• 1. 
    Domain and functional decomposition are considered in the following parallel methodological design elements, EXCEPT:

  • Partitioning
  • Communication
  • Agglomeration
  • Mapping
  • 2. 
    Word processing, checking email, surfing the Internet, watching videos can be done using (minimum)

  • Single core CPU
  • Dual core CPU
  • Quad core CPU
  • 3. 
    If a list of items is in random order use a

  • Binary search
  • Linear Seach
  • 4. 
    Address <----- key MOD(numberOfSlots)IF KEY = 5432 and numberOfSlots = 1000Address = ?

  • 5
  • 432
  • 543
  • 5432
  • 5. 
    Flash-enabled web browsing, video and conference chatting can be done by

  • Single core CPU
  • Dual core CPU
  • Quad core CPU
  • 6. 
    Synchronization is one of the common issues in parallel programming. The issues related to synchronization include the followings, EXCEPT:

  • Deadlock
  • Livelock
  • Fairness
  • Correctness
  • 7. 
    ____________ is due to load imbalance, synchronization, or serial components as parts of overheads in parallel programs.

  • Interprocess interaction
  • Synchronization
  • Idling
  • Excess computation
  • 8. 
    Which of the followings is the BEST description of Message Passing Interface (MPI)?

  • A specification of a shared memory library
  • MPI uses objects called communicators and groups to define which collection of processes may communicate with each other
  • Only communicators and not groups are accessible to the programmer only by a "handle"
  • A communicator is an ordered set of processes
  • 9. 
    If the number of core is Six it is called as

  • Dual core
  • Quad core
  • Hexa core
  • Octa core
  • 10. 
    Which one is very rare nowadays?

  • SISD
  • SIMD
  • MISD
  • MIMD
  • 11. 
    Which one are GPUs part of?

  • SISD
  • SIMD
  • MISD
  • MIMD
  • 12. 
    The earliest computer CPUs were

  • SISD
  • SIMD
  • MISD
  • MIMD
  • 13. 
    Parallelism can be used to increase the (parallel) size of the problem is applicable in ___________________.

  • Amdahl's Law
  • Gustafson-Barsis's Law
  • Newton's Law
  • Pascal's Law
  • 14. 
    Which of the following parallel methodological design elements focuses on recognizing opportunities for parallel execution?

  • Partitioning
  • Communication
  • Aggromeration
  • Mapping
  • 15. 
    The case in which a key other than the desired one is kept at the identified location is called?

  • Hashing
  • Collision
  • Chaining
  • Open addressing
  • 16. 
    Most modern desktop/laptops are

  • SISD
  • SIMD
  • MISD
  • MIMD
  • 17. 
    Which of the following parallel algorithm models is applicable to web server?

  • Task graph
  • Work pool
  • Master-slave
  • Pipeline
  • 18. 
    WHICH ARCHITECTURE USES TWO DIFFERENT DEDICATED MEMORY FOR STORING PROGRAM AND DATA?

  • SOFTWARE
  • HARDWARE
  • VON NEUMANN
  • HARVARD
  • 19. 
    A hash table of length 10 uses open addressing with hash function h(k)=k mod 10, and linear probing. After inserting 6 values into an empty hash table, the table is as shown above.Which one of the following choices gives a possible order in which the key values could have been inserted in the table?

  • 46, 42, 34, 52, 23, 33
  • 34, 42, 23, 52, 33, 46
  • 46, 34, 42, 23, 52, 33
  • 42, 46, 33, 23, 34, 52
  • 20. 
    CISC STANDS FOR

  • COMPLEX INSTRUCTION SET CONTROLLER
  • COMPLEX INSTRUCTION SET COMPUTER
  • CONTROLLED INSTRUCTION SET COMPUTER
  • COMMON INSTRUCTION SET COMPUTER
Report Question
warning
access_time
  Time