Question: Q 1 . In a DHT ( distributed hash table ) - based network, assume m = 5 . If the hash of the node

Q1. In a DHT (distributed hash table)-based network, assume m =5. If the hash of the node identifier is 38, where is the location of the node in the DHT space?
A.31
B.0
C.6
D.7
Q2. The socket interface is a set of instructions that provide communication between ________ and ________.
A. transport layer, network layer
B. application layer, network layer
C. transport layer, operating system
D. application layer, operating system
Q3. In the DHT, an object is normally related to the pair (key, value), in which the key is the hash of the object name, and the value is the object or a reference to the object.
A. True
B. False
Q4. In the direct strategy, the object is stored in a peer that owns the object, but a reference is stored in a peer whose ID is somehow closest to the object ID.
A. True
B. False
Q5. The components of URLs include
A. port
B. host
C. protocol
D. path
Q6. DHT is used in applications including
A. Content distributed systems (CDS)
B. Distributed data structures (DDS)
C. Domain Name System (DNS)
D. P2P file sharing
Q7. In iterative TCP communication, __________ can only be used the connection establishment phase.
A. client socket
B. Socket
C. server socket
D. listen socket
Q8. The uniform resource locator (URL) uses _______ different separators.
A.1
B.3
C.4
D.2
Q9. In a centralized P2P network, the directory system uses the client-server paradigm, but storing and downloading of the files are done using peer-to-peer paradigm.
A. True
B. False
Q10. The proxy server is normally located at the client site.
A. True
B. False

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Finance Questions!