АвтоАвтоматизацияАрхитектураАстрономияАудитБиологияБухгалтерияВоенное делоГенетикаГеографияГеологияГосударствоДомДругоеЖурналистика и СМИИзобретательствоИностранные языкиИнформатикаИскусствоИсторияКомпьютерыКулинарияКультураЛексикологияЛитератураЛогикаМаркетингМатематикаМашиностроениеМедицинаМенеджментМеталлы и СваркаМеханикаМузыкаНаселениеОбразованиеОхрана безопасности жизниОхрана ТрудаПедагогикаПолитикаПравоПриборостроениеПрограммированиеПроизводствоПромышленностьПсихологияРадиоРегилияСвязьСоциологияСпортСтандартизацияСтроительствоТехнологииТорговляТуризмФизикаФизиологияФилософияФинансыХимияХозяйствоЦеннообразованиеЧерчениеЭкологияЭконометрикаЭкономикаЭлектроникаЮриспунденкция
|
View Assessment Result. Family Name: Saimassayeva Given Name: Sholpan Login: ssaimass
Начало формы
| Family Name:
| Saimassayeva
| | Given Name:
| Sholpan
| | Login:
| ssaimass
| | E-mail:
| 11563@iitu.kz
| | Status:
| Enrolled
|
| Assessment Name:
| Exam 3 Multiple-Choice
| | Instance:
|
|
| Section:
| SSD8-19424325_Information Systems - 5B070300 - IS 0904
| | During:
| Fall 2012
| | Section Status:
| Active
|
| For course:
| Networks & Distributed Computing
| | (SSD8)
|
| Corresponding to:
| SSD8
| | At:
| International University of Information Technology (IITU)
| |
| Your performance was as follows:
|
| You took 19 minutes on this assessment from Thu Dec 06 2012 14:37:52 GMT+0600 (Центральная Азия (зима)) to Thu Dec 06 2012 14:56:08 GMT+0600 (Центральная Азия (зима)).
|
| 1.
| | In a distributed system, most tasks require _____, creating _____.
| |
| (a) multiple copies of files, extra overhead from copying (b) dedicated hardware, extra cost (c) communication between components, security threats (d) the approval of all components in the system, delays
|
| Your score on this question is:
| 8.33
|
| 2.
| | In a distributed system, thrashing is caused
| |
| (a) when one processor accesses the same file over and over (b) when one processor fails, and its tasks must be transferred to another processor (c) when one processor runs one task for too long a time (d) when one processor runs too many tasks at a time
|
| Your score on this question is:
| 8.33
|
| Feedback:
| See section 3.1.3 of the course notes.
| | | 3.
| | A client sends a secure http request to a server that uses SSL. The server responds with a certificate. What is the data in the certificate?
| |
| (a) The client's public key encrypted, using the server's private key (b) A certification authority's public key encrypted, using the server's private key (c) The client's public key encrypted, using the secret key of a certification authority (d) The server's public key encrypted, using the secret key of a certification authority
|
| Your score on this question is:
| 8.33
|
| Feedback:
| See section 3.1.6 of the course notes.
| | | 4.
| | In a distributed system, push and pull algorithms refer to
| |
| (a) which process gets the first token (b) how work is divided among processors (c) a denial-of-service attack algorithm (d) which machine each file is stored on
|
| Your score on this question is:
| 8.33
|
| Feedback:
| See section 3.1.3 of the course notes.
| | | 5.
| | In which of the following naming services do lookups correspond to a walk from the root to a node of a name tree?
- CORBA's name service
- LDAP
- SLP
| |
| (a) I only (b) I, II, and III (c) I and II only (d) II and III only
|
| Your score on this question is:
| 8.33
|
| Feedback:
| See section 3.2.4 of the course notes.
| | | 6.
| | CGI scripts are passed _____ and return _____.
| |
| (a) an HTML form, a URL (b) an HTML form, an HTML document (c) an ASCII string, an HTML document (d) A URL, an HTML form
|
| Your score on this question is:
| 8.33
|
| Feedback:
| See section 3.2.1 of the course notes.
| | | 7.
| | Security problems in mobile code are often dealt with by which of the following techniques:
- run-time checking
- compile-time checking
- precompile checking
- predictive checking
| |
| (a) II and III only (b) IV only (c) I, II, III, and IV (d) I and II only
|
| Your score on this question is:
| 8.33
|
| Feedback:
| See section 3.2.2 of the course notes.
| | | 8.
| | Which of the following statements about Java applets are true?
- Applets typically execute inside their own thread or set of threads.
- Applets are complete, self-contained programs.
| |
| (a) I and II (b) II only (c) I only (d) None
|
| Your score on this question is:
| 8.33
|
| Feedback:
| See section 3.2.2 of the course notes.
| | | 9.
| | Which of the following are true of CORBA's dynamic discovery of interfaces?
- Parameter values are matched by the number and type of the parameters.
- Parameter values can be provided by a human user at run time.
| |
| (a) II only (b) None (c) I and II (d) I only
|
| Your score on this question is:
| 8.33
|
| Feedback:
| See section 3.3.2 of the course notes.
| | | 10.
| | Which of the following do RPC/RMI packages typically support?
- Heterogeneity across platforms
- Heterogeneity across languages environments
- Support for dynamic interfaces
| |
| (a) I only (b) I, II, and III (c) II only (d) I and II only
|
| Your score on this question is:
| 8.33
|
| Feedback:
| See section 3.3.1 of the course notes.
| | | 11.
| | Which of the following are advantages of Jini over CORBA?
- Language independence
- Dynamic method invocation
- Dynamically downloaded service object
| |
| (a) II and III only (b) I, II, and III (c) III only (d) I and III only
|
| Your score on this question is:
| 8.33
|
| Feedback:
| See section 3.3.3 of the course notes.
| | | 12.
| | Where is marshalling handled in CORBA?
| |
| (a) In the ORB interface (b) In the client IDL stubs (c) In the Interface Repository (d) In the DII
|
| Your score on this question is:
| 8.33
|
| Feedback:
| See section 3.3.2 of the course notes.
| |
| © Copyright 2003 iCarnegie, Inc. All rights reserved.
| Конец формы
Конец формы
Конец формы
Конец формы
Конец формы
1 | 2 | Поиск по сайту:
|