A) A centralized database for storing hash values. B) A type of encryption technique. C) A networking protocol for routing packets. D) A decentralized system for key-value storage and retrieval.
A) By storing all keys in a single database. B) By using a distributed algorithm to map keys to nodes in the network. C) By randomly assigning keys to nodes. D) By assigning keys to a central server for lookup.
A) A unique identifier for data that is used to look up and store values in the DHT. B) A server hosting the DHT service. C) A keyword that describes the data content. D) A secret cryptographic key used for encryption.
A) Binary tree. B) Linked list. C) Queue. D) Hash table.
A) The process of encrypting data for secure transmission. B) The process of mapping data to a specific key in the DHT. C) The process of storing multiple copies of data on different nodes for fault tolerance. D) The process of compressing data for efficient storage.
A) Symmetric hashing. B) Random hashing. C) Consistent hashing. D) Asymmetric hashing.
A) By blocking access to the failed node. B) By redistributing data and keys to other nodes in the network. C) By increasing the replication factor of the data. D) By permanently deleting the data associated with the failed node.
A) FTP. B) HTTP. C) Kademlia. D) SMTP. |