1. The A in ACID, as used in transaction semantics,
stands for Atomicity. What does this mean and why is this property important?
2. What does the term Introspection mean in Java? Give
one example of where Introspection is useful.
3. Explain why depth first search is relevant to object
serialization.
4. What is LRU and how is it relevant to web container
management?
5.
Under what circumstances is JSP more appropriate than
a Servlet.
6. Let A and B be two participants in a secure
transaction. Further let their respective public/private key pairs be
<PuA,
PrA>,
<PuB,
PrB>.
Finally, let the public key encryption/decryption algorithm be represented by
the functions
Encrypt(plaintext, key) and Decrrypt(ciphertext, key)
Using the above terminology, describe how A
might securely send the message M to
B. Show any actions that A needs to do to prepare the message
for secure delivery and that B must
subsequently do to receive the message.
7. Describe how tuples can be
used to do barrier synchronization. Be specific. We will assume that 10 threads
must arrive at the barrier before any may continue past it. Using write, read
and take, show the actions necessary to initialize the
barrier and then use it.
8. Why is a lease useful in managing remote object
references?
9.
How does an
10. How might packet storms arise when an object request
broker recovers from a crash? How does Jini avoid
these storms?
11. Describe a distributed search as you might encounter
in a P2P system. Why does this not take order of the number of nodes in the net
time?