HPC Mid2 Obj Ans

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

MALLAREDDY ENGINEERING COLLEGE (AUTONOMOUS)

M.TECH II YEAR III Semester (MR 22) II Mid Question Bank 2022-23 (Subjective)

Subject Code and Name: C5127 - HIGH PERFORMANCE COMPUTING

Branch/ Specialization: CSE/ (CSE)

Name of the Faculty: JASMINE SHAIK

MODULE-III
1 Each node in the clustered systems contains the cluster?
A) Hardware
B) software
C) Both A and B
D) Can not say
2 In which type of clusters, the nodes in the system share the workload to provide a better
performance?
A) High Availability Clusters
B) Load Balancing Clusters
C) Both A and B
D) None of the above
3 Which of the following are Benefits of Clustered Systems?
A) Clustered systems result in high performance
B) Clustered systems are quite fault tolerant
C) Clustered systems are quite scalable
D) All of the above
4 Clustered systems have ___________ CPUs.
A) zero
B) one
C) two
D) multiple
5 Each computer in a cluster is connected using __________
A) UTP
B)Rj-45
C) STP
D)Coaxial cable
6 The set of loosely connected computers are called as __________
A) LAN
B) WAN
C) Workstation
D) Cluster
7 The computer cluster architecture emerged as a result of _________
A) ISA B) Workstation
C) Super computers D) Distributed systems
8 The software which governs the group of computers is __________
A) Driver Rd45
B) Interface UI
C) Clustering middleware
D) Distributor
9 The simplest form of a cluster is __________ approach.
A) Beowolf
B) Sequoia
C) Stone
D) None of the mentioned
1 The cluster formation in which the work is divided equally among the systems is______
0 A) Load-configuration
B) Load-Division
C) Light head
D) Both Load-configuration and Load-Division
1 In the client server model of the cluster _________ approach is used.
1 A) Load configuration
B) FIFO
C) Bankers algorithm
D) Round robin
1 The beowolf structure follows the __________ approach of a relationship between the
2 systems.
A) Master-slave
B) Asynchronous
C) Synchronous
D) Isochronous
1 The most common modes of communication in clusters are ______
3 A)Message queues
B) Message passing interface
C) PVm
D) Both Message passing interface and PVm
1 The method followed in case of node failure, wherein the node gets disabled is _______
4 A) STONITH
B) Fibre channel
C) Fencing
D) None of the mentioned
1 Which of the following is not the function of Operating System?
5 A) Process Management
B) Memory Management
C) Device Management
D) Clock Management

MODULE-IV
1 main properties for UbiCom Systems were proposed by Weiser
A)1 B) 2 C) 3 D) 4
2 Which of the following is not a key characteristic of Ubicomp System ?
A) Distributed
B) Ihci
C) Context – awareness
D) Pay as you go

3 When connecting a wearable device to the cloud, what software is required to run a
custom service?
A) Database
B) Operating System
C) http server
D) All of above
4 IrDA support……
A) Sql server ce
B) Device specific controls
C) High performance jit compiler
D) All of the above
5 What does RFID stand for
A) Radio frequency issue date
B) Radio frequency identification
C) Real field identification
D) Real far identification
6 What applications run on a SMART Board?
A) any applicaiton on the computer
B) internet browsers like explorer and navigator only
C) powerpoint only
D) None of these
7 The SMART Board Software is called
A) Notepage
B) Note book
C) Spriral page
D) All of above
8 It takes the output signal from the transmission channel and delivers
A) Transmitter B)transmission channel
C)receiver D)hardware
9 Which of the Following is used in banking industary.....
A) micr B) omr
B) C)all of these D) none of these
1 WAP?
1 A)wireless application protocol B)wired allication protocol
C)wide application protocol D)none of the above
The tag can be used to activate the task when the user clicks on a word on the screen?
1 A) True
2 B) False
C) Both
D) None of these
1 WAP is designed for?
3 A) internet explorer b)web browser
c)micro browser d)macro browser
1 Limitations of Short Messaging Service (SMS)
4 A) limited to 160 characters or less
B) message latency is one minute or more
C) poor security at the application level
D) all of the above
1 DoCoMo Stands for ...............
5 A) documentation over the mobile network
B) do communications over the mobile network
C) documentation & communications over the mobile network
D) none of the above
1 Mobile Web Service design often uses a three tier ...............
6 A) thin client, client proxy, server architecture
B) network, client proxy, server architecture
C) internet,cilent & server
D) none of the above
1 Mobile code is any .........
7 A) program b)application
c) content d) all of the above
1 Sandboxes ..........
8 A) that limit the local services that code can access.
B) which ensures that code originates from a trusted source.
C) machines that can access the internet
D) that carries explicit proof of its security.
1 What types of protocols are used in VPNs?
9 A) application level protocols
B) tunnelling protocols
C) network protocols
D) mailing protocols
2 Which types of VPNs are used for corporate connectivity across companies residing in
0 different geographical location?
A)remote access vpns B)site-to-site vpns
C)peer-to-peer vpns D)country-to-country vpns
2 Which of the statements are not true to classify VPN systems?
1 A) protocols used for tunnelling the traffic
B) whether vpns are providing site-to-site or remote access connection
C) securing the network from bots and malwares
D) levels of security provided for sending and receiving data privately
2 A firewall needs to be------so that it can grow proportionally with the network that it
2 protects.
A) robust
B) expansive
C) fast
D) scalable
2 A proxy firewall filters at
3 A)physical layer B)data link layer
C)network layer D)application layer
2 A firewall is installed at the point where the secure internal network and untrusted
4 external network meet which is also known as
A)chock point B)meeting point C)firewall point D)secure point
2 Which of the following standard committee specifies Bluetooth and other Personal Area
5 Networks (PAN)?

A)ieee 802.11 B)bieee 802.15.2. C)ieee 802.11g D) ieee 802.16


2 Body Area Network requirements ..........
6 A) low power consumption & interoperability
B) self-healing & security
C) low latency
D) all of the above
2 There is more than ............... cell nodes in zigbee.
7 A)66000 B)65000 C)60000 D)70000
2 Frequency range supported in Zigbee .............
8 A) 2.4 ghz worldwide
B) 2.0 ghz worldwide
C) 2.1 ghz worldwide
D) 3.4 ghz worldwide
2 The bluetooth supports
9 A) point-to-point connections
B) point-to-multipoint connection
C) both (a) and (b)
D) none of the above
3 What is WPA?
0 A) wi-fi protected access
B) wired protected access
C) wired process access
D) wi-fi process access
MODULE-V
1 When the information is between 0 and 1 in a quantum computer, what do we call this?
A)Same position B)Different position
C)Superposition D)Ordinary position
2 Quantum computing is relatively _________ than classical computing.
A) Faster
B) Slower
C) Average
D)None of the Above
3 Which the companies used the quantum computing
A) IBM
B) GOOGLE
C) All of the above
D) None of these
4 Which company has a quantum computer that we can use through their website?
A) Microsoft
B) IBM
C) Apple
D) Google
5 Process data at Quantum computing
A) Fast
B) Slow
C) Different
D) Conventional
6 Quantum computing is _________ than classical computing.
A) Faster B)Slower
C)Different D)Conventional
7 What can quantum computers be used for?
A) Artificial Intelligence
B) Google Docs and Slides
C) Simulations/Predictions
D) Option A & C
8 What do we call the pieces of information in a quantum computer?
A) Bits B) Bytes
C) Qubits D) Qubytes
9 What is the full form of DCDVS logic?
A) Differential cascade voltage switch
B) Differential cascade voltage static
C) Differential complex voltage switch
D) None
1 Who was the inventor of the idea of logic gates?
0 A) George Boole
B) Bardeen
C) Claude Shannon
D) Kornard Zuse
1 What is the one’s complement for the binary number 011001
1 A) 000111
B) 100110
C) 111001
D) D. 110001
1 Expand TTL
2 A) Transistor-transducer logic
B) Transistor- transistor logic
C) Transducer-transistor logic
D) D. None
1 How many types of logic families exist?
3 A) Two
B) Six
C) Four
D) D. Seven
1 Which of the following signifies a NOT gate?
4 A) 1 (input)- 0 (output)
B) 1,0 (input)- 1 (output)
C) 0,0 (input)- 0 (output)
D) None
1 What is the boolean operation performed by an OR gate?
5 A) Equivalent of addition
B) Equivalent of multiplication
C) Equivalent of dificsin
D) D. Equivalent of subtraction.
1 A NAND gate has —– inputs and —— outputs.
6 A) High input and High output
B) High input and low output
C) Low input and low output
D) D. Low input and high output

1 An inverter gates can be developed using


7 A) Two diodes
B) Resistance and capacitance
C) Transistor
D) Inductance and capacitance
1 Two input exclusive NOR gate gives high output
8 A) When one input is high and the other is low
B) Only when both the inputs are low
C) When both the inputs are the same
D) Only when both the inputs are high
1 The gate ideally suited for bit comparison is a
9 A) Two input exclusive NOR gate
B) Two input exclusive OR gate
C) Two input NAND gate
D) Two input NOR gate
2 A NOR gate means
0 A) Inversion followed by an OR gate
B) OR gate followed by an inverter
C) NOT gate followed by an OR gate
D) NAND gate followed by an OR gate
2 Who is the father of quantum computing?
1 A) Isaac Chuang
B) Neil Gershenfeld
C) Philip Glass
D) David Deutsch
2 What do we call the pieces of information in a quantum computer?
2 A) Bits
B) Qubits
C) Bytes
D) Qubytes
2 When the information is between 0 and 1 in a quantum computer, what do we call this?
3 A) Superposition
B) Same position
C) Ordinary position
D) Different position
2 Quantum computers are very good at dealing with_____
4 A) Clarity
B) Certainty
C) Uncertainty
D) Reliability
2 What does 'entanglement' mean?
5 A) Two particles are different
B) Two particles are seperate
C) Two particles are independent
D) Two particles are connected

2 What innovations are being developed in the 5th generation?


6 A) Artificial intelligence
B) Quantum Computers
C) Brain-Computer Interfaces
D) All of the Above
2 Why are we not able to use quantum computers in our homes?
7 A) It is too heavy
B) It needs to be completely isolated
C) It has to be kept at absolute zero temperature
D) Both (B) and (C)
2 When the two members of a Qubit pair exist in a single quantum state, it is known as
8 ___________.
A) Entanglement
B) Engagement
C) Superposition
D) None of the Above
2 Which company has a quantum computer that we can use through their website?
9 A) Apple
B) IBM
C) Google
D) Microsoft
3 Which of the following is NOT a true statement about using a cloud storage option?
0 A) It can be accessed through any computer, anywhere in the world
B) Using the cloud keeps your computer safe from viruses
C) You can easily share documents and/or files with friends or family
D) Your computer or tablet can be set up to automatically sync with the cloud

You might also like