This section includes 7 InterviewSolutions, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
What Is The Use Of Middleware? |
|
Answer» Middleware a layer of software whose purpose is to mask heterogeneity and to PROVIDE a convenient programming model to application PROGRAMMERS. Middleware is represented by processes or objects in a SET of computers that interact with each other to IMPLEMENT communication and resource sharing support for distributed applications. Middleware a layer of software whose purpose is to mask heterogeneity and to provide a convenient programming model to application programmers. Middleware is represented by processes or objects in a set of computers that interact with each other to implement communication and resource sharing support for distributed applications. |
|
| 2. |
What Are The Different Types Of System Model? |
Answer»
|
|
| 3. |
How We Provide A Security? |
|
Answer» Confidentiality: Protection against disclosure to unauthorized individual. E.g. ACLs (access control lists) to provide authorized access to INFORMATION. Integrity: Protection against alternation or corruption. E.g. changing the account number or amount value in a money ORDER Availability: Protection against interference TARGETING access to the resources. E.g. denial of service (DoS, DDoS) ATTACKS Non-repudiation: Proof of sending / receiving an information. E.g. DIGITAL signature Confidentiality: Protection against disclosure to unauthorized individual. E.g. ACLs (access control lists) to provide authorized access to information. Integrity: Protection against alternation or corruption. E.g. changing the account number or amount value in a money order Availability: Protection against interference targeting access to the resources. E.g. denial of service (DoS, DDoS) attacks Non-repudiation: Proof of sending / receiving an information. E.g. digital signature |
|
| 4. |
What Is The Security Mechanisms Used In Distributed Computing? |
|
Answer»
E.g. Blowfish, RSA Authentication: E.g. password, PUBLIC key authentication Authorization: E.g. access control LISTS Encryption: E.g. Blowfish, RSA Authentication: E.g. password, public key authentication Authorization: E.g. access control lists |
|
| 5. |
Why We Need Openness? |
|
Answer» The degree to which a computer SYSTEM can be extended and re-implemented. IEEE = Institute of Electrical and Electronic Engineers e.g., IEEE 802.11 WLAN, IEEE 802.3 ETHERNET W3C = World WIDE Web Consortium e.g., HTML Recommendations The degree to which a computer system can be extended and re-implemented. IEEE = Institute of Electrical and Electronic Engineers e.g., IEEE 802.11 WLAN, IEEE 802.3 Ethernet W3C = World Wide Web Consortium e.g., HTML Recommendations |
|
| 6. |
Write The Difference Between Mobile And Ubiquitous Computing? |
| Answer» | |
| 7. |
What Are The Disadvantages Of Disadvantages Of Distributed Systems? |
Answer»
|
|
| 8. |
What Are The Advantages Of Distributed Systems? |
Answer»
|
|
| 9. |
Mention The Challenges In Distributed System? |
Answer»
|
|
| 10. |
What Is Mobile And Ubiquitous Computing? |
|
Answer» MOBILE: COMPUTING devices are being CARRIED around. UBIQUITOUS: Little computing devices are all over the place. Mobile: Computing devices are being carried around. Ubiquitous: Little computing devices are all over the place. |
|
| 11. |
Mention The Examples Of Distributed System? |
Answer»
|
|
| 12. |
List The Characteristics Of Distributed System? |
Answer»
|
|
| 13. |
Define Distributed System? |
|
Answer» A distributed system is a collection of INDEPENDENT computers that APPEARS to its users as a single COHERENT system. A distributed system is ONE in which components located at networked communicate and coordinate their actions only by passing message. A distributed system is a collection of independent computers that appears to its users as a single coherent system. A distributed system is one in which components located at networked communicate and coordinate their actions only by passing message. |
|