Week 11 Flashcards

1
Q

Name the three types of shared memory architectures

A

Database centric

blackboard

Rule-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe database centric memory architectures

A

Coordination is achieved through a database for shared data, typically asynchronously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe a blackboard type shared memory architecture

A

Concurrent tasks or agents synchronously update a common memory data storage (the blackboard) and react to changes on the blackboard made by other agents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe a rule based shared memory architecture?

A

Rules stored with the data in a common area to be applied or queried

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the three types of messaging architectures?

A

Event-driven
Publish-subscribe
Asynchronous message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is event-driven messaging architecture?

A

An underlying system has a list of functions to invoke each time that a particular event happens

State machine

MVC for user interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a publish-subscribe messaging architecture?

A

Agents can ask to hear about particular event (subscribing)

Agents that compute results or identify changes can choose to let other agents know about the change (publishing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an asynchronous message type messaging architecture?

A

Program components maintain mailboxes in which other parts of the programs can send messages to be read when convenient to the receiever.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the two adaptable systems?

A

Plug-ins/modular

Microkernal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe a plugin/modular adaptable system?

A

A running program can have a new pieces added to it on the fly as needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe a microkernal adaptable system?

A

The core of the application (the kernal) is kept as small and as efficient as possible with all other elements added with restricted privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the four types of distributed system architectures?

A

Client-server (2 or 3 tier)

Peer-to-peer

Representational state transfer (REST)

Service-oriented (precursor to cloud systems)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

All printable characters in the ASCII table has a high-order bit of:

A

0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If we don’t store the first 0 of each ascii byte, we can shrink the size of the files by how much?

A

12.5% (1/8)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Bit operations are:

A

~bitwise complement

&bitwise and

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are bit operations typical for?

A

masking

17
Q

How do we use a bitewise complement?

A

Switch 0 to 1 in binary representation.

18
Q

How do we use a bitwise and?

A

Bit remains 1 when both numbers have a 1 in the same spot

19
Q

Bitwise or

A

Bit remains 1 when either number has a 1 in a position

20
Q

Bitwise exclusive or

A

Bit becomes 1 when exactly one of the two numbers has a 1 in the position

21
Q

What is bit masking?

A

THe process of selecting specific bits from a binary representation

22
Q

What are the typical uses of bit masking?

A

Combine lots of options into one integer (give each option its own bit)

Networking (identify subnets from IP addresses)

23
Q

How do we change permissions?

A

Chmod

24
Q

Unix stores all the permissions in a 16 bit word, 1 byte for each class of people.

A

Each bute has one bit for each permission type: 4==read
2==write
1==execute

25
Q

How are default permissions get set?

A

Using a mask. Accessed and set by the unmask command