Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN: 9780133594140
Author: James Kurose, Keith Ross
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
81. | The simplest way of transferring control is for the old primary to receive __________ from the old backup site. |
a. | Undo logs |
b. | Redo Logs |
c. | Primary Logs |
d. | All of the mentioned |
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by stepSolved in 2 steps
Knowledge Booster
Similar questions
- Which of these controls MapReduce job output directory file count? Pick one: a. Partitioner partitions b. Mappers c. Reducers HDFS Block: Pick one: a. It represents data physically b. It represents data logically c. The partitioner divides map intermediate output key-values into partitions to ensure that each reducer gets the same amount of key-value pairs in MapReduce.arrow_forwardOn your Fedora Linux virtual machine, examine your X Windows configuration. Doesyour system have an /etc/X11/xorg.conf file? If it does not, all relevant informationneeded by X.org has been autodetected. Does your system have any files in the /etc/X11/xorg.conf.d directory? If so, examine their contents. What do these files represent?arrow_forward39. A standalone program that has been modified to work on a LAN by including concurrency controls such as file and record locking is an example of ................ a. LAN intrinsic software b. LAN aware software c. Groupware d. None of thesearrow_forward
- 85. A transaction commits as soon as its commit log record is written to stable storage at the primary and the backup site.This is a. One Safe b. Two Safe c. Two-very Safe d. Very Safearrow_forwardWhen the user runs a program and hits ctrl-c, what happens? a) SIGINT is sent to only the foreground process b) SIGHUP followed by SIGCONT is sent to all background processes c) SIGINT is sent only to the children of the foreground process d) SIGINT is sent to all processes in the foreground process grouparrow_forwardCheck out the Unix/Linux commands ps and kill and their various options. a) Use the ps command to get a list of all your processes and save them in a log.txt file. At a minimum, the following 4 attributes should be recorded in the file for each process: name, process ID (PID), memory usage and CPU time. Attach the generated log file as an answer to this question. b) Open a terminal and get the PID of your editor process. Use the kill command to shut down the editor process. In your answer, show the commands you used to achieve the goal and explain what is what for each command. c) Write a C program that will start an editor process, get its PID, wait 3 seconds, and then terminate the editor process (You can use the exec family of system calls (man exec) to start any program or command from within a C program). d) Write a C program that will constantly monitor all processes (let's say once a second) and kill an editor immediately if it encounters an editor.arrow_forward
- find The find command takes a pattern as a command-line argument and recur- sively searches through directories to find a filename matching that pattern. It should print a relative path starting with "./" for every file/directory that matches. For example, running ./find 1s.c from within the hw2 directory should print ./1s.c. If run from the parent directory, the output would be . /hw2/1s.c. There may be multiple matches. If we run ./find .c from within the hw2 directory, we should see: ./find.c ./1s.c ./tree.c The output does not need to be sorted. If nothing matches, it shouldn't print anything. Pattern matching should be case sensitive.arrow_forwardIn a cooperative mode, if a user program does not give up CPU, how can you re-gain the control of the system? A. RebootB. Control^CC. Wait till it is done.D. None of the above would work.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Computer Networking: A Top-Down Approach (7th Edi...Computer EngineeringISBN:9780133594140Author:James Kurose, Keith RossPublisher:PEARSONComputer Organization and Design MIPS Edition, Fi...Computer EngineeringISBN:9780124077263Author:David A. Patterson, John L. HennessyPublisher:Elsevier ScienceNetwork+ Guide to Networks (MindTap Course List)Computer EngineeringISBN:9781337569330Author:Jill West, Tamara Dean, Jean AndrewsPublisher:Cengage Learning
- Concepts of Database ManagementComputer EngineeringISBN:9781337093422Author:Joy L. Starks, Philip J. Pratt, Mary Z. LastPublisher:Cengage LearningPrelude to ProgrammingComputer EngineeringISBN:9780133750423Author:VENIT, StewartPublisher:Pearson EducationSc Business Data Communications and Networking, T...Computer EngineeringISBN:9781119368830Author:FITZGERALDPublisher:WILEY
Computer Networking: A Top-Down Approach (7th Edi...
Computer Engineering
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:PEARSON
Computer Organization and Design MIPS Edition, Fi...
Computer Engineering
ISBN:9780124077263
Author:David A. Patterson, John L. Hennessy
Publisher:Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:9781337569330
Author:Jill West, Tamara Dean, Jean Andrews
Publisher:Cengage Learning
Concepts of Database Management
Computer Engineering
ISBN:9781337093422
Author:Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:Cengage Learning
Prelude to Programming
Computer Engineering
ISBN:9780133750423
Author:VENIT, Stewart
Publisher:Pearson Education
Sc Business Data Communications and Networking, T...
Computer Engineering
ISBN:9781119368830
Author:FITZGERALD
Publisher:WILEY