Question 1 :
For inter processor communication the miss arises are called
- hit rate
- coherence misses
- comitt misses
- parallel processing
Question 2 :
Communicating a message of size m over an uncongested network takes time ts + tmw
- TRUE
- False
Question 3 :
If n is a power of two, we can perform this operation in ____ steps by propagating partial sums up a logical binary tree of processors.
- logn
- nlogn
- n
- n^2
Question 4 :
MPI_Comm_size
- Returns number of processes
- Returns number of line
- Returns size of program
- Returns value of instruction
Question 5 :
Parallel computing means to divide the job into several __________
- Bit
- Data
- Instruction
- Task
Question 6 :
A processor performing fetch or decoding of different instruction during the execution of another instruction is called ______ .
- Super-scaling
- Pipe-lining
- Parallel computation
- serial computation
Question 7 :
Mpi_Recv used for
- reverse message
- receive message
- forward message
- Collect message
Question 8 :
In which system desire HPC
- Adaptivity
- Transparency
- Dependency
- Secretivte
Question 9 :
Pipe-lining is a unique feature of _______.
- CISC
- RISC
- ISA
- IANA
Question 10 :
To increase the speed of memory access in pipelining, we make use of _______
- Special memory locations
- Special purpose registers
- Cache
- Buffer
Question 11 :
What is the execution time per stage of a pipeline that has 5 equal stages and a mean overhead of 12 cycles
- 2 cycles
- 3 cycles
- 5 cycles
- 4 cycles
Question 12 :
The main difference between the VLIW and the other approaches to improve performance is ___________
- increase in performance
- Lack of complex hardware design
- Cost effectiveness
- latency
Question 13 :
The stalling of the processor due to the unavailability of the instructions is called as ___________
- Input hazard
- data hazard
- structural hazard
- control hazard
Question 14 :
If the value V(x) of the target operand is contained in the address field itself, the addressing mode is
- Immediate
- Direct
- Indirect
- Implied
Question 15 :
To which class of systems does the von Neumann computer belong
- SIMD
- MIMD
- MISD
- SISD
Question 16 :
The parallelism across branches require which scheduling
- Global scheduling
- Local Scheduling
- post scheduling
- pre scheduling
Question 17 :
The Prefix Sum Operation can be implemented using the_
- All-to-all broadcast kernel.
- All-to-one broadcast kernel.
- One-to-all broadcast Kernel
- Scatter Kernel
Question 18 :
The contention for the usage of a hardware device is called ______
- data hazard
- Stalk
- Deadlock
- structural hazard
Question 19 :
The need for parallel processor to increase speedup
- Moores Law
- Minsky conjecture
- Flynns Law
- Amdhals Law
Question 20 :
A single control unit that dispatches the same Instruction to various processors is__
- SIMD
- SPMD
- MIMD
- None of above
Question 21 :
When every caches hierarchy level is subset of level which futher away from the processor
- Synchronous
- Atomic synschronous
- Distrubutors
- Multilevel inclusion
Question 22 :
Writing parallel programs is referred to as
- Parallel computation
- parallel development
- parallel programing
- Parallel processing
Question 23 :
The gather operation is exactly the inverse of the_
- Scatter operation
- Broadcast operation
- Prefix Sum
- Reduction operation
Question 24 :
Uniprocessor computing devices is called__________.
- Grid computing
- Centralized computing
- Parallel computing
- Distributed computing
Question 25 :
hypercube has_
- 2d nodes
- 2d nodes
- 2n Nodes
- N Nodes
Question 26 :
The computer architecture aimed at reducing the time of execution of instructions is ________.
- CISC
- RISC
- SPARC
- ISA
Question 27 :
The situation wherein the data of operands are not available is called ______
- stock
- Deadlock
- data hazard
- structural hazard
Question 28 :
Speedup, in theory, should be ______ bounded by p
- lower
- upper
- left
- right
Question 29 :
Tree networks suffer from a communication bottleneck at higher levels of the tree. This network, also called a _________ tree.
- fat
- binary
- order static
- heap tree
Question 30 :
_____processors rely on compile time analysis to identify and bundle together instructions that can be executed concurrently
- VILW
- LVIW
- VLIW
- VLWI