АвтоАвтоматизацияАрхитектураАстрономияАудитБиологияБухгалтерияВоенное делоГенетикаГеографияГеологияГосударствоДомДругоеЖурналистика и СМИИзобретательствоИностранные языкиИнформатикаИскусствоИсторияКомпьютерыКулинарияКультураЛексикологияЛитератураЛогикаМаркетингМатематикаМашиностроениеМедицинаМенеджментМеталлы и СваркаМеханикаМузыкаНаселениеОбразованиеОхрана безопасности жизниОхрана ТрудаПедагогикаПолитикаПравоПриборостроениеПрограммированиеПроизводствоПромышленностьПсихологияРадиоРегилияСвязьСоциологияСпортСтандартизацияСтроительствоТехнологииТорговляТуризмФизикаФизиологияФилософияФинансыХимияХозяйствоЦеннообразованиеЧерчениеЭкологияЭконометрикаЭкономикаЭлектроникаЮриспунденкция

View Assessment Result

Читайте также:
  1. Diana Is Invited to Tea with Tragic Results
  2. II. Experimental results and discussion
  3. Reporting results
  4. Results
  5. Results
  6. Results
  7. Results from the visual book experiment
  8. THE CAUSES, NATURE AND RESULTS OF SEMANTIC CHANGES.
  9. The causes, nature and results оГ semantic change
  10. The results of semantic changes of the meaning of the word.
  11. Using the table above compare the list of professional duties discharged by the notaries in Great Britain and the USA. Tell your classmates about the results of your analysis.


Начало формы

 

 

  Family Name: Zhashkey   Given Name: Kuat   Login: kwatt   E-mail: 11183@iitu.kz   Status: Enrolled

 

  Assessment Name: Exam 3 Multiple-Choice   Instance:  

 

  Section: SSD8-19095426_Computer Science and Software Engineering - 5B070400-CSSE-0903   During: Spring 2012   Section Status: Active

 

  For course: Networks & Distributed Computing   (SSD8)

 

  Corresponding to: SSD8   At: International University of Information Technology (IITU)  
 

 

  Your performance was as follows:

 

  You took 6 minutes on this assessment from Mon May 21 2012 04:49:04 GMT+0600 (Центральная Азия (зима)) to Mon May 21 2012 04:54:52 GMT+0600 (Центральная Азия (зима)).

 

 
Total score: 75.00
 

 

 

 

  1.   For each process that enters the critical region in Lamport's contention-based mutual exclusion, how many messages are sent over the network? (N is the number of processes in the system)  

 

  (a) N + 1 (b) N * (N - 1) (c) 3 * (N - 1) (d) 3 * (N + 1)

 

  Correct answer is (c)

 

  Your score on this question is: 8.33

 

  Feedback: A REQUEST, REPLY, and RELEASE for each other process in the system. See section 3.1.2 of the course notes.  
  2.   Which of the following are advantages of public-key cryptography (such as RSA)?
  1. Faster encryption / decryption than private-key cryptography
  2. Fewer keys to maintain than private-key cryptography
 

 

  (a) I and II (b) II only (c) None (d) I only

 

  Correct answer is (b)

 

  Your score on this question is: 8.33

 

  Feedback: See section 3.1.5 of the course notes.  
  3.   Which of the following can PGP provide?
  1. Message integrity checking
  2. Sender authentication
  3. Secrecy
 

 

  (a) III only (b) I, II, and III (c) I and II only (d) I and III only

 

  Correct answer is (b)

 

  Your score on this question is: 8.33

 

  Feedback: See section 3.1.6 of the course notes.  
  4.   Which of the following statements are true?
  1. Working on several tasks at the same time in an interleaved fashion can sometimes improve throughput without increasing response time.
  2. It is sometimes not possible to both maximize throughput and minimize response time.
 

 

  (a) None (b) II only (c) I only (d) I and II

 

  Correct answer is (d)

 

  Your score on this question is: 8.33

 

  Feedback: See section 3.1.3 of the course notes.  
  5.   How are LDAP names represented?  

 

  (a) ASCII strings concatenated with slashes (b) Ordered lists of attribute-value pairs (c) ASCII strings concatenated with periods (dots) (d) Unordered lists of attribute-value pairs

 

  Correct answer is (b)

 

  Your score on this question is: 8.33

 

  Feedback: See section 3.2.4 of the course notes.  
  6.   Which of the following statements about Java applets are true?
  1. Applets typically execute inside their own thread or set of threads.
  2. Applets are complete, self-contained programs.
 

 

  (a) I and II (b) I only (c) II only (d) None

 

  Correct answer is (b)

 

  Your score on this question is: 8.33

 

  Feedback: See section 3.2.2 of the course notes.  
  7.   In which of the following naming services do lookups correspond to a walk from the root to a node of a name tree?
  1. CORBA's name service
  2. LDAP
  3. SLP
 

 

  (a) I and II only (b) II and III only (c) I, II, and III (d) I only

 

  You did not answer this question.

 

  Correct answer is (a)

 

  Your score on this question is: 0.00

 

  Feedback: See section 3.2.4 of the course notes.  
  8.   How are SLP names represented?  

 

  (a) Unordered lists of attribute-value pairs (b) ASCII strings concatenated with slashes (c) Ordered lists of attribute-value pairs (d) ASCII strings concatenated with periods (dots)

 

  You did not answer this question.

 

  Correct answer is (a)

 

  Your score on this question is: 0.00

 

  Feedback: See section 3.2.4 of the course notes.  
  9.   Which of the following do RPC/RMI packages typically support?
  1. Heterogeneity across platforms
  2. Heterogeneity across languages environments
  3. Support for dynamic interfaces
 

 

  (a) I, II, and III (b) I only (c) I and II only (d) II only

 

  Correct answer is (b)

 

  Your score on this question is: 0.00

 

  Feedback: See section 3.3.1 of the course notes.  
  10.   Which of the following are true of CORBA's dynamic discovery of interfaces?
  1. Parameter values are matched by the number and type of the parameters.
  2. Parameter values can be provided by a human user at run time.
 

 

  (a) I only (b) I and II (c) II only (d) None

 

  Correct answer is (c)

 

  Your score on this question is: 8.33

 

  Feedback: See section 3.3.2 of the course notes.  
  11.   Which of the following are advantages of Jini over CORBA?
  1. Language independence
  2. Dynamic method invocation
  3. Dynamically downloaded service object
 

 

  (a) I and III only (b) III only (c) II and III only (d) I, II, and III

 

  Correct answer is (b)

 

  Your score on this question is: 8.33

 

  Feedback: See section 3.3.3 of the course notes.  
  12.   Which of the following statements are true about CORBA?
  1. Using the CORBA IDL, existing code written in procedural languages can be made to look like objects using IDL wrappers
  2. IDL code can be generated automatically from the code of many OO languages
  3. The IDL code can be used to generate implementation code automatically in one of many OO languages
 

 

  (a) I only (b) I and II only (c) II and III only (d) I, II, and III

 

  Correct answer is (b)

 

  Your score on this question is: 8.33

 

  Feedback: See section 3.3.2 of the course notes. See section 3.3.2 of the course notes.  
  Go to top of assessment.

 

  Total score: 75.00

 

  © Copyright 2003 iCarnegie, Inc. All rights reserved.

 


1 | 2 |

Поиск по сайту:



Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Студалл.Орг (0.01 сек.)