Which of the following is NOT true about RMI? RMI uses the socket connection, in
ID: 3572949 • Letter: W
Question
Which of the following is NOT true about RMI?
RMI uses the socket connection, including opening and closing the socket.
To make remote methods transparent to both the client and the server, RMI implements using stubs and skeletons.
RMI is object-based.
RMI allows a thread to invoke a method on a remote object
Which of the following is NOT a benefit of virtual memory?
increases in the effective access time of memory
the enabling of processes to share memory
system libraries can be shared by several different processes through mapping of the shared object into a virtual address space.
speed up of process creation
2 points
QUESTION 5
The simplest file access method is
logical access.direct access
sequential access.
relative access.
direct access
2 points
QUESTION 6
Which of the following is NOT a primary property of a distributed system?
can provide services through client-server model
allows users to share resources on geographically dispersed hosts connected via a computer network
can provide services through a peer-to-peer model
utilizes multiple processors on the same machine to distribute the work
2 points
QUESTION 7
Suppose that the operating system uses two internal tables to keep track of open files. Process one has two files open and process two has three files open. Two files are shared between the two processes. How many entries are in the per-process table of process one, the per-process table of process two, and the system-wide tables respectively?
2, 3, 3
5, 5, 5
2, 3, 1
2, 3, 5
2 points
QUESTION 8
Order the following file system layers in order of lowest level to highest level
[1] I/O control
[2] logical file system
[3] basic file system
[4] file-organization module
[5] devices
5, 1, 3, 4, 2
1, 5, 3, 4, 2
1, 3, 5, 4, 2
5, 1, 3, 2, 4
2 points
QUESTION 9
Which of the following is a way to deal with deadlocks?
ensure that a system will never enter a deadlocked state
allow the system to enter a deadlocked state and then detect and recover
ignore the deadlock altogether
All of the above.
2 points
QUESTION 10
Consider a page size of 4 bytes and a physical memory of 32 bytes (8 pages). If logical page 1 maps to physical page 3, then logical address 6 (logical page 1, offset 2) maps to physical address
14
15
13
6
2 points
QUESTION 11
Suppose that there are 10 resources available to three processes. At time 0, the following data is collected. The table indicates the process, the maximum number of resources needed by the process, and the number of resources currently owned by each process. Which of the following correctly characterizes this state?
Process Maximum Needs Currently Owned
P0 10 4
P1 3 1
P2 6 4
It is an impossible state.
It is not safe.
cannot be determined
It is safe.
RMI uses the socket connection, including opening and closing the socket.
To make remote methods transparent to both the client and the server, RMI implements using stubs and skeletons.
RMI is object-based.
RMI allows a thread to invoke a method on a remote object
Which of the following is NOT a benefit of virtual memory?
increases in the effective access time of memory
the enabling of processes to share memory
system libraries can be shared by several different processes through mapping of the shared object into a virtual address space.
speed up of process creation
2 points
QUESTION 5
The simplest file access method is
logical access.direct access
sequential access.
relative access.
direct access
2 points
QUESTION 6
Which of the following is NOT a primary property of a distributed system?
can provide services through client-server model
allows users to share resources on geographically dispersed hosts connected via a computer network
can provide services through a peer-to-peer model
utilizes multiple processors on the same machine to distribute the work
2 points
QUESTION 7
Suppose that the operating system uses two internal tables to keep track of open files. Process one has two files open and process two has three files open. Two files are shared between the two processes. How many entries are in the per-process table of process one, the per-process table of process two, and the system-wide tables respectively?
2, 3, 3
5, 5, 5
2, 3, 1
2, 3, 5
2 points
QUESTION 8
Order the following file system layers in order of lowest level to highest level
[1] I/O control
[2] logical file system
[3] basic file system
[4] file-organization module
[5] devices
5, 1, 3, 4, 2
1, 5, 3, 4, 2
1, 3, 5, 4, 2
5, 1, 3, 2, 4
2 points
QUESTION 9
Which of the following is a way to deal with deadlocks?
ensure that a system will never enter a deadlocked state
allow the system to enter a deadlocked state and then detect and recover
ignore the deadlock altogether
All of the above.
2 points
QUESTION 10
Consider a page size of 4 bytes and a physical memory of 32 bytes (8 pages). If logical page 1 maps to physical page 3, then logical address 6 (logical page 1, offset 2) maps to physical address
14
15
13
6
2 points
QUESTION 11
Suppose that there are 10 resources available to three processes. At time 0, the following data is collected. The table indicates the process, the maximum number of resources needed by the process, and the number of resources currently owned by each process. Which of the following correctly characterizes this state?
Process Maximum Needs Currently Owned
P0 10 4
P1 3 1
P2 6 4
It is an impossible state.
It is not safe.
cannot be determined
It is safe.
Explanation / Answer
Not true about RMI - RMI uses the socket connection, including opening and closing the socket.
Not a benifit - increases in the effective access time of memory
5. sequential access
6. utilizes multiple processors on the same machine to distribute the work
7. 2, 3, 3
8. 5,1,3,4,2
9. All of the above
10. 13
11. It is not safe
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.