АвтоАвтоматизацияАрхитектураАстрономияАудитБиологияБухгалтерияВоенное делоГенетикаГеографияГеологияГосударствоДомДругоеЖурналистика и СМИИзобретательствоИностранные языкиИнформатикаИскусствоИсторияКомпьютерыКулинарияКультураЛексикологияЛитератураЛогикаМаркетингМатематикаМашиностроениеМедицинаМенеджментМеталлы и СваркаМеханикаМузыкаНаселениеОбразованиеОхрана безопасности жизниОхрана ТрудаПедагогикаПолитикаПравоПриборостроениеПрограммированиеПроизводствоПромышленностьПсихологияРадиоРегилияСвязьСоциологияСпортСтандартизацияСтроительствоТехнологииТорговляТуризмФизикаФизиологияФилософияФинансыХимияХозяйствоЦеннообразованиеЧерчениеЭкологияЭконометрикаЭкономикаЭлектроникаЮриспунденкция

View Assessment Result. Family Name: Saimassayeva Given Name: Sholpan Login: ssaimass

Читайте также:
  1. Diana Is Invited to Tea with Tragic Results
  2. II. Experimental results and discussion
  3. Reporting results
  4. Results
  5. Results
  6. Results
  7. Results from the visual book experiment
  8. THE CAUSES, NATURE AND RESULTS OF SEMANTIC CHANGES.
  9. The causes, nature and results оГ semantic change
  10. The results of semantic changes of the meaning of the word.
  11. Using the table above compare the list of professional duties discharged by the notaries in Great Britain and the USA. Tell your classmates about the results of your analysis.
  12. View Assessment Result


Начало формы

 

 

  Family Name: Saimassayeva   Given Name: Sholpan   Login: ssaimass   E-mail: 11563@iitu.kz   Status: Enrolled

 

  Assessment Name: Exam 3 Multiple-Choice   Instance:  

 

  Section: SSD8-19424325_Information Systems - 5B070300 - IS 0904   During: Fall 2012   Section Status: Active

 

  For course: Networks & Distributed Computing   (SSD8)

 

  Corresponding to: SSD8   At: International University of Information Technology (IITU)  
 

 

  Your performance was as follows:

 

  You took 19 minutes on this assessment from Thu Dec 06 2012 14:37:52 GMT+0600 (Центральная Азия (зима)) to Thu Dec 06 2012 14:56:08 GMT+0600 (Центральная Азия (зима)).

 

 
Total score: 100.00
 

 

 

 

  1.   In a distributed system, most tasks require _____, creating _____.  

 

  (a) multiple copies of files, extra overhead from copying (b) dedicated hardware, extra cost (c) communication between components, security threats (d) the approval of all components in the system, delays

 

  Correct answer is (c)

 

  Your score on this question is: 8.33

 

  Feedback: 3.1.1  
  2.   In a distributed system, thrashing is caused  

 

  (a) when one processor accesses the same file over and over (b) when one processor fails, and its tasks must be transferred to another processor (c) when one processor runs one task for too long a time (d) when one processor runs too many tasks at a time

 

  Correct answer is (d)

 

  Your score on this question is: 8.33

 

  Feedback: See section 3.1.3 of the course notes.  
  3.   A client sends a secure http request to a server that uses SSL. The server responds with a certificate. What is the data in the certificate?  

 

  (a) The client's public key encrypted, using the server's private key (b) A certification authority's public key encrypted, using the server's private key (c) The client's public key encrypted, using the secret key of a certification authority (d) The server's public key encrypted, using the secret key of a certification authority

 

  Correct answer is (d)

 

  Your score on this question is: 8.33

 

  Feedback: See section 3.1.6 of the course notes.  
  4.   In a distributed system, push and pull algorithms refer to  

 

  (a) which process gets the first token (b) how work is divided among processors (c) a denial-of-service attack algorithm (d) which machine each file is stored on

 

  Correct answer is (b)

 

  Your score on this question is: 8.33

 

  Feedback: See section 3.1.3 of the course notes.  
  5.   In which of the following naming services do lookups correspond to a walk from the root to a node of a name tree?
  1. CORBA's name service
  2. LDAP
  3. SLP
 

 

  (a) I only (b) I, II, and III (c) I and II only (d) II and III only

 

  Correct answer is (c)

 

  Your score on this question is: 8.33

 

  Feedback: See section 3.2.4 of the course notes.  
  6.   CGI scripts are passed _____ and return _____.  

 

  (a) an HTML form, a URL (b) an HTML form, an HTML document (c) an ASCII string, an HTML document (d) A URL, an HTML form

 

  Correct answer is (c)

 

  Your score on this question is: 8.33

 

  Feedback: See section 3.2.1 of the course notes.  
  7.   Security problems in mobile code are often dealt with by which of the following techniques:
  1. run-time checking
  2. compile-time checking
  3. precompile checking
  4. predictive checking
 

 

  (a) II and III only (b) IV only (c) I, II, III, and IV (d) I and II only

 

  Correct answer is (d)

 

  Your score on this question is: 8.33

 

  Feedback: See section 3.2.2 of the course notes.  
  8.   Which of the following statements about Java applets are true?
  1. Applets typically execute inside their own thread or set of threads.
  2. Applets are complete, self-contained programs.
 

 

  (a) I and II (b) II only (c) I only (d) None

 

  Correct answer is (c)

 

  Your score on this question is: 8.33

 

  Feedback: See section 3.2.2 of the course notes.  
  9.   Which of the following are true of CORBA's dynamic discovery of interfaces?
  1. Parameter values are matched by the number and type of the parameters.
  2. Parameter values can be provided by a human user at run time.
 

 

  (a) II only (b) None (c) I and II (d) I only

 

  Correct answer is (a)

 

  Your score on this question is: 8.33

 

  Feedback: See section 3.3.2 of the course notes.  
  10.   Which of the following do RPC/RMI packages typically support?
  1. Heterogeneity across platforms
  2. Heterogeneity across languages environments
  3. Support for dynamic interfaces
 

 

  (a) I only (b) I, II, and III (c) II only (d) I and II only

 

  Correct answer is (a)

 

  Your score on this question is: 8.33

 

  Feedback: See section 3.3.1 of the course notes.  
  11.   Which of the following are advantages of Jini over CORBA?
  1. Language independence
  2. Dynamic method invocation
  3. Dynamically downloaded service object
 

 

  (a) II and III only (b) I, II, and III (c) III only (d) I and III only

 

  Correct answer is (c)

 

  Your score on this question is: 8.33

 

  Feedback: See section 3.3.3 of the course notes.  
  12.   Where is marshalling handled in CORBA?  

 

  (a) In the ORB interface (b) In the client IDL stubs (c) In the Interface Repository (d) In the DII

 

  Correct answer is (b)

 

  Your score on this question is: 8.33

 

  Feedback: See section 3.3.2 of the course notes.  
  Go to top of assessment.

 

  Total score: 100.00

 

  © Copyright 2003 iCarnegie, Inc. All rights reserved.

Конец формы

Конец формы

Конец формы

Конец формы

Конец формы

 


1 | 2 |

Поиск по сайту:



Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Студалл.Орг (0.009 сек.)