Exam 18: Distributed Process Management
Exam 1: Computer Systems Overview45 Questions
Exam 2: Operating System Overview45 Questions
Exam 3: Process Description and Control45 Questions
Exam 4: Threads45 Questions
Exam 5: Concurrency: Mutual Exclusion and Synchronization45 Questions
Exam 6: Concurrency: Deadlock and Starvation45 Questions
Exam 7: Memory Management45 Questions
Exam 8: Virtual Memory45 Questions
Exam 9: Uniprocessor Scheduling45 Questions
Exam 10: Multiprocessor and Real-Time Scheduling45 Questions
Exam 11: Io Management and Disk Scheduling45 Questions
Exam 12: File Management45 Questions
Exam 13: Embedded Operating Systems45 Questions
Exam 14: Computer Security Threats45 Questions
Exam 15: Computer Security Techniques45 Questions
Exam 16: Distributed Processing, Clientserver, and Clusters45 Questions
Exam 17: Network Protocols45 Questions
Exam 18: Distributed Process Management45 Questions
Select questions type
The __________ algorithm can be used to provide a checkpoint of a distributed algorithm to allow rollback and recovery if a failure is detected.
Free
(Multiple Choice)
4.7/5
(35)
Correct Answer:
C
A __________ records the state of a process and includes a record of all messages sent and received on all channels.
Free
(Short Answer)
4.8/5
(43)
Correct Answer:
snapshot
A __________ process transfer involves only processes that have not begun execution and hence do not require transferring the state of the process.
Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
C
_________ is the permanent blocking of a set of processes that either compete for system resources or communicate with one another.
(Short Answer)
4.8/5
(36)
Algorithms for mutual exclusion and deadlock must depend on access to common memory.
(True/False)
4.8/5
(36)
The aim of an algorithm that deals with deadlock is either to prevent the formation of a circular wait or to detect its actual or potential occurrence.
(True/False)
5.0/5
(42)
In _________ , deadlocks occurs if each process in a set of processes requests a resource held by another process in the set.
(Multiple Choice)
4.8/5
(46)
A distributed snapshot algorithm assumes that messages are delivered in the order that they are sent and that no messages are lost.
(True/False)
4.8/5
(48)
With _________ control, the sites are organized in a tree structure, with one site serving as the root of the tree.
(Short Answer)
4.9/5
(28)
A true global state cannot be determined because of the time lapse associated with message transfer.
(True/False)
4.9/5
(39)
__________ means that no resource can be forcibly removed from a process holding it.
(Multiple Choice)
4.9/5
(32)
An advantage to nonpreemptive process migration is that it reacts well to sudden changes in load distribution.
(True/False)
4.7/5
(36)
The _________ of a process is the sequence of messages that have been sent and received along channels incident with the process.
(Short Answer)
4.8/5
(40)
An alternative approach to mutual exclusion involves the passing of a _________ among participating processes.
(Short Answer)
4.9/5
(35)
"A closed chain of processes exists, such that each process holds at least one resource needed by the next process in the chain," is a description of a __________ .
(Multiple Choice)
4.9/5
(35)
The __________ strategy transfers only those pages of the address space that are in main memory and have been modified.
(Multiple Choice)
4.7/5
(45)
One site is responsible for deadlock detection with _________ control.
(Short Answer)
4.8/5
(38)
In __________ , messages are the resources for which processes wait and deadlock occurs if each process in a set is waiting for a message from another process in the set and no process in the set ever sends a message.
(Short Answer)
4.9/5
(37)
A property of a fully __________ algorithm is that all nodes expend equal effort, on average, in effecting a final decision.
(Multiple Choice)
4.8/5
(33)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)