Distributed Computing

Distributed Computing

University

10 Qs

quiz-placeholder

Similar activities

OSI Model - Session Layer

OSI Model - Session Layer

9th Grade - Professional Development

10 Qs

Computer Security - Internet Vulnerabilities

Computer Security - Internet Vulnerabilities

University

15 Qs

Setting Up Computer Servers

Setting Up Computer Servers

University

15 Qs

Asesmen DHCP server

Asesmen DHCP server

11th Grade - University

15 Qs

Module8- Routing Switching- IPv6 dynamic address

Module8- Routing Switching- IPv6 dynamic address

University

10 Qs

Sessions and Cookies

Sessions and Cookies

University

10 Qs

Client Server

Client Server

1st Grade - University

10 Qs

DBMS Day 2

DBMS Day 2

University

15 Qs

Distributed Computing

Distributed Computing

Assessment

Quiz

Computers

University

Hard

Created by

Karen Ahmed

Used 39+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most important aspect of a distributed system?

Resource Sharing

Communication

Concurrency

Recovery from Failure

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary use of distributed systems?

Communication

Sharing Resources

Networking Computers

Cloud Computing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which search engine handles the most web searches?

Bing

Yahoo

Google

Duck Duck Go

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What challenges to MMOs present to distributed systems?

Need for security

Need for fast response times

Ability to support multiple users

Real-time propagation of events

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which architecture uses a centralised server?

Client-Server

Peer-to-Peer

Cluster

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What advantage does the cluster architecture have over client-server?

It is more secure

It is more responsive

It is easily extensible

It ensures consistency

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main role of a firewall?

To prevent unauthorised messages entering or leaving a network.

To protect local area networks from hackers

To prevent unauthorised access to computers

To protect local area networks from viruses

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?