АвтоАвтоматизацияАрхитектураАстрономияАудитБиологияБухгалтерияВоенное делоГенетикаГеографияГеологияГосударствоДомДругоеЖурналистика и СМИИзобретательствоИностранные языкиИнформатикаИскусствоИсторияКомпьютерыКулинарияКультураЛексикологияЛитератураЛогикаМаркетингМатематикаМашиностроениеМедицинаМенеджментМеталлы и СваркаМеханикаМузыкаНаселениеОбразованиеОхрана безопасности жизниОхрана ТрудаПедагогикаПолитикаПравоПриборостроениеПрограммированиеПроизводствоПромышленностьПсихологияРадиоРегилияСвязьСоциологияСпортСтандартизацияСтроительствоТехнологииТорговляТуризмФизикаФизиологияФилософияФинансыХимияХозяйствоЦеннообразованиеЧерчениеЭкологияЭконометрикаЭкономикаЭлектроникаЮриспунденкция
|
View Assessment Result
Начало формы
| Family Name:
| Zhashkey
| | Given Name:
| Kuat
| | Login:
| kwatt
| | E-mail:
| 11183@iitu.kz
| | Status:
| Enrolled
|
| Assessment Name:
| Exam 3 Multiple-Choice
| | Instance:
|
|
| Section:
| SSD8-19095426_Computer Science and Software Engineering - 5B070400-CSSE-0903
| | During:
| Spring 2012
| | Section Status:
| Active
|
| For course:
| Networks & Distributed Computing
| | (SSD8)
|
| Corresponding to:
| SSD8
| | At:
| International University of Information Technology (IITU)
| |
| Your performance was as follows:
|
| You took 6 minutes on this assessment from Mon May 21 2012 04:49:04 GMT+0600 (Центральная Азия (зима)) to Mon May 21 2012 04:54:52 GMT+0600 (Центральная Азия (зима)).
|
| 1.
| | For each process that enters the critical region in Lamport's contention-based mutual exclusion, how many messages are sent over the network? (N is the number of processes in the system)
| |
| (a) N + 1 (b) N * (N - 1) (c) 3 * (N - 1) (d) 3 * (N + 1)
|
| Your score on this question is:
| 8.33
|
| Feedback:
| A REQUEST, REPLY, and RELEASE for each other process in the system. See section 3.1.2 of the course notes.
| | | 2.
| | Which of the following are advantages of public-key cryptography (such as RSA)?
- Faster encryption / decryption than private-key cryptography
- Fewer keys to maintain than private-key cryptography
| |
| (a) I and II (b) II only (c) None (d) I only
|
| Your score on this question is:
| 8.33
|
| Feedback:
| See section 3.1.5 of the course notes.
| | | 3.
| | Which of the following can PGP provide?
- Message integrity checking
- Sender authentication
- Secrecy
| |
| (a) III only (b) I, II, and III (c) I and II only (d) I and III only
|
| Your score on this question is:
| 8.33
|
| Feedback:
| See section 3.1.6 of the course notes.
| | | 4.
| | Which of the following statements are true?
- Working on several tasks at the same time in an interleaved fashion can sometimes improve throughput without increasing response time.
- It is sometimes not possible to both maximize throughput and minimize response time.
| |
| (a) None (b) II only (c) I only (d) I and II
|
| Your score on this question is:
| 8.33
|
| Feedback:
| See section 3.1.3 of the course notes.
| | | 5.
| | How are LDAP names represented?
| |
| (a) ASCII strings concatenated with slashes (b) Ordered lists of attribute-value pairs (c) ASCII strings concatenated with periods (dots) (d) Unordered lists of attribute-value pairs
|
| Your score on this question is:
| 8.33
|
| Feedback:
| See section 3.2.4 of the course notes.
| | | 6.
| | Which of the following statements about Java applets are true?
- Applets typically execute inside their own thread or set of threads.
- Applets are complete, self-contained programs.
| |
| (a) I and II (b) I only (c) II only (d) None
|
| Your score on this question is:
| 8.33
|
| Feedback:
| See section 3.2.2 of the course notes.
| | | 7.
| | In which of the following naming services do lookups correspond to a walk from the root to a node of a name tree?
- CORBA's name service
- LDAP
- SLP
| |
| (a) I and II only (b) II and III only (c) I, II, and III (d) I only
|
| You did not answer this question.
|
| Your score on this question is:
| 0.00
|
| Feedback:
| See section 3.2.4 of the course notes.
| | | 8.
| | How are SLP names represented?
| |
| (a) Unordered lists of attribute-value pairs (b) ASCII strings concatenated with slashes (c) Ordered lists of attribute-value pairs (d) ASCII strings concatenated with periods (dots)
|
| You did not answer this question.
|
| Your score on this question is:
| 0.00
|
| Feedback:
| See section 3.2.4 of the course notes.
| | | 9.
| | Which of the following do RPC/RMI packages typically support?
- Heterogeneity across platforms
- Heterogeneity across languages environments
- Support for dynamic interfaces
| |
| (a) I, II, and III (b) I only (c) I and II only (d) II only
|
| Your score on this question is:
| 0.00
|
| Feedback:
| See section 3.3.1 of the course notes.
| | | 10.
| | Which of the following are true of CORBA's dynamic discovery of interfaces?
- Parameter values are matched by the number and type of the parameters.
- Parameter values can be provided by a human user at run time.
| |
| (a) I only (b) I and II (c) II only (d) None
|
| Your score on this question is:
| 8.33
|
| Feedback:
| See section 3.3.2 of the course notes.
| | | 11.
| | Which of the following are advantages of Jini over CORBA?
- Language independence
- Dynamic method invocation
- Dynamically downloaded service object
| |
| (a) I and III only (b) III only (c) II and III only (d) I, II, and III
|
| Your score on this question is:
| 8.33
|
| Feedback:
| See section 3.3.3 of the course notes.
| | | 12.
| | Which of the following statements are true about CORBA?
- Using the CORBA IDL, existing code written in procedural languages can be made to look like objects using IDL wrappers
- IDL code can be generated automatically from the code of many OO languages
- The IDL code can be used to generate implementation code automatically in one of many OO languages
| |
| (a) I only (b) I and II only (c) II and III only (d) I, II, and III
|
| Your score on this question is:
| 8.33
|
| Feedback:
| See section 3.3.2 of the course notes. See section 3.3.2 of the course notes.
| |
| © Copyright 2003 iCarnegie, Inc. All rights reserved.
| 1 | 2 | Поиск по сайту:
|