Loading
- Seat No -Total number of questions : 6011342_High Performance ComputingTime : 1hrMax Marks : 50N.B1) All questions are Multiple Choice Questions having single correct option.2) Attempt any 50 questions out of 60.3) Use of calculator is allowed.4) Each question carries 1 Mark.5) Specially abled students are allowed 20 minutes extra for examination.6) Do not use pencils to darken answer.7) Use only black/blue ball point pen to darken the appropriate circle.8) No change will be allowed once the answer is marked on OMR Sheet.9) Rough work shall not be done on OMR sheet or on question paper.10) Darken ONLY ONE CIRCLE for each answer.Q.no 1. MIPS stands for?A : Mandatory Instructions/secB : Millions of Instructions/secC : Most of Instructions/secD : Many Instructions / secQ.no 2. Depth First Search is equivalent to which of the traversal in the BinaryTrees?A : Pre-order TraversalB : Post-order TraversalC : Level-order TraversalD : In-order Traversal
Page 1
- Q.no 3. Regarding implementation of Breadth First Search using queues, what isthe maximum distance between two nodes present in the queue? (consideringeach edge length 1)A : Can be anythingB : 0C : At most 1D : Insufficient InformationQ.no 4. Calling a kernel is typically referred to as _________.A : kernel threadB : kernel initializationC : kernel terminationD : kernel invocationQ.no 5. The decomposition technique in which the function is used severalnumber of times is called as_________A : Data DecompositionB : Recursive DecompositionC : Speculative DecompositionD : Exploratory DecompositionQ.no 6. The decomposition technique in which the input is divided is calledas_________A : Data DecompositionB : Recursive DecompositionC : Speculative DecompositionD : Exploratory DecompositionQ.no 7. Several instructions execution simultaneously in ________________A : processingB : parallel processing
Page 2
- C : serial processingD : multitaskingQ.no 8. Following is not decomposition techniqueA : Data DecompositionB : Recursive DecompositionC : Serial DecompositionD : Exploratory DecompositionQ.no 9. How many Attibutes required to characterize messsage passing paragdigmA : 2B : 4C : 6D : 8Q.no 10. Which of the following is not an in-place sorting algorithm?A : Selection sortB : Heap sortC : Quick SortD : Merge sortQ.no 11. The time complexity of heap sort in worst case isA : O(log n)B : O(n)C : O(nlogn)D : O(n^2)Q.no 12. Most message-passing programs are written usingA : the single program multiple data (SPMD) model.B : the multiple program and single data(MPSD) model
Page 3
- C : the single program single data (SPSD) modelD : the Multiple program multiple data (SPMD) modelQ.no 13. Decomposition stands forA : Dividing Problem statementB : Dividing no of processorsC : Dividing number of tasksD : Dividing number of operationQ.no 14. Message-passing programs are often written usingA : symetric ParadigmB : asymetric ParadigmC : asynchronous paradigmD : synchronous paradigmQ.no 15. Following is not mapping techniqueA : Static MappingB : Dynamic MappingC : Hybrid MappingD : All of AboveQ.no 16. Which of the following is not a stable sorting algorithm?A : Insertion sortB : Selection sortC : Bubble sortD : Merge sortQ.no 17. Type of HPC applications ofA : ManagementB : Media mass
Page 4
- C : BusinessD : ScienceQ.no 18. The kernel code is dentified by the________qualifier withvoidreturn typeA : _host_B : __global__C : _device_D : voidQ.no 19. The time complexity of a quick sort algorithm which makes use ofmedian, found by an O(n) algorithm, as pivot element isA : O(n^2)B : O(nlogn)C : O(nlog(log(n))D : O(n)Q.no 20. When the Breadth First Search of a graph is unique?A : When the graph is a Binary TreeB : When the graph is a Linked ListC : When the graph is a n-ary TreeD : When the graph is a Ternary TreeQ.no 21. Which of the following is not an application of Depth First Search?A : For generating topological sort of a graphB : For generating Strongly Connected Components of a directed graphC : Detecting cycles in the graphD : Peer to Peer NetworksQ.no 22. The logical view of a machine supporting the message-passing paradigmconsists of p processes, each with its own _______A : Partitioned Address space
Page 5
- B : Exclusive address spaceC : Logical Adress SpaceD : Non shared Adress SpaceQ.no 23. Which one of the following is not shared by threads?A : program counterB : stackC : both program counter and stackD : none of the mentionedQ.no 24. Which of the following is a stable sorting algorithm?A : Merge sortB : Typical in-place quick sortC : Heap sortD : Selection sortQ.no 25. In ………………. only one process at a time is allowed into its criticalsection, among all processes that have critical sections for the same resource.A : Mutual ExclusionB : SynchronizationC : DeadlockD : StarvationQ.no 26. We have an internet cloud of resources In cloud computing to formA : Centralized computingB : Decentralized computingC : Parallel computingD : All of AboveQ.no 27. Broader concept offers Cloud computing .to select which of the following.A : Parallel computing
Page 6
- B : Centralized computingC : Utility computingD : Decentralized computingQ.no 28. Writing parallel programs is referred to asA : Parallel computationB : Parallel processesC : Parallel developmentD : Parallel programmingQ.no 29. Network interfaces allow the transfer ofmessages from buffer memory to desired location without ____ interventionA : DMAB : CPUC : I/OD : MemoryQ.no 30. Consider the situation in which assignment operation is very costly.Which of the following sorting algorithm should be performed so that thenumber of assignment operations is minimized in general?A : Insertion sortB : Selection sortC : Bubble sortD : Merge sortQ.no 31. A process can be ___________A : single threadedB : multithreadedC : both single threaded and multithreadedD : none of the mentionedQ.no 32. High performance computing of the computer system tasks are done by
Page 7
- A : node clustersB : network clustersC : both a and bD : Beowulf clustersQ.no 33. Interprocessor communication that takes placeA : Centralized memoryB : Shared memoryC : Message passingD : Both A and BQ.no 34. Which of the following is not a noncomparison sort?A : Counting sortB : Bucket sortC : Radix sortD : Shell sortQ.no 35. Parallel computing uses _____ executionA : sequentialB : uniqueC : simultaneousD : none of the answers is correctQ.no 36. When the event for which a thread is blocked occurs?A : thread moves to the ready queueB : thread remains blockedC : thread completesD : a new thread is providedQ.no 37. Which of the following is NOT a characteristic of parallel computing?
Page 8
- A : Breaks a task into piecesB : Uses a single processor or computerC : Simultaneous executionD : May use networkingQ.no 38. _____ are major issues with non-buffered blocking sendsA : concurrent and mutual exclsionB : Idling and deadlocksC : synchronizationD : schedulingQ.no 39. If the given input array is sorted or nearly sorted, which of the followingalgorithm gives the best performance?A : Insertion sortB : Selection sortC : Bubble sortD : Merge sortQ.no 40. Message passing system allows processes to __________A : communicate with one another without resorting to shared dataB : communicate with one another by resorting to shared dataC : share dataD : name the recipient or sender of the messageQ.no 41. ______________ leads to concurrency.A : SerializationB : ParallelismC : Serial processingD : Distribution
Page 9
- Q.no 42. The time required to create a new thread in an existing process is___________A : greater than the time required to create a new processB : less than the time required to create a new processC : equal to the time required to create a new processD : none of the mentionedQ.no 43. RMI stands for?A : Remote Mail InvocationRemote Message InvocationB : Remaining Method InventionC : Remaining Method InvocationD : Remote Method InvocationQ.no 44. Dynamic networks of networks, is a dynamic connection that grows iscalledA : MultithreadingB : Cyber cycleC : Internet of thingsD : None of theseQ.no 45. If one thread opens a file with read privileges then ___________A : other threads in the another process can also read from that fileB : other threads in the same process can also read from that fileC : any other thread can not read from that fileD : all of the mentionedQ.no 46. the basic operations in the message-passing programming paradigm are___A : initiate and listenB : wait and acknoweldgeC : request and reply
Page 10
Download this file to view remaining 160 pages
Related documents:
- HISTORY II 2020 question paper - Question Paper
- Digital Electronics MCQs - MCQ
- Unconventional Machining Processes Solved MCQs - MCQ
- MG6851 PRINCIPLES OF MANAGEMENT Question Paper - Question Paper
- Bcs 304 Data Communication And Networking MCQs - MCQ
- Social Construction Of Gender Unit-2 Quetions with answers - Question Bank
- Economics (Paper I) 2017 Question Paper - Question Paper
- Microeconomics-II - Question Bank
- C programming Practical - Assignment
- CONCEPT RECAPITULATION TEST - I Paper 1 [ANSWERS, HINTS & SOLUTIONS CRT–I] 2014
- Philosophical and Sociological Foundations of Education 1st Set - Question Bank
- Bhasha-Vigyan Aur Hindi Bhasha - Question Bank
- Electrostatics - I - ELECTROMAGNETICS MCQs - MCQ
- Mathematics-II - MCQ
- QP IFSM-23 GEOLOGY PAPER-I - Question Paper
- Literary Criticism Question bank with Answers - Question Bank
- PRINCIPLES OF BANK LENDING - Banking regulation and operations (BRO) - Notes
- Political Science and International Relations (Paper II) 2018 Question Paper - Question Paper
- CONCEPT RECAPITULATION TEST - I Paper 2 - Question Paper
- Applied Mathematics