The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 327 Weeks Ago, 6 Days Ago |
| Questions Answered: | 12843 |
| Tutorials Posted: | 12834 |
MBA, Ph.D in Management
Harvard university
Feb-1997 - Aug-2003
Professor
Strayer University
Jan-2007 - Present
problem
1 point possible (graded)
1) What database operations can be performed using deterministic encryption? (choose all that apply)
Â
Finding items that are equal to a particular value.
Â
Grouping items by equality.
Â
Sorting items at the server.
Â
Obtaining all items from the database.
Not yet answered.
Â
Submit
Submit Your Answer
problem
1 point possible (graded)
2) What operations does a CryptDB implement using a homomorphic encryption scheme (such as Paillier)? (choose all that apply)
Â
Adding integer values.
Â
Checking equality between values.
Â
Computing the sum of values.
Â
Computing the average of values.
Â
Sorting values.
Not yet answered.
Â
Submit
Submit Your Answer
problem
1 point possible (graded)
3) What is the advantage of CryptDB's onion construction? (choose all that apply)
Â
Onions enable CryptDB to compute over encrypted data without revealing plaintext data to the server.
Â
Onions enable CryptDB to avoid revealing weaker encryption schemes for some data items.
Â
Onions enable CryptDB to perform computation in the trusted proxy instead of at the server.
Not yet answered.
Â
Submit
Submit Your Answer
problem
1 point possible (graded)
4) What determines the confidentiality level provided by CryptDB? (choose all that apply)
Â
The schema of the database.
Â
The queries issued by the application.
Â
The thresholds specified for each column.
Â
The size of the database.
Not yet answered.
Â
Submit
Submit Your Answer
problem
1 point possible (graded)
5) What is the average overhead of using CryptDB for the TPC-C benchmark?
Â
2%
Â
20%
Â
200%
Â
2000%
Not yet answered.
Â
Submit
Submit Your Answer
problem
1 point possible (graded)
6) Which of the following repeating workloads can scale well on a cache-coherent multicore system? (choose all that apply)
Â
One core writing a cache line that other cores read.
Â
All cores reading the same cache line.
Â
All cores reading and writing the same cache line.
Â
Each core reading and writing its own cache line.
Not yet answered.
Â
Submit
Submit Your Answer
problem
1 point possible (graded)
7) What is the primary reason for the collapse of ticket locks?
Â
The counter tracking the number of waiters overflows.
Â
Cores waiting to acquire the lock slow down the execution of the core holding the lock.
Â
The time taken to acquire a lock is proportional to the number of waiters.
Â
Cores that do not succeed in acquiring a lock are wasting CPU time in acquire's spin loop.
Not yet answered.
Â
Submit
Submit Your Answer
problem
1 point possible (graded)
8) What could happen if you replace a ticket lock with a non-collapsing lock (such as Anderson's) in an existing program? (choose all that apply)
Â
If the lock was not contended, the program may run slower.
Â
If the lock was contended, the program may now scale perfectly.
Â
If the lock was contended, the absolute performance of the program may improve.
Not yet answered.
Â
Â
Submit
Submit Your Answer
problem
1 point possible (graded)
9) Why does lock-free synchronization require a garbage collection scheme?
Â
Explicitly freeing memory places a significant programming burden on the developer.
Â
Garbage collection reduces cache coherence traffic compared to explicitly freeing memory.
Â
Objects removed from a data structure on one core may still be in use by other cores.
Not yet answered.
Â
Submit
Submit Your Answer
problem
1 point possible (graded)
10) Which of the following visual variables are preattentive? (choose all that apply)
Â
Color
Â
Shape
Â
Text
Â
Size
Not yet answered.
Â
Submit
Submit Your Answer
problem
1 point possible (graded)
11) Which two of the following visual variables best convey quantitative values: (choose all that apply)
Â
Color
Â
Position
Â
Length
Â
Texture
Not yet answered.
Â
Submit
Submit Your Answer
Â
problem
1 point possible (graded)
12) What is deceptive about the image above describing oil prices? (choose all that apply)
Â
Numeric labels
Â
Decorative aspects of cylinders
Â
False perspective
Â
3D illusion
Not yet answered.
Â
Submit
Submit Your Answer
problem
1 point possible (graded)
13) For which of the following tasks is interactive visualization most useful? (choose all that apply)
Â
Developing a hypothesis about data
Â
Formally confirming a hypothesis
Â
Communicating a conclusion about data
Â
All of the above
Not yet answered.
Â
Submit
Submit Your Answer
problem
1 point possible (graded)
14) Which of the following interface elements use direct manipulation? (choose all that apply)
Â
The DOS command line
Â
WYSIWYG editors
Â
Pan and zoom interfaces
Â
SQL databases
Not yet answered.
Â
Submit
Submit Your Answer
problem
1 point possible (graded)
15) How does linking and brushing help users understand data? (choose all that apply)
Â
They can follow links like joins in a database
Â
They can see connections between data in different visualizations
Â
They can change the colors of data points for better clarity
Â
The can move data between different visualizations
Not yet answered.
Â
Submit
Submit Your Answer
problem
1 point possible (graded)
16) Which are advantages of faceted browsing over hierarchical search? (choose all that apply)
Â
Users don't need to guess which queries to enter
Â
Users can apply restrictions in arbitrary order
Â
Faceted browsing generally looks more professional
Â
Users can undo mistakes
Not yet answered.
Â
Submit
Submit Your Answer
problem
1 point possible (graded)
17) Which of the following is often used for faceted browsing? (choose all that apply)
Â
A tag cloud
Â
A slider for a numeric range
Â
A text search box
Â
A map
Not yet answered.
Â
Submit
Submit Your Ans
Â
ASSESSMENT 5This section will be graded, so it will affect your final grade.•Click "Check" to submit each answer for evaluation.•Questions may be answered in any order.•problem1 point possible (graded)1) What database operations can be performed using deterministic encryption? (choose all that apply)Finding items that are equal to a particular value.Grouping items by equality.Sorting items at the server.Obtaining all items from the database.Not yet answered.SubmitSubmit Your Answerproblem1 point possible (graded)2) What operations does a CryptDB implement using a homomorphic encryption scheme (such as Paillier)? (choose all thatapply)Adding integer values.Checking equality between values.Computing the sum of values.Computing the average of values.