Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Which of the following is NOT true about RMI? RMI uses the socket connection, in

ID: 3572949 • Letter: W

Question

Which of the following is NOT true about RMI?

RMI uses the socket connection, including opening and closing the socket.

To make remote methods transparent to both the client and the server, RMI implements using stubs and skeletons.

RMI is object-based.

RMI allows a thread to invoke a method on a remote object

Which of the following is NOT a benefit of virtual memory?

increases in the effective access time of memory

the enabling of processes to share memory

system libraries can be shared by several different processes through mapping of the shared object into a virtual address space.

speed up of process creation

2 points

QUESTION 5

The simplest file access method is

logical access.direct access

sequential access.

relative access.

direct access

2 points

QUESTION 6

Which of the following is NOT a primary property of a distributed system?

can provide services through client-server model

allows users to share resources on geographically dispersed hosts connected via a computer network

can provide services through a peer-to-peer model

utilizes multiple processors on the same machine to distribute the work

2 points

QUESTION 7

Suppose that the operating system uses two internal tables to keep track of open files. Process one has two files open and process two has three files open. Two files are shared between the two processes. How many entries are in the per-process table of process one, the per-process table of process two, and the system-wide tables respectively?

2, 3, 3

5, 5, 5

2, 3, 1

2, 3, 5

2 points

QUESTION 8

Order the following file system layers in order of lowest level to highest level

[1] I/O control

[2] logical file system

[3] basic file system

[4] file-organization module

[5] devices

5, 1, 3, 4, 2

1, 5, 3, 4, 2

1, 3, 5, 4, 2

5, 1, 3, 2, 4

2 points

QUESTION 9

Which of the following is a way to deal with deadlocks?

ensure that a system will never enter a deadlocked state

allow the system to enter a deadlocked state and then detect and recover

ignore the deadlock altogether

All of the above.

2 points

QUESTION 10

Consider a page size of 4 bytes and a physical memory of 32 bytes (8 pages). If logical page 1 maps to physical page 3, then logical address 6 (logical page 1, offset 2) maps to physical address

14

15

13

6

2 points

QUESTION 11

Suppose that there are 10 resources available to three processes. At time 0, the following data is collected. The table indicates the process, the maximum number of resources needed by the process, and the number of resources currently owned by each process. Which of the following correctly characterizes this state?

Process Maximum Needs Currently Owned

P0                    10                        4

P1                     3                         1

P2                     6                         4

It is an impossible state.

It is not safe.

cannot be determined

It is safe.

RMI uses the socket connection, including opening and closing the socket.

To make remote methods transparent to both the client and the server, RMI implements using stubs and skeletons.

RMI is object-based.

RMI allows a thread to invoke a method on a remote object

Which of the following is NOT a benefit of virtual memory?

increases in the effective access time of memory

the enabling of processes to share memory

system libraries can be shared by several different processes through mapping of the shared object into a virtual address space.

speed up of process creation

2 points

QUESTION 5

The simplest file access method is

logical access.direct access

sequential access.

relative access.

direct access

2 points

QUESTION 6

Which of the following is NOT a primary property of a distributed system?

can provide services through client-server model

allows users to share resources on geographically dispersed hosts connected via a computer network

can provide services through a peer-to-peer model

utilizes multiple processors on the same machine to distribute the work

2 points

QUESTION 7

Suppose that the operating system uses two internal tables to keep track of open files. Process one has two files open and process two has three files open. Two files are shared between the two processes. How many entries are in the per-process table of process one, the per-process table of process two, and the system-wide tables respectively?

2, 3, 3

5, 5, 5

2, 3, 1

2, 3, 5

2 points

QUESTION 8

Order the following file system layers in order of lowest level to highest level

[1] I/O control

[2] logical file system

[3] basic file system

[4] file-organization module

[5] devices

5, 1, 3, 4, 2

1, 5, 3, 4, 2

1, 3, 5, 4, 2

5, 1, 3, 2, 4

2 points

QUESTION 9

Which of the following is a way to deal with deadlocks?

ensure that a system will never enter a deadlocked state

allow the system to enter a deadlocked state and then detect and recover

ignore the deadlock altogether

All of the above.

2 points

QUESTION 10

Consider a page size of 4 bytes and a physical memory of 32 bytes (8 pages). If logical page 1 maps to physical page 3, then logical address 6 (logical page 1, offset 2) maps to physical address

14

15

13

6

2 points

QUESTION 11

Suppose that there are 10 resources available to three processes. At time 0, the following data is collected. The table indicates the process, the maximum number of resources needed by the process, and the number of resources currently owned by each process. Which of the following correctly characterizes this state?

Process Maximum Needs Currently Owned

P0                    10                        4

P1                     3                         1

P2                     6                         4

It is an impossible state.

It is not safe.

cannot be determined

It is safe.

Explanation / Answer

Not true about RMI - RMI uses the socket connection, including opening and closing the socket.

Not a benifit - increases in the effective access time of memory

5. sequential access

6. utilizes multiple processors on the same machine to distribute the work

7. 2, 3, 3

8. 5,1,3,4,2

9. All of the above

10. 13

11. It is not safe

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote