0% found this document useful (0 votes)
25 views

What Are The Benefits of A Network Operating System? What Are The Benefits of A DFS Compared With A File System in A Centralized System?

The document asks several questions about computer networking and operating system concepts including: types of kernels and the kernel used in Linux; the two phase commit protocol; benefits of network and distributed file systems; security threats including those to operating systems and data encryption/decryption; advantages and disadvantages of remote procedure calls (RPC); definitions and conditions for deadlock; access matrices and their uses/implementation; reasons for and problems with using fewer layers than the seven layer ISO networking model; and differences between protection and security.

Uploaded by

remo1423
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views

What Are The Benefits of A Network Operating System? What Are The Benefits of A DFS Compared With A File System in A Centralized System?

The document asks several questions about computer networking and operating system concepts including: types of kernels and the kernel used in Linux; the two phase commit protocol; benefits of network and distributed file systems; security threats including those to operating systems and data encryption/decryption; advantages and disadvantages of remote procedure calls (RPC); definitions and conditions for deadlock; access matrices and their uses/implementation; reasons for and problems with using fewer layers than the seven layer ISO networking model; and differences between protection and security.

Uploaded by

remo1423
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

List the various types of Kernels? Describe two phase commit protocol.

What are the benefits of a Network operating system? What are the benefits of a DFS compared with a file system in a centralized system? Write short notes on Security threats. Write short note on the following:1) operating system security threats. 2) Data encryption and decryption What are the advantages and shortcomings of RPC? Define Deadlock .What are the necessary conditions of deadlock? Explain What is an Access Matrix? Explain the uses and implementation of Access Matrix Even though the ISO model of networking specifies seven layers of functionality, most computer systems use fewer layers to implement a network. Why do they use fewer layers? What problems could the use of fewer layers cause? Differentiate between protection and security Which Kernel is used in LINUX Operating System and Why?

You might also like