__________ is not one of the eight types of transparency a distributed system can provide.
a) access tranparency
b) failure tranparency
c) security tranparency
d) transaction tranparency
c) security tranparency
Computer Science & Information Technology
You might also like to view...
A member of a structure or of a class is accessed using the
a. Comma operator b. The dot operator c. The indexing operator d. The ampersand operator
Computer Science & Information Technology
AWT components are commonly called ________ components because they are coupled with their underlying peer classes.
A) lightweight B) featherweight C) middleweight D) heavyweight
Computer Science & Information Technology