cit421 9/10
1. Which one of the following options is NOT an architectural model of distributed systems
client-peer
2. The specific program that runs on electronic device is the mobile _____
software
3. Identify the pieces of information which must be provided to the message-passing system.
All of the options
4. __ is used to send text messages on multiple mobile devices without the internet connection.
SMS
5. What descibes the availabilty of infrastructure that ensures seamless and reliable communication process?
Mobile communication
6. A distributed systems can specifically be utilised in which of these area?
All of the options
7. For a program to be executed all the information needed are contained in the process. Which of these information listed is NOT required for a program execution?
None of the options
8. A disadvantage of the client server computing is when _____
all the clients simultaneously request data from the server, it may get overloaded.
9. Which of the following characteristics best compliments a mobile software?
All of the options
TMA 2 10/10
1. The ____ feature in computing ensures that its users are not tied or pinned to a single physical location, but are able to operate from anywhere.
portability
2. __ solutions embed into their core offering algorithms and rules that control the provisioning process and the lease of resources.
Platform-as-a-service
3. By increasing the number of processors in use, __ can achieve better computing performance
SPMD
4. Which of these is a Demerit of client server computing?
If all the clients simultaneously request data from the server, it may get overloaded. This may lead to congestion in the network.
5. Large scale network-centered systems examples are found in www and ______
computational grids
6. The mobile device which receives or access the service of mobility is called _____.
mobile hardware
7. The process of designing the blueprint of a web application is referred to as _____ .
wireframing
8. What is the exact interest of the message passing system
the movement of data
9. The management of large number of __ in a heterogeneous or globally distributed environment builds several security issues.
nodes
10. Which of the following is not a common mobile OS used in smartphone?
None of the options
TMA 3 10/10
1. ____ is the systematic application of scientific methods to assess the design, implementation, and program outcomes.
program evaluation
2. _ is a collection of data.
Database
3. Typically, a process comprises of one or more of the following information for program execution.
All of the options
4. __ is one of the threats a computer or database may encounter
data loss
5. Message passing is primarily interested with ____ of data
moving
6. The acronym SPMDS represents _______
Single Program Multiple Data Streams
7. A ___ runs from the beginning to the end
master thread
8. Most organization\'s class dependency analysis tools pose more than multiple __ mechanisms for dependencies
import
9. SPMD remains popularly in used on ______ machines.
large-scale
10. Computer systems face a number of ____
security threats
1. Which one of the following options is NOT an architectural model of distributed systems
client-peer
2. The specific program that runs on electronic device is the mobile _____
software
3. Identify the pieces of information which must be provided to the message-passing system.
All of the options
4. __ is used to send text messages on multiple mobile devices without the internet connection.
SMS
5. What descibes the availabilty of infrastructure that ensures seamless and reliable communication process?
Mobile communication
6. A distributed systems can specifically be utilised in which of these area?
All of the options
7. For a program to be executed all the information needed are contained in the process. Which of these information listed is NOT required for a program execution?
None of the options
8. A disadvantage of the client server computing is when _____
all the clients simultaneously request data from the server, it may get overloaded.
9. Which of the following characteristics best compliments a mobile software?
All of the options
TMA 2 10/10
1. The ____ feature in computing ensures that its users are not tied or pinned to a single physical location, but are able to operate from anywhere.
portability
2. __ solutions embed into their core offering algorithms and rules that control the provisioning process and the lease of resources.
Platform-as-a-service
3. By increasing the number of processors in use, __ can achieve better computing performance
SPMD
4. Which of these is a Demerit of client server computing?
If all the clients simultaneously request data from the server, it may get overloaded. This may lead to congestion in the network.
5. Large scale network-centered systems examples are found in www and ______
computational grids
6. The mobile device which receives or access the service of mobility is called _____.
mobile hardware
7. The process of designing the blueprint of a web application is referred to as _____ .
wireframing
8. What is the exact interest of the message passing system
the movement of data
9. The management of large number of __ in a heterogeneous or globally distributed environment builds several security issues.
nodes
10. Which of the following is not a common mobile OS used in smartphone?
None of the options
TMA 3 10/10
1. ____ is the systematic application of scientific methods to assess the design, implementation, and program outcomes.
program evaluation
2. _ is a collection of data.
Database
3. Typically, a process comprises of one or more of the following information for program execution.
All of the options
4. __ is one of the threats a computer or database may encounter
data loss
5. Message passing is primarily interested with ____ of data
moving
6. The acronym SPMDS represents _______
Single Program Multiple Data Streams
7. A ___ runs from the beginning to the end
master thread
8. Most organization\'s class dependency analysis tools pose more than multiple __ mechanisms for dependencies
import
9. SPMD remains popularly in used on ______ machines.
large-scale
10. Computer systems face a number of ____
security threats