Basic CS [TCS Placement]: Sample Questions 127 - 128 of 196

Get unlimited access to the best preparation resource for competitive exams : get questions, notes, tests, video lectures and more- for all subjects of your exam.

Question 127

Basic CS
Edit

Write in Short

Short Answer▾

How can you turn-on and turn-off CAS?

Explanation

  • Code Access Security Tool (Caspol. exe) can be used to turn security on and off.
  • caspol -security off turns off security
  • caspol -security on turns on security
  • In the . NET Framework 4.0, for using Caspol. exe < LegacyCasPolicy > element must be set to true.

Question 128

Edit

Describe in Detail

Essay▾

What is time-stamping?

Explanation

  • A timestamp is the current time of an event that is recorded by a computer.
  • It is a technique proposed by Lamport, used to order events in a distributed system without the use of clocks.
  • This scheme is intended to order events consisting of the transmission of messages.
  • Through mechanisms such as the Network Time Protocol (NTP) , a computer maintains accurate current time, calibrated to minute fractions of a second.
  • Such precision makes it possible for networked computers and applications to communicate effectively.
  • The timestamp mechanism is used for a wide variety of synchronization purposes, such as assigning a sequence order for a multi-event transaction so that if a failure occurs the transaction can be voided.
  • Another way that a timestamp is used is to record time in relation to a particular starting point. In IP telephony.
  • Example: the Real-time Transport Protocol assigns sequential timestamps to voice packets so that they can be buffered by the receiver, reassembled, and delivered without error.
  • When writing a program, the programmer is usually provided an application program interface for a timestamp that the operating system can provide during program execution.
  • Each system ‘i’ in the network maintains a counter Ci.
  • Every time a system transmits a message, it increments its counter by 1 and attaches the time-stamp Ti to the message.
  • When a message is received, the receiving system ‘j’ sets its counter Cj to 1 more than the maximum of its current value and the incoming time-stamp Ti.
  • At each site, the ordering of messages is determined by the following rules: For messages x from site i and y from site j, x precedes y if one of the following conditions holds
    1. if Ti < Tj or
    2. if Ti = Tj and i < j.
Given the Image is Define the Timestamp Concurrency Control Protocols

Developed by: