Question
a.
Active-Active config.
b.
Active-Backup config
c.
N-Version Programming
d.
Failover
Posted under Networking
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Which one is a common software fault tolerant model for safety critical jobs such as flight control software?
Similar Questions
Discover Related MCQs
Q. Which one of the following is NOT a Single System Image Clustering Solution?
View solution
Q. The MTBF of system should be high for fault tolerant systems with
View solution
Q. Which one of the following is a cluster, based on shared nothing model?
View solution
Q. One of the common problems seen in a cluster configuration has a name which contains the most complex part of human body.
View solution
Q. What is the most common redundancy configuration for HA?
View solution
Q. A system has MTBF of 100,000 hours and MTTR of 30 minutes. What is the average down time of the system in one year?
View solution
Q. In designing a fault-tolerant system which one of the methods is appropriate?
View solution
Q. Which one of the below is measured by MTBF?
View solution
Q. Bathtub Curve is used to represent the reliability characteristics of hardware components. Why is this not applicable to software modules?
View solution
Q. In a clustered volume manager scenario, identify the incorrect statement.
View solution
Q. Identify the correct statements w.r.t. Journal File System (JFS).
View solution
Q. Point out the false statement.
Volume can
View solution
Q. Which are all the statements valid statements w.r.t volume manager?
View solution
Q. With reference to Volume Manager, is the following statement TRUE or FALSE under specific configuration?
Volume manager provides protection against multiple disk failures.
View solution
Q. The drawback of data mirroring is
View solution
Q. Which statements are true w.r.t SMART disks?
View solution
Q. Name the mechanism which provides the highest level of data protection.
View solution
Q. The challenges for data protection are
View solution
Q. Data protection is required to recover from
View solution
Q. Which snapshot technique is space efficient?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Networking? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!