Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

SSD8-1

.doc
Скачиваний:
11
Добавлен:
25.02.2016
Размер:
1.23 Mб
Скачать

Your score on this question is: 20.00

Feedback:

The token bucket will limit the average bandwidth used to 8 megabits/sec but will not prevent bursts of 10 megabits/sec.

--------------------------------------------------------------------------------

2.

Which of the following statements about routers that use FIFO packet schedulers are true?

Each user has a separate queue in the router.

Users who send at higher rates despite congestion warnings will have the same throughput as users who send at lower rates.

(a) None

(b) II only

(c) I only

(d) I and II

Correct answer is (a)

Your score on this question is: 20.00

Feedback:

See section 2.3.2 of the course notes.

--------------------------------------------------------------------------------

3.

When an application submits a request for guaranteed service, which of the following will the signaling protocol contact?

Only the router with the lowest bandwidth along the path that the application will use

Only the first router along the path that the application will use

All routers along the path that the application will use

(a) I and II only

(b) III only

(c) I only

(d) II only

Correct answer is (b)

Your score on this question is: 20.00

Feedback:

See section 2.3.1 of the course notes.

--------------------------------------------------------------------------------

4.

In a WFQ scheduler, four flows A, B, C, and D are allocated weights 1, 1, 2, and 2, respectively. If all packets were the same size, in what order would the scheduler serve the queues?

(a) ACDBCDACDBCD...

(b) ABCDABABCDAB...

(c) ABCABDABCABD...

(d) ABACADABACAD...

Correct answer is (a)

Your score on this question is: 20.00

Feedback:

A and B should each get 1/6 the bandwidth; C and D should each get 1/3.

--------------------------------------------------------------------------------

5.

Which of the following does the original Internet service model guarantee?

A certain maximum packet delay

A certain minimum bandwidth

(a) I only

(b) None

(c) I and II

(d) II only

Correct answer is (b)

Your score on this question is: 20.00

Feedback:

See section 2.3.1 of the course notes.

1.

Do most distributed applications require a complete ordering of events?

(a) Yes, and they must know the exact time.

(b) Yes, but they do not need to know the exact time.

(c) No, most distributed applications only need a partial ordering of events.

(d) No, most distributed applications are designed so that the order of events doesn't matter.

Correct answer is (c)

Your score on this question is: 16.67

Feedback:

See section 3.1.2 of the course notes.

--------------------------------------------------------------------------------

2.

Which of the following are true?

The happens-before relation is transitive.

Disjoint events can have the same logical time.

(a) II only

(b) I and II

(c) I only

(d) None

Correct answer is (b)

Your score on this question is: 16.67

Feedback:

See section 3.1.2 of the course notes.

--------------------------------------------------------------------------------

3.

Which of the following can PGP provide?

Message integrity checking

Sender authentication

Secrecy

(a) III only

(b) I and II only

(c) I and III only

(d) I, II, and III

Correct answer is (d)

Your score on this question is: 16.67

Feedback:

See section 3.1.6 of the course notes.

--------------------------------------------------------------------------------

4.

A client sends a secure http request to a server that uses SSL. The server responds with a certificate. What is the data in the certificate?

(a) The client's public key encrypted, using the server's private key

(b) The client's public key encrypted, using the secret key of a certification authority

(c) The server's public key encrypted, using the secret key of a certification authority

(d) A certification authority's public key encrypted, using the server's private key

Correct answer is (c)

Your score on this question is: 16.67

Feedback:

See section 3.1.6 of the course notes.

--------------------------------------------------------------------------------

5.

Which of the following are advantages of stateless distributed file systems?

Limited complexity on the file server

Prevents inconsistencies by preventing conflicting file access

(a) II only

(b) I and II

(c) None

(d) I only

Correct answer is (d)

Your score on this question is: 16.67

Feedback:

See section 3.1.4 of the course notes.

--------------------------------------------------------------------------------

6.

Which of the following statements are true?

Working on several tasks at the same time in an interleaved fashion can sometimes improve throughput without increasing response time.

It is sometimes not possible to both maximize throughput and minimize response time.

(a) II only

(b) I only

(c) I and II

(d) None

Correct answer is (c)

Your score on this question is: 16.67

Feedback:

See section 3.1.3 of the course notes.

1.

Which of the following can PGP provide?

Message integrity checking

Sender authentication

Secrecy

(a) I and II only

(b) III only

(c) I and III only

(d) I, II, and III

Correct answer is (d)

Your score on this question is: 16.67

Feedback:

See section 3.1.6 of the course notes.

--------------------------------------------------------------------------------

2.

Which of the following are true?

The happens-before relation is transitive.

Disjoint events can have the same logical time.

(a) I only

(b) None

(c) I and II

(d) II only

Correct answer is (c)

Your score on this question is: 16.67

Feedback:

See section 3.1.2 of the course notes.

--------------------------------------------------------------------------------

3.

For each process that enters the critical region in Lamport's contention-based mutual exclusion, how many messages are sent over the network? (N is the number of processes in the system)

(a) 3 * (N + 1)

(b) N * (N - 1)

(c) N + 1

(d) 3 * (N - 1)

Correct answer is (d)

Your score on this question is: 16.67

Feedback:

A REQUEST, REPLY, and RELEASE for each other process in the system. See section 3.1.2 of the course notes.

--------------------------------------------------------------------------------

4.

In a distributed system, most tasks require _____, creating _____ .

(a) dedicated hardware, extra cost

(b) the approval of all components in the system, delays

(c) communication between components, security threats

(d) multiple copies of files, extra overhead from copying

Correct answer is (c)

Your score on this question is: 16.67

Feedback:

3.1.1

--------------------------------------------------------------------------------

5.

Do most distributed applications require a complete ordering of events?

(a) No, most distributed applications only need a partial ordering of events.

(b) No, most distributed applications are designed so that the order of events doesn't matter.

(c) Yes, and they must know the exact time.

(d) Yes, but they do not need to know the exact time.

Correct answer is (a)

Your score on this question is: 16.67

Feedback:

See section 3.1.2 of the course notes.

--------------------------------------------------------------------------------

6.

Which of the following distributed file systems use block/file caching?

AFS

NFS

(a) I only

(b) II only

(c) None

(d) I and II

Correct answer is (d)

Your score on this question is: 16.67

Feedback:

See section 3.1.4 of the course notes.

1.

Which of the following are true?

Making the distributed system look more like a centralized system to the user is in general a desirable feature.

It is always possible to hide the distributed nature of the system completely.

(a) I only

(b) II only

(c) I and II

(d) None

Correct answer is (a)

Your score on this question is: 16.67

Feedback:

3.1.1

--------------------------------------------------------------------------------

2.

Which of the following does Kerberos use?

Public-key encryption

Timestamps

Private-key encryption

(a) II and III only

(b) I only

(c) I and II only

(d) III only

Correct answer is (a)

Your score on this question is: 16.67

Feedback:

See section 3.1.6 of the course notes.

--------------------------------------------------------------------------------

3.

A client sends a secure http request to a server that uses SSL. The server responds with a certificate. What is the data in the certificate?

(a) A certification authority's public key encrypted, using the server's private key

(b) The server's public key encrypted, using the secret key of a certification authority

(c) The client's public key encrypted, using the secret key of a certification authority

(d) The client's public key encrypted, using the server's private key

Correct answer is (b)

Your score on this question is: 16.67

Feedback:

See section 3.1.6 of the course notes.

--------------------------------------------------------------------------------

4.

For each process that enters the critical region in Lamport's contention-based mutual exclusion, how many messages are sent over the network? (N is the number of processes in the system)

(a) 3 * (N - 1)

(b) 3 * (N + 1)

(c) N * (N - 1)

(d) N + 1

Correct answer is (a)

Your score on this question is: 16.67

Feedback:

A REQUEST, REPLY, and RELEASE for each other process in the system. See section 3.1.2 of the course notes.

--------------------------------------------------------------------------------

5.

Against what does a nonce safeguard?

(a) Replay attacks

(b) Message modification

(c) Denial of service attacks

(d) Snooping

Correct answer is (a)

Your score on this question is: 16.67

Feedback:

See section 3.1.5 of the course notes.

--------------------------------------------------------------------------------

6.

Which of the following are advantages of public-key cryptography (such as RSA)?

Faster encryption / decryption than private-key cryptography

Fewer keys to maintain than private-key cryptography

(a) I only

(b) None

(c) I and II

(d) II only

Correct answer is (d)

Your score on this question is: 16.67

Feedback:

See section 3.1.5 of the course notes.

1.

In a distributed system, push and pull algorithms refer to

(a) a denial-of-service attack algorithm

(b) which process gets the first token

(c) how work is divided among processors

(d) which machine each file is stored on

Correct answer is (c)

Your score on this question is: 16.67

Feedback:

See section 3.1.3 of the course notes.

--------------------------------------------------------------------------------

2.

Against what does a nonce safeguard?

(a) Denial of service attacks

(b) Message modification

(c) Snooping

(d) Replay attacks

Correct answer is (d)

Your score on this question is: 16.67

Feedback:

See section 3.1.5 of the course notes.

--------------------------------------------------------------------------------

3.

Which of the following distributed file systems are location transparent to users?

The WWW

NFS

AFS

(a) II only

(b) II and III only

(c) I, II, and III

(d) I only

Correct answer is (b)

Your score on this question is: 16.67

Feedback:

See section 3.1.4 of the course notes.

--------------------------------------------------------------------------------

4.

Which of the following are advantages of public-key cryptography (such as RSA)?

Faster encryption / decryption than private-key cryptography

Fewer keys to maintain than private-key cryptography

(a) None

(b) I and II

(c) I only

(d) II only

Correct answer is (d)

Your score on this question is: 16.67

Feedback:

See section 3.1.5 of the course notes.

--------------------------------------------------------------------------------

5.

Which of the following statements are true?

Working on several tasks at the same time in an interleaved fashion can sometimes improve throughput without increasing response time.

It is sometimes not possible to both maximize throughput and minimize response time.

(a) I only

(b) None

(c) I and II

(d) II only

Correct answer is (c)

Your score on this question is: 0.00

Feedback:

See section 3.1.3 of the course notes.

--------------------------------------------------------------------------------

6.

Which of the following distributed file systems use block/file caching?

AFS

NFS

(a) I and II

(b) II only

(c) None

(d) I only

Correct answer is (a)

Your score on this question is: 16.67

Feedback:

See section 3.1.4 of the course notes.

1.

Against what does a nonce safeguard?

(a) Snooping

(b) Replay attacks

(c) Denial of service attacks

(d) Message modification

Correct answer is (b)

Your score on this question is: 16.67

Feedback:

See section 3.1.5 of the course notes.

--------------------------------------------------------------------------------

2.

For each process that enters the critical region in Lamport's contention-based mutual exclusion, how many messages are sent over the network? (N is the number of processes in the system)

(a) 3 * (N + 1)

(b) N * (N - 1)

(c) N + 1

(d) 3 * (N - 1)

Correct answer is (d)

Your score on this question is: 16.67

Feedback:

A REQUEST, REPLY, and RELEASE for each other process in the system. See section 3.1.2 of the course notes.

--------------------------------------------------------------------------------

3.

Which of the following distributed file systems use block/file caching?

AFS

NFS

(a) I only

(b) None

(c) I and II

(d) II only

Correct answer is (c)

Your score on this question is: 16.67

Feedback:

See section 3.1.4 of the course notes.

--------------------------------------------------------------------------------

4.

In a distributed system, push and pull algorithms refer to

(a) which process gets the first token

(b) how work is divided among processors

(c) a denial-of-service attack algorithm

(d) which machine each file is stored on

Correct answer is (b)

Your score on this question is: 16.67

Feedback:

See section 3.1.3 of the course notes.

--------------------------------------------------------------------------------

5.

Which of the following does Kerberos use?

Public-key encryption

Timestamps

Private-key encryption

(a) III only

(b) II and III only

(c) I and II only

(d) I only

Correct answer is (b)

Your score on this question is: 16.67

Feedback:

See section 3.1.6 of the course notes.

--------------------------------------------------------------------------------

6.

Which of the following statements are true?

Working on several tasks at the same time in an interleaved fashion can sometimes improve throughput without increasing response time.

It is sometimes not possible to both maximize throughput and minimize response time.

(a) I only

(b) II only

(c) I and II

(d) None

Correct answer is (c)

Your score on this question is: 16.67

Feedback:

See section 3.1.3 of the course notes.

1.

Which of the following are true of token-based mutual exclusion algorithms?

Token-based mutual exclusion works best when accesses to the critical region are rare.

Token-based mutual exclusion has a low message overhead.

Token-based mutual exclusion slows down when there are more processes.

(a) II and III only

(b) I and II only

(c) I, II, and III

(d) II only

Correct answer is (a)

Your score on this question is: 0.00

Feedback:

See section 3.1.2 of the course notes.

--------------------------------------------------------------------------------

2.

In a distributed system, push and pull algorithms refer to

(a) which machine each file is stored on

(b) a denial-of-service attack algorithm

(c) which process gets the first token

(d) how work is divided among processors

Correct answer is (d)

Your score on this question is: 16.67

Feedback:

See section 3.1.3 of the course notes.

--------------------------------------------------------------------------------

3.

Against what does a nonce safeguard?

(a) Snooping

(b) Message modification

(c) Denial of service attacks

(d) Replay attacks

Correct answer is (d)

Your score on this question is: 16.67

Feedback:

See section 3.1.5 of the course notes.

--------------------------------------------------------------------------------

4.

A client sends a secure http request to a server that uses SSL. The server responds with a certificate. What is the data in the certificate?

(a) The server's public key encrypted, using the secret key of a certification authority

(b) A certification authority's public key encrypted, using the server's private key

(c) The client's public key encrypted, using the server's private key

(d) The client's public key encrypted, using the secret key of a certification authority

Correct answer is (a)

Your score on this question is: 16.67

Feedback:

See section 3.1.6 of the course notes.

--------------------------------------------------------------------------------

5.

Do most distributed applications require a complete ordering of events?

(a) No, most distributed applications are designed so that the order of events doesn't matter.

(b) Yes, and they must know the exact time.

(c) No, most distributed applications only need a partial ordering of events.

(d) Yes, but they do not need to know the exact time.

Correct answer is (c)

Your score on this question is: 16.67

Feedback:

See section 3.1.2 of the course notes.

--------------------------------------------------------------------------------

6.

Which of the following distributed file systems use block/file caching?

AFS

NFS

(a) I only

(b) I and II

(c) II only

(d) None

Correct answer is (b)

Your score on this question is: 16.67

Feedback:

See section 3.1.4 of the course notes.

1.

What is Microsoft's ODBC based on?

(a) JDBC

(b) SQL

(c) SAG CLI

(d) OLE/DB

Correct answer is (c)

Your score on this question is: 20.00

Feedback:

See section 3.2.3 of the course notes.

--------------------------------------------------------------------------------

2.

Which of the following have a procedural interface?

ODBC

SAG CLI

JDBC

(a) I and III only

(b) I and II only

(c) I, II, and III

(d) II and III only

Correct answer is (b)

Your score on this question is: 20.00

Feedback:

See section 3.2.3 of the course notes.

--------------------------------------------------------------------------------

3.

Security problems in mobile code are often dealt with by which of the following techniques:

run-time checking

compile-time checking

precompile checking

predictive checking

(a) IV only

(b) I and II only

(c) II and III only

(d) I, II, III, and IV

Correct answer is (b)

Your score on this question is: 20.00

Feedback:

See section 3.2.2 of the course notes.

--------------------------------------------------------------------------------

4.

How are SLP names represented?

(a) ASCII strings concatenated with periods (dots)

(b) Unordered lists of attribute-value pairs

(c) Ordered lists of attribute-value pairs

(d) ASCII strings concatenated with slashes

Correct answer is (b)

Your score on this question is: 20.00

Feedback:

See section 3.2.4 of the course notes.

--------------------------------------------------------------------------------

5.

In which of the following naming services do lookups correspond to a walk from the root to a node of a name tree?

CORBA's name service

LDAP

SLP

(a) II and III only

(b) I only

(c) I and II only

(d) I, II, and III

Correct answer is (c)

Your score on this question is: 20.00

Feedback:

See section 3.2.4 of the course notes.

1.

What is Microsoft's ODBC based on?

(a) SQL

(b) OLE/DB

(c) SAG CLI

(d) JDBC

Correct answer is (c)

Your score on this question is: 20.00

Feedback:

See section 3.2.3 of the course notes.

--------------------------------------------------------------------------------

2.

How are LDAP names represented?

(a) ASCII strings concatenated with periods (dots)

(b) Unordered lists of attribute-value pairs

(c) ASCII strings concatenated with slashes

(d) Ordered lists of attribute-value pairs

Correct answer is (d)

Your score on this question is: 20.00

Feedback:

See section 3.2.4 of the course notes.

--------------------------------------------------------------------------------

3.

To execute transactions that contain multiple statements, a JDBC application must _____.

(a) disable auto-commit

(b) send the statements without a 1 second pause between each pair

(c) open multiple connections

(d) use begin and end statements

Correct answer is (a)

Your score on this question is: 20.00

Feedback:

See section 3.2.3 of the course notes.

--------------------------------------------------------------------------------

4.

CGI scripts are passed _____ and return _____.

(a) A URL, an HTML form

(b) an HTML form, an HTML document

(c) an ASCII string, an HTML document

(d) an HTML form, a URL

Correct answer is (c)

Your score on this question is: 20.00

Feedback:

See section 3.2.1 of the course notes.

--------------------------------------------------------------------------------

5.

Which of the following have a procedural interface?

ODBC

SAG CLI

JDBC

(a) I and II only

(b) I, II, and III

(c) II and III only

(d) I and III only

Correct answer is (a)

Your score on this question is: 20.00

Feedback:

See section 3.2.3 of the course notes.

1.

Which of the following statements about Java applets are true?

Applets typically execute inside their own thread or set of threads.

Applets are complete, self-contained programs.

(a) None

(b) I and II

(c) I only

(d) II only

Correct answer is (c)

Your score on this question is: 0.00

Feedback:

See section 3.2.2 of the course notes.

--------------------------------------------------------------------------------

2.

How are LDAP names represented?

(a) ASCII strings concatenated with periods (dots)

(b) ASCII strings concatenated with slashes

(c) Unordered lists of attribute-value pairs

(d) Ordered lists of attribute-value pairs

Correct answer is (d)

Your score on this question is: 20.00

Feedback:

See section 3.2.4 of the course notes.

--------------------------------------------------------------------------------

3.

In which of the following naming services do lookups correspond to a walk from the root to a node of a name tree?

CORBA's name service

LDAP

SLP

(a) II and III only

(b) I only

(c) I and II only

(d) I, II, and III

Correct answer is (c)

Your score on this question is: 20.00

Feedback:

See section 3.2.4 of the course notes.

--------------------------------------------------------------------------------

4.

How are SLP names represented?

(a) ASCII strings concatenated with slashes

(b) Ordered lists of attribute-value pairs

(c) ASCII strings concatenated with periods (dots)

(d) Unordered lists of attribute-value pairs

Correct answer is (d)

Your score on this question is: 20.00

Feedback:

See section 3.2.4 of the course notes.

--------------------------------------------------------------------------------

5.

To execute transactions that contain multiple statements, a JDBC application must _____.

(a) use begin and end statements

(b) send the statements without a 1 second pause between each pair

(c) open multiple connections

(d) disable auto-commit

Correct answer is (d)

Your score on this question is: 20.00

Feedback:

See section 3.2.3 of the course notes.

1.

Which of the following have a procedural interface?

ODBC

SAG CLI

JDBC

(a) II and III only

(b) I and III only

(c) I and II only

(d) I, II, and III

Correct answer is (c)

Your score on this question is: 0.00

Feedback:

See section 3.2.3 of the course notes.

--------------------------------------------------------------------------------

2.

Security problems in mobile code are often dealt with by which of the following techniques:

run-time checking

compile-time checking

precompile checking

predictive checking

(a) I, II, III, and IV

(b) IV only

(c) II and III only

(d) I and II only

Correct answer is (d)

Your score on this question is: 20.00

Feedback:

See section 3.2.2 of the course notes.

--------------------------------------------------------------------------------

3.

What is Microsoft's ODBC based on?

(a) OLE/DB

(b) SQL

(c) SAG CLI

(d) JDBC

Correct answer is (c)

Your score on this question is: 20.00

Feedback:

See section 3.2.3 of the course notes.

--------------------------------------------------------------------------------

4.

_____ prevents mobile code from accessing the memory of other users or of the system

(a) Executing binary executables

(b) Real-time scheduling

(c) Sandboxing

(d) Multithreading

Correct answer is (c)

Your score on this question is: 20.00

Feedback:

See section 3.2.2 of the course notes.

--------------------------------------------------------------------------------

5.

To execute transactions that contain multiple statements, a JDBC application must _____.

(a) use begin and end statements

(b) open multiple connections

(c) send the statements without a 1 second pause between each pair

(d) disable auto-commit

Correct answer is (d)

Your score on this question is: 20.00

Feedback:

See section 3.2.3 of the course notes.

1.

To execute transactions that contain multiple statements, a JDBC application must _____.

(a) send the statements without a 1 second pause between each pair

(b) disable auto-commit

(c) open multiple connections

(d) use begin and end statements

Correct answer is (b)

Your score on this question is: 20.00

Feedback:

See section 3.2.3 of the course notes.

--------------------------------------------------------------------------------

2.

Which of the following statements about Java applets are true?

Applets typically execute inside their own thread or set of threads.

Applets are complete, self-contained programs.

(a) I and II

(b) None

(c) I only

(d) II only

Correct answer is (c)

Your score on this question is: 20.00

Feedback:

See section 3.2.2 of the course notes.

--------------------------------------------------------------------------------

3.

Which of the following have a procedural interface?

ODBC

SAG CLI

JDBC

(a) I and III only

(b) II and III only

(c) I and II only

(d) I, II, and III

Correct answer is (c)

Your score on this question is: 20.00

Feedback:

See section 3.2.3 of the course notes.

--------------------------------------------------------------------------------

4.

How are SLP names represented?

(a) ASCII strings concatenated with slashes

(b) ASCII strings concatenated with periods (dots)

(c) Ordered lists of attribute-value pairs

(d) Unordered lists of attribute-value pairs

Correct answer is (d)

Your score on this question is: 20.00

Feedback:

See section 3.2.4 of the course notes.

--------------------------------------------------------------------------------

5.

How are LDAP names represented?

(a) Ordered lists of attribute-value pairs

(b) ASCII strings concatenated with slashes

(c) ASCII strings concatenated with periods (dots)

(d) Unordered lists of attribute-value pairs

Correct answer is (a)

Your score on this question is: 20.00

Feedback:

See section 3.2.4 of the course notes.

1.

Security problems in mobile code are often dealt with by which of the following techniques:

run-time checking

compile-time checking

precompile checking

predictive checking

(a) II and III only

(b) I, II, III, and IV

(c) IV only

(d) I and II only

Correct answer is (d)

Your score on this question is: 20.00

Feedback:

See section 3.2.2 of the course notes.

--------------------------------------------------------------------------------

2.

To execute transactions that contain multiple statements, a JDBC application must _____.

(a) use begin and end statements

(b) disable auto-commit

(c) open multiple connections

(d) send the statements without a 1 second pause between each pair

Correct answer is (b)

Your score on this question is: 20.00

Feedback:

See section 3.2.3 of the course notes.

--------------------------------------------------------------------------------

3.

In which of the following naming services do lookups correspond to a walk from the root to a node of a name tree?

CORBA's name service

LDAP

SLP

(a) II and III only

(b) I only

(c) I and II only

(d) I, II, and III

Correct answer is (c)

Your score on this question is: 20.00

Feedback:

See section 3.2.4 of the course notes.

--------------------------------------------------------------------------------

4.

How are LDAP names represented?

(a) ASCII strings concatenated with slashes

(b) Ordered lists of attribute-value pairs

(c) ASCII strings concatenated with periods (dots)

(d) Unordered lists of attribute-value pairs

Correct answer is (b)

Your score on this question is: 20.00

Feedback:

See section 3.2.4 of the course notes.

--------------------------------------------------------------------------------

5.

CGI scripts are passed _____ and return _____.

(a) an HTML form, a URL

(b) an ASCII string, an HTML document

(c) A URL, an HTML form

(d) an HTML form, an HTML document

Correct answer is (b)

Your score on this question is: 20.00

Feedback:

See section 3.2.1 of the course notes.

1.

Which of the following are true of CORBA's dynamic discovery of interfaces?

Parameter values are matched by the number and type of the parameters.

Parameter values can be provided by a human user at run time.

(a) I only

(b) II only

(c) I and II

(d) None

Correct answer is (b)

Your score on this question is: 20.00

Feedback:

See section 3.3.2 of the course notes.

--------------------------------------------------------------------------------

2.

Which of the following stubs does the IDL compiler generate?

Client stubs

Server stubs

(a) None

(b) I and II

(c) I only

(d) II only

Correct answer is (b)

Your score on this question is: 20.00

Feedback:

See section 3.3.2 of the course notes.

--------------------------------------------------------------------------------

3.

Which of the following are supported by Jini?

Entire object passing

Discovery service that looks up services based on a set of attributes

(a) None

(b) II only

(c) I and II

(d) I only

Correct answer is (c)

Your score on this question is: 20.00

Feedback:

See section 3.3.3 of the course notes.

--------------------------------------------------------------------------------

4.

In a traditional distributed computing environment, _____ decides what services are needed and configures a set of servers to provide those services.

(a) a central server

(b) a process load table

(c) the user

(d) the system manager

Correct answer is (d)

Your score on this question is: 20.00

Feedback:

See section 3.3.1 of the course notes.

--------------------------------------------------------------------------------

5.

Which of the following statements are true about CORBA?

Using the CORBA IDL, existing code written in procedural languages can be made to look like objects using IDL wrappers

IDL code can be generated automatically from the code of many OO languages

The IDL code can be used to generate implementation code automatically in one of many OO languages

(a) I and II only

(b) II and III only

(c) I, II, and III

(d) I only

Correct answer is (a)

Your score on this question is: 20.00

Feedback:

See section 3.3.2 of the course notes. See section 3.3.2 of the course notes.

1.

Which of the following are supported by Jini?

Entire object passing

Discovery service that looks up services based on a set of attributes

(a) I only

(b) None

(c) II only

(d) I and II

Correct answer is (d)

Your score on this question is: 20.00

Feedback:

See section 3.3.3 of the course notes.

--------------------------------------------------------------------------------

2.

Which of the following do RPC/RMI packages typically support?

Heterogeneity across platforms

Heterogeneity across languages environments

Support for dynamic interfaces

(a) I only

(b) II only

(c) I, II, and III

(d) I and II only

Correct answer is (a)

Your score on this question is: 20.00

Feedback:

See section 3.3.1 of the course notes.

--------------------------------------------------------------------------------

3.

Which of the following does CORBA support but DCOM not support?

(a) Language independence

(b) Both static and dynamic method invocation

(c) Inheritance

(d) A name service

Correct answer is (c)

Your score on this question is: 20.00

Feedback:

See section 3.3.3 of the course notes.

--------------------------------------------------------------------------------

4.

Which of the following statements are true about CORBA?

Using the CORBA IDL, existing code written in procedural languages can be made to look like objects using IDL wrappers

IDL code can be generated automatically from the code of many OO languages

The IDL code can be used to generate implementation code automatically in one of many OO languages

(a) II and III only

(b) I and II only

(c) I, II, and III

(d) I only

Correct answer is (b)

Your score on this question is: 20.00

Feedback:

See section 3.3.2 of the course notes. See section 3.3.2 of the course notes.

--------------------------------------------------------------------------------

5.

Which of the following are advantages of Jini over CORBA?

Language independence

Dynamic method invocation

Dynamically downloaded service object

(a) I, II, and III

(b) I and III only

(c) III only

(d) II and III only

Correct answer is (c)

Your score on this question is: 20.00

Feedback:

See section 3.3.3 of the course notes.

1.

Which of the following does CORBA support but DCOM not support?

(a) Inheritance

(b) Language independence

(c) Both static and dynamic method invocation

(d) A name service

Correct answer is (a)

Your score on this question is: 20.00

Feedback:

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]