Parallel and Distributed Computing MCQs

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

Parallel and Distributed Computing MCQs

Interprocessor communication that takes place

A. Centralized memory
B. Shared memory
C. Message passing
D. Both A and B

Data centers and centralized computing cover many and

A. Microcomputers
B. Minicomputers
C. Mainframe computers
D. Supercomputers
E. All of these

Which of the following is a primary goal of HTC paradigm _____.

A. High ratio Identification


B. Low-flux computing
C. High-flux computing
D. Computer Utilities

The high-throughput service provided is measure taken by

A. Flexibility
B. Efficiency
C. Adaptation
D. Dependability

A parallel computing system consists of multiple processor that


communicate with each other using a ___.

(A) Allocated memory


(B) Shared memory
(C) Network
(D) None of the above

The computer system of a parallel computer is capable of


A. Decentralized computing
B. Parallel computing
C. Centralized computing
D. Decentralized computing
E. Distributed computing

Writing parallel programs is referred to a

A. Parallel computation
B. Parallel processes
C. Parallel development
D. Parallel programming
E. Parallel computation

Simplifies applications of three-tier architecture is ______.

A. Maintenance
B. Initiation
C. Implementation
D. Deployment

Dynamic networks of networks, is a dynamic connection that grows is


called

A. Multithreading
B. Cyber cycle
C. Internet of things
D. Cyber-physical system
E. All of these

What is/are the factor(s) for the popularity of Distributed system?

A. Reliability
B. Scalability
C. Data Sharing
D. Resource Sharing
E. All of the above

Parallel computing can be used in ___


A. Science and engineering
B. Database and data mining
C. Real time simulation of systems
D. All of the above

Peer-to-peer leads to the development of technologies like

A. Norming grids
B. Data grids
C. Computational grids
D. Both A and B

Type of HPC applications.

A. Management
B. Media mass
C. Business
D. Science

The development generations of Computer technology has gone


through

A. 6
B. 3
C. 4
D. 5
E. All of these

The utilization rate of resources in an execution model is known to be its

A. Adaptation
B. Efficiency
C. Dependability
D. Flexibility

Even under failure conditions Providing Quality of Service (QoS)


assurance is the responsibility of

A. Dependability
B. Adaptation
C. Flexibility
D. Efficiency

In which application system Distributed systems can run well?

A. HPC
B. HTC
C. HRC
D. Both A and B

In which systems desire HPC and HTC.

A. Adaptivity
B. Transparency
C. Dependency
D. Secretive

No special machines manage the network of architecture in which


resources are known as

A. Peer-to-Peer
B. Space based
C. Tightly coupled
D. Loosely coupled
E. All of these

Significant characteristics of Distributed systems have of

A. 5 types
B. 2 types
C. 3 types
D. 4 types

Built of Peer machines are over

A. Many Server machines


B. 1 Server machine
C. 1 Client machine
D. Many Client machines
What are the current trends in microprocessor architecture?

A. Increase in clock speed


B. Pipelining
C. Superscalar execution
D. All of the above

VLIW stand for

A. Very Long Instruction processor


B. Very Large Instruction processor
C. Very Long Instruction processing
D. Very Large Instruction processing

Dichotomy of parallel computing platforms are based on

A. Logical organization
B. Physical organization
C. Both A & B
D. None of these

Critical components of parallel computing, logically:

A. Control Structure: How to express parallel task


B. Communication model: mechanism for specifying interaction
C. Both A & B
D. None of these

Type HTC applications are

A. Business
B. Engineering
C. Science
D. Media mass

Virtualization that creates one single address space architecture that of,
is called
A. Loosely coupled
B. Peer-to-Peer
C. Space-based
D. Tightly coupled
E. Loosely coupled

We have an internet cloud of resources In cloud computing to form

A. Centralized computing
B. Decentralized computing
C. Parallel computing
D. Both A and B
E. All of these

Data access and storage are elements of Job throughput, of _______.

A. Flexibility
B. Adaptation
C. Efficiency
D. Dependability

Billions of job requests is over massive data sets, ability to support


known as

A. Efficiency
B. Dependability
C. Adaptation
D. Flexibility

Static interconnection network topologies are

A. Bus-based
B. Switch Based
C. Both A & B
D. None of these

What are the criteria used to characterize the cost and performance of
Static ICN?
A. Diameter
B. Connectivity
C. Bisection width and bandwidth
D. Cost
E. All of these

What are principal that determine the communication latency between


two nodes ?

A. Startup time
B. Per-hop time
C. Per-word transfer time
D. All of these

Routing techniques used in parallel computers

A. Store-and-forward routing
B. Packet routing
C. Cut-through routing
D. All of these

Broader concept offers Cloud computing .to select which of the


following.

A. Parallel computing
B. Centralized computing
C. Utility computing
D. Decentralized computing
E. Parallel computing

Resources and client transparency that allows movement within a


system is called

A. Mobility transparency
B. Concurrency transparency
C. Performance Transparency
D. Replication transparency

A distributed program in a distributed computer a is known as


A. Distributed process
B. Distributed program
C. Distributed application
D. Distributed computing

Uniprocessor computing devices is called _____.

A. Grid computing
B. Centralized computing
C. Parallel computing
D. Distributed computing

Utility computing focuses on a ______ model.

A. Data
B. Cloud
C. Scalable
D. Business

What is a CPS merges technologies

A. 5C
B. 2C
C. 3C
D. 4C

Aberration of HPC

A. High-peak computing
B. High-peripheral computing
C. High-performance computing
D. Highly-parallel computing

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy