuring of software as layers or
modules in a single computer and in terms of services offered
and requested between processes located in the same or
different computers

A

Software architecture design

21
Q

It is a running program that
travels from one computer to
another in a network carrying
out a task on someone’s
behalf, such as collecting
information, eventually
returning with the results.

A

A mobile agent

22
Q

This is the architecture model
that is most cited when
distributed systems are
discussed.

A

Client-Server model

23
Q

It is the form of distribution
that integrates mobile devices
and other devices into a given
network with easy connection,
easy integration, limited
connectivity, etc

A

Spontaneous networking

24
Q

Performance issues arising
from the limited processing
and communication capacities
of computers and networks are
considered under the following
subheadings:

A

Responsiveness, throughput and balancing computational loads.

25
Q

In this architecture all of the
processes play similar roles,
interacting cooperatively as
peers to perform a distributed
activity or computation
without any distinction
between clients and servers.

A

Peer processes

26
Q

Dependability issues is a requirement in most
application domains. We defined the dependability of
computer systems as:

A

Correctness, security and fault tolerance.

27
Q

This is performed when in many cases, we are
interested in knowing whether an event (sending or
receiving a message) at one process occurred before,
after concurrently with another event at another
process.

A

Event ordering

28
Q

In this type of Distributed System, the time to execute
each step pf a process has know lower and upper
bounds

A

Synchronous Distributed Systems

29
Q

Each computer in a distributed system has its own
internal clock, which can be used by local processes to
obtain the value of the current time. This concept
refers to the relative amount that a computer clock
differs from a perfect reference clock.

A

Clock drift rate

30
Q

In this type of Distributed System, process execution
speed, this is that each step may take an arbitrarily
long time.

A

Asynchronous Distributed Systems

31
Q

When it does not transport a message from p’s outgoing
message buffer to q’s incoming message buffer which is
known as ‘dropping message’ we are talking about:

A

Communication omission failures

32
Q

When we say that a process has crashed we mean that it has
halted and will no execute any further steps of its program
ever, this is a type of:

A

Process omission failure.

33
Q

To model security threats, we postulate that this element is
capable of sending any message to any process and reading
or copying any message between a pair of processes.

A

The enemy in the securoty model

34
Q

In this, we talk about the security of a distributed system that
can be achieved by securing the processes and the channels
used for their interactions and by protecting the objects that
they encapsulate against unauthorized access

A

The security model

35
Q

Encryption, authentication and Identification some times are
used to build __________ as a service layer on top of existing
communication services.

A

Secure channels