adplus-dvertising
frame-decoration

Question

Which one is a common software fault tolerant model for safety critical jobs such as flight control software?

a.

Active-Active config.

b.

Active-Backup config

c.

N-Version Programming

d.

Failover

Posted under Networking

Answer: (c).N-Version Programming

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Which one is a common software fault tolerant model for safety critical jobs such as flight control software?

Similar Questions

Discover Related MCQs

Q. Which one of the following is NOT a Single System Image Clustering Solution?

Q. The MTBF of system should be high for fault tolerant systems with

Q. Which one of the following is a cluster, based on shared nothing model?

Q. One of the common problems seen in a cluster configuration has a name which contains the most complex part of human body.

Q. What is the most common redundancy configuration for HA?

Q. A system has MTBF of 100,000 hours and MTTR of 30 minutes. What is the average down time of the system in one year?

Q. In designing a fault-tolerant system which one of the methods is appropriate?

Q. Which one of the below is measured by MTBF?

Q. Bathtub Curve is used to represent the reliability characteristics of hardware components. Why is this not applicable to software modules?

Q. In a clustered volume manager scenario, identify the incorrect statement.

Q. Identify the correct statements w.r.t. Journal File System (JFS).

Q. Point out the false statement.

Volume can

Q. Which are all the statements valid statements w.r.t volume manager?

Q. With reference to Volume Manager, is the following statement TRUE or FALSE under specific configuration?

Volume manager provides protection against multiple disk failures.

Q. The drawback of data mirroring is

Q. Which statements are true w.r.t SMART disks?

Q. Name the mechanism which provides the highest level of data protection.

Q. The challenges for data protection are

Q. Data protection is required to recover from

Q. Which snapshot technique is space efficient?