__________ is not one of the eight types of transparency a distributed system can provide.

a) access tranparency
b) failure tranparency
c) security tranparency
d) transaction tranparency

c) security tranparency

Computer Science & Information Technology

You might also like to view...

A member of a structure or of a class is accessed using the

a. Comma operator b. The dot operator c. The indexing operator d. The ampersand operator

Computer Science & Information Technology

AWT components are commonly called ________ components because they are coupled with their underlying peer classes.

A) lightweight B) featherweight C) middleweight D) heavyweight

Computer Science & Information Technology