Data Analytics MCQ 2000+
1. Which of the following is not an example of Social Media?
- Twitter
- Google
- Instagram
- YouTube
Answer
Google
2. By 2025, the volume of digital data will increase to
- TB
- YB
- ZB
- EB
Answer
ZB
3. Data Analysis is a process of
- inspecting data
- cleaning data
- transforming data
- All of Above
Answer
All of above
4. Does Facebook uses “Big Data ” to perform the concept of Flashback?
- True
- False
Answer
True
5. Which of the following is not a major data analysis approaches?
- Data Mining
- Predictive Intelligence
- Business Intelligence
- Text Analytics
Answer
Predictive Intelligence
6. The Process of describing the data that is huge and complex to store and process is known as
- Analytics
- Data mining
- Big data
- Data warehouse
Answer
Big data
7. How many main statistical methodologies are used in data analysis?
- 2
- 3
- 4
- 5
Answer
2
8. In descriptive statistics, data from the entire population or a sample is summarized with ?
- Integer descriptor
- floating descriptor
- numerical descriptor
- decimal descriptor
Answer
numerical descriptor
9. ____ have a structure but cannot be stored in a database.
- Structured
- Semi Structured
- Unstructured
- None of these
Answer
None of these
10. Data generated from online transactions is one of the example for volume of big data
- TRUE
- FALSE
Answer
TRUE
11. Velocity is the speed at which the data is processed
- True
- False
Answer
False
12. Value tells the trustworthiness of data in terms of quality and accuracy
- TRUE
- FALSE
Answer
False
13. Hortonworks was introduced by Cloudera and owned by Yahoo
- True
- False
Answer
False
14. ____ refers to the ability to turn your data useful for business
- Velocity
- variety
- Value
- Volume
Answer
Value
15. GFS consists of ____ Master and _____ Chunk Servers
- Single, Single
- Multiple, Single
- Single, Multiple
- Multiple, Multiple
Answer
Single, Multiple
16. Data Analysis is defined by the statistician?
- William S.
- Hans Peter Luhn
- Gregory Piatetsky-Shapiro
- John Tukey
Answer
John Tukey
17. Files are divided into ____ sized Chunks.
- Static
- Dynamic
- Fixed
- Variable
Answer
Fixed
18. _____ is an open source framework for storing data and running application on clusters of commodity hardware.
- HDFS
- Hadoop
- MapReduce
- Cloud
Answer
Hadoop
19. HDFS Stores how much data in each clusters that can be scaled at any time?
- 32
- 64
- 128
- 256
Answer
128
20. Hadoop Map Reduce allows you to perform distributed parallel processing on large volumes of data quickly and efficiently… is this Map Reduce or Hadoop
- True
- False
Answer
True
21. Google Introduced Map Reduce Programming model in 2004
- True
- False
Answer
True
22. Hadoop YARN is used for Cluster Resource Management in Hadoop Ecosystem
- True
- False
Answer
True
23. _____ phase sorts the data & _____ creates logical clusters.
- Reduce, YARN
- MAP, YARN
- REDUCE, MAP
- MAP, REDUCE
Answer
MAP, REDUCE
24. There is only one operation between Mapping and Reducing
- True
- False
Answer
True
25. Which of the following is true about hypothesis testing?
- answering yes/no questions about the data
- estimating numerical characteristics of the data
- describing associations within the data
- modeling relationships within the data
Answer
answering yes/no questions about the data
26. The goal of business intelligence is to allow easy interpretation of large volumes of data to identify new opportunities
- True
- False
Answer
True
27. ____ is factors considered before Adopting Big Data Technology
- Validation
- Verification
- Data
- Design
Answer
Validation
28. for improving supply chain management to optimize stock management, replenishment, and forecasting
- Descriptive
- Diagnostic
- Predictive
- Prescriptive
Answer
Predictive
29. which among the following is not a Data mining and analytical applications?
- profile matching
- social network analysis
- facial recognition
- Filtering
Answer
Filtering
30. _____ as a result of data accessibility, data latency, data availability, or limits on bandwidth in relation to the size of inputs
- Computation-restricted throttling
- Large data volumes
- Data throttling
- Data Parallelization
Answer
Data throttling
31. As an example, an expectation of using a recommendation engine would be to increase same-customer sales by adding more items into the market basket
- Lowering costs
- Increasing revenues
- Increasing productivity
- Reducing risk
Answer
Increasing revenues
32. Which storage subsystem can support massive data volumes of increasing size.
- Extensibility
- Fault tolerance
- Scalability
- High-speed I/O capacity
Answer
Scalability
33. _____ provides performance through distribution of data and fault tolerance through replication
- HDFS
- PIG
- HIVE
- HADOOP
Answer
HDFS
34. ______ is a programming model for writing applications that can process Big Data in parallel on multiple nodes.
- HDFS
- MAP REDUCE
- HADOOP
- HIVE
Answer
MAP REDUCE
35. ____ takes the grouped key-value paired data as input and runs a Reducer function on each one of them.
- MAPPER
- REDUCER
- COMBINER
- PARTITIONER
Answer
REDUCER
36. ____ is a type of local Reducer that groups similar data from the map phase into identifiable sets.
- MAPPER
- REDUCER
- COMBINER
- PARTITIONER
Answer
COMBINER
37. While Installing Hadoop how many xml files are edited and list them ?
- core-site.xml
- hdfs-site.xml
- mapred.xml
- yarn.xml
Answer
core-site.xml
38. Movie Recommendation systems are an example of
- Classification
- Clustering
- Reinforcement Learning
- Regression
- 2 only
- 1 and 3
- 1 and 2
- 2 and 3
Answer
1 and 3
39. Sentiment Analysis is an example of
- Regression
- Classification
- clustering
- Reinforcement Learning
- 1, 2 and 4
- 1, 2 and 3
- 1 and 3
- 1 and 2
Answer
1, 2 and 4
- industry statistics
- economic statistics
- applied statistics
- applied statistics
Show Answer
applied statistics
2. Which of the following is true about regression analysis?
- answering yes/no questions about the data
- estimating numerical characteristics of the data
- modeling relationships within the data
- describing associations within the data
Show Answer
modeling relationships within the data
3. Text Analytics, also referred to as Text Mining?
- True
- False
- Can be true or False
- Can not say
Show Answer
TRUE
4. What is a hypothesis?
- A statement that the researcher wants to test through the data collected in a study.
- A research question the results will answer.
- A theory that underpins the study.
- A statistical method for calculating the extent to which the results could have happened by chance.
Show Answer
A statement that the researcher wants to test through the data collected in a study.
5. What is the cyclical process of collecting and analyzing data during a single research study called?
- Interim Analysis
- Inter analysis
- inter item analysis
- constant analysis
Show Answer
Interim Analysis
6. The process of quantifying data is referred to as ____
- Topology
- Digramming
- Enumeration
- coding
Show Answer
Enumeration
7. An advantage of using computer programs for qualitative data is that they _
- Can reduce time required to analyse data (i.e., after the data are transcribed)
- Help in storing and organising data
- Make many procedures available that are rarely done by hand due to time constraints
- All of the above
Show Answer
All of the Above
8. Boolean operators are words that are used to create logical combinations.
- True
- False
Show Answer
True
9. ______ are the basic building blocks of qualitative data.
- Categories
- Units
- Individuals
- None of the above
Show Answer
Categories
10. This is the process of transforming qualitative research data from written interviews or field notes into typed text.
- Segmenting
- Coding
- Transcription
- Mnemoning
Show Answer
Transcription
11. A challenge of qualitative data analysis is that it often includes data that are unwieldy and complex; it is a major challenge to make sense of the large pool of data.
- True
- False
Show Answer
True
12. Hypothesis testing and estimation are both types of descriptive statistics.
- True
- False
Show Answer
False
13. A set of data organised in a participants(rows)-by-variables(columns) format is known as a “data set.”
- True
- False
Show Answer
True
14. A graph that uses vertical bars to represent data is called a ___
- Line graph
- Bar graph
- Scatterplot
- Vertical graph
Show Answer
Bar graph
15. ____ are used when you want to visually examine the relationship between two quantitative variables.
- Bar graph
- pie graph
- line graph
- Scatterplot
Show Answer
Scatterplot
16. The denominator (bottom) of the z-score formula is
- The standard deviation
- The difference between a score and the mean
- The range
- The mean
Show Answer
The standard deviation
17. Which of these distributions is used for a testing hypothesis?
- Normal Distribution
- Chi-Squared Distribution
- Gamma Distribution
- Poisson Distribution
Show Answer
Chi-Squared Distribution
18. A statement made about a population for testing purpose is called?
- Statistic
- Hypothesis
- Level of Significance
- Test-Statistic
Show Answer
Hypothesis
19. If the assumed hypothesis is tested for rejection considering it to be true is called?
- Null Hypothesis
- Statistical Hypothesis
- Simple Hypothesis
- Composite Hypothesis
Show Answer
Null Hypothesis
20. If the null hypothesis is false then which of the following is accepted?
- Null Hypothesis
- Positive Hypothesis
- Negative Hypothesis
- Alternative Hypothesis.
Show Answer
Alternative Hypothesis.
21. Alternative Hypothesis is also called as?
- Composite hypothesis
- Research Hypothesis
- Simple Hypothesis
- Null Hypothesis
Show Answer
Research Hypothesis
- 0
- 1
- 2
- 3
Answer
1
2. For two runs of K-Mean clustering is it expected to get same clustering results?
- Yes
- No
Answer
No
3. Which of the following algorithm is most sensitive to outliers?
- K-means clustering algorithm
- K-medians clustering algorithm
- K-modes clustering algorithm
- K-medoids clustering algorithm
Answer
K-means clustering algorithm
4. The discrete variables and continuous variables are two types of
- Open end classification
- Time series classification
- Qualitative classification
- Quantitative classification
Answer
Quantitative classification
5. Bayesian classifiers is
- A class of learning algorithm that tries to find an optimum classification of a set of examples using the probabilistic theory.
- Any mechanism employed by a learning system to constrain the search space of a hypothesis
- An approach to the design of learning algorithms that is inspired by the fact that when people encounter new situations, they often explain them by reference to familiar experiences, adapting the explanations to fit the new situation.
- None of these
Answer
A class of learning algorithm that tries to find an optimum classification of a set of examples using the probabilistic theory.
6. Classification accuracy is
- A subdivision of a set of examples into a number of classes
- Measure of the accuracy, of the classification of a concept that is given by a certain theory
- The task of assigning a classification to a set of examples
- None of these
Answer
Measure of the accuracy, of the classification of a concept that is given by a certain theory
7. Euclidean distance measure is
- A stage of the KDD process in which new data is added to the existing selection.
- The process of finding a solution for a problem simply by enumerating all possible solutions according to some pre-defined order and then testing them
- The distance between two points as calculated using the Pythagoras theorem
- none of above
Answer
The distance between two points as calculated using the Pythagoras theorem
8. Hybrid is
- Combining different types of method or information
- Approach to the design of learning algorithms that is structured along the lines of the theory of evolution.
- Decision support systems that contain an information base filled with the knowledge of an expert formulated in terms of if-then rules.
- none of above
Answer
Combining different types of method or information
9. Decision trees use ______ , in that they always choose the option that seems the best available at that moment.
- Greedy Algorithms
- divide and conquer
- Backtracking
- Shortest path algorithm
Answer
Greedy Algorithms
10. Discovery is
- It is hidden within a database and can only be recovered if one is given certain clues (an example IS encrypted information).
- The process of executing implicit previously unknown and potentially useful information from data
- An extremely complex molecule that occurs in human chromosomes and that carries genetic information in the form of genes.
- None of these
Answer
The process of executing implicit previously unknown and potentially useful information from data
Data Analytics sppu mcq
11. Hidden knowledge referred to
- A set of databases from different vendors, possibly using different database paradigms
- An approach to a problem that is not guaranteed to work but performs well in most cases
- Information that is hidden in a database and that cannot be recovered by a simple SQL query.
- None of these
Answer
Information that is hidden in a database and that cannot be recovered by a simple SQL query.
12. Decision trees cannot handle categorical attributes with many distinct values, such as country codes for telephone numbers.
- True
- False
Answer
False
13. Enrichment is
- A stage of the KDD process in which new data is added to the existing selection
- The process of finding a solution for a problem simply by enumerating all possible solutions according to some pre-defined order and then testing them
- The distance between two points as calculated using the Pythagoras theorem.
- None of these
Answer
A stage of the KDD process in which new data is added to the existing selection
14. _____ are easy to implement and can execute efficiently even without prior knowledge of the data, they are among the most popular algorithms for classifying text documents.
- ID3
- Naïve Bayes classifiers
- CART
- None of above
Answer
Naïve Bayes classifiers
15. High entropy means that the partitions in classification are
- Pure
- Not Pure
- Usefull
- useless
Answer
Uses a single processor or computer
16. Which of the following statements about Naive Bayes is incorrect?
- Attributes are equally important.
- Attributes are statistically dependent of one another given the class value.
- Attributes are statistically independent of one another given the class value.
- Attributes can be nominal or numeric
Answer
Attributes are statistically dependent of one another given the class value.
17. The maximum value for entropy depends on the number of classes so if we have 8 Classes what will be the max entropy.
- Max Entropy is 1
- Max Entropy is 2
- Max Entropy is 3
- Max Entropy is 4
Answer
Max Entropy is 3
18. Point out the wrong statement.
- k-nearest neighbor is same as k-means
- k-means clustering is a method of vector quantization
- k-means clustering aims to partition n observations into k clusters
- none of the mentioned
Answer
k-nearest neighbor is same as k-means
19. Consider the following example “How we can divide set of articles such that those articles have the same theme (we do not know the theme of the articles ahead of time) ” is this:
- Clustering
- Classification
- Regression
- None of these
Answer
Clustering
data analytics mcqs with answers
20. Can we use K Mean Clustering to identify the objects in video?
- Yes
- No
Answer
Yes
21. Clustering techniques are ______ in the sense that the data scientist does not determine, in advance, the labels to apply to the clusters.
- Unsupervised
- supervised
- Reinforcement
- Neural network
Answer
Unsupervised
22. _____ metric is examined to determine a reasonably optimal value of k.
- Mean Square Error
- Within Sum of Squares (WSS)
- Speed
- None of these
Answer
Within Sum of Squares (WSS)
23. If an itemset is considered frequent, then any subset of the frequent itemset must also be frequent.
- Apriori Property
- Downward Closure Property
- Either 1 or 2
- Both 1 and 2
Answer
Both 1 and 2
24. if {bread,eggs,milk} has a support of 0.15 and {bread,eggs} also has a support of 0.15, the confidence of rule {bread,eggs}→{milk} is
- 0
- 1
- 2
- 3
Answer
1
25. Confidence is a measure of how X and Y are really related rather than coincidentally happening together.
- True
- False
Answer
False
26. ______ recommend items based on similarity measures between users and/or items.
- Content Based Systems
- Hybrid System
- Collaborative Filtering Systems
- None of these
Answer
Collaborative Filtering Systems
27. There are ______ major Classification of Collaborative Filtering Mechanisms
- 1
- 2
- 3
- none of above
Answer
2
28. Movie Recommendation to people is an example of
- User Based Recommendation
- Item Based Recommendation
- Knowledge Based Recommendation
- content based recommendation
Answer
Item Based Recommendation
29. _____ recommenders rely on an explicitely defined set of recommendation rules
- Constraint Based
- Case Based
- Content Based
- User Based
Answer
Case Based
30. Parallelized hybrid recommender systems operate dependently of one another and produce separate recommendation lists.
- True
- False
Answer
False
- industry statistics
- economic statistics
- applied statistics
- applied statistics
Answer
applied statistics
2. Which of the following is true about regression analysis?
- answering yes/no questions about the data
- estimating numerical characteristics of the data
- modeling relationships within the data
- describing associations within the data
Answer
modeling relationships within the data
3. Text Analytics, also referred to as Text Mining?
- True
- False
- Can be true or False
- Can not say
Answer
TRUE
4. What is a hypothesis?
- A statement that the researcher wants to test through the data collected in a study.
- A research question the results will answer.
- A theory that underpins the study.
- A statistical method for calculating the extent to which the results could have happened by chance.
Answer
A statement that the researcher wants to test through the data collected in a study.
5. What is the cyclical process of collecting and analysing data during a single research study called?
- Interim Analysis
- Inter analysis
- inter item analysis
- constant analysis
Answer
Interim Analysis
6. The process of quantifying data is referred to as ____
- Topology
- Digramming
- Enumeration
- coding
Answer
Enumeration
7. An advantage of using computer programs for qualitative data is that they _
- Can reduce time required to analyse data (i.e., after the data are transcribed)
- Help in storing and organising data
- Make many procedures available that are rarely done by hand due to time constraints
- All of the above
Answer
All of the Above
8. Boolean operators are words that are used to create logical combinations.
- True
- False
Answer
True
9. ______ are the basic building blocks of qualitative data.
- Categories
- Units
- Individuals
- None of the above
Answer
Categories
10. This is the process of transforming qualitative research data from written interviews or field notes into typed text.
- Segmenting
- Coding
- Transcription
- Mnemoning
Answer
Transcription
11. A challenge of qualitative data analysis is that it often includes data that are unwieldy and complex; it is a major challenge to make sense of the large pool of data.
- True
- False
Answer
True
12. Hypothesis testing and estimation are both types of descriptive statistics.
- True
- False
Answer
False
13. A set of data organised in a participants(rows)-by-variables(columns) format is known as a “data set.”
- True
- False
Answer
True
14. A graph that uses vertical bars to represent data is called a ___
- Line graph
- Bar graph
- Scatterplot
- Vertical graph
Answer
Bar graph
15. ____ are used when you want to visually examine the relationship between two quantitative variables.
- Bar graph
- pie graph
- line graph
- Scatterplot
Answer
Scatterplot
16. The denominator (bottom) of the z-score formula is
- The standard deviation
- The difference between a score and the mean
- The range
- The mean
Answer
The standard deviation
17. Which of these distributions is used for a testing hypothesis?
- Normal Distribution
- Chi-Squared Distribution
- Gamma Distribution
- Poisson Distribution
Answer
Chi-Squared Distribution
18. A statement made about a population for testing purpose is called?
- Statistic
- Hypothesis
- Level of Significance
- Test-Statistic
Answer
Hypothesis
19. If the assumed hypothesis is tested for rejection considering it to be true is called?
- Null Hypothesis
- Statistical Hypothesis
- Simple Hypothesis
- Composite Hypothesis
Answer
Null Hypothesis
20. If the null hypothesis is false then which of the following is accepted?
- Null Hypothesis
- Positive Hypothesis
- Negative Hypothesis
- Alternative Hypothesis.
Answer
Alternative Hypothesis.
21. Alternative Hypothesis is also called as?
- Composite hypothesis
- Research Hypothesis
- Simple Hypothesis
- Null Hypothesis
Answer
Research Hypothesis
- Address
- Contents
- Both a and b
- none
Show Answer
Both a and b
2. A collection of lines that connects several devices is called
- Bus
- Peripheral connection wires
- Both a and b
- internal wires
Show Answer
Bus
3. Conventional architectures coarsely comprise of a
- Processor
- Memory System
- Data path
- All of the above
Show Answer
All of the above
4. VLIW processors rely on
- Compile time analysis
- Initial time analysis
- Final time analysis
- id time analysis
Show Answer
Compile time analysis
5. HPC is not used in high span bridges
- True
- False
Show Answer
False
6. The access time of memory is …………… the time required for performing any single CPU operation.
- longer than
- shorter than
- negligible than
- same as
Show Answer
longer than
7. Data intensive applications utilize_
- High aggregate throughput
- High aggregate network bandwidth
- high processing and memory system performance
- none of above
Show Answer
High aggregate throughput
8. Memory system performance is largely captured by_
- Latency
- bandwidth
- both a and b
- none of above
Show Answer
both a and b
9. A processor performing fetch or decoding of different instruction during the execution of another instruction is called __ .
- Super-scaling
- Pipe-lining
- Parallel Computation
- none of above
Show Answer
Pipe-lining
10. For a given FINITE number of instructions to be executed, which architecture of the processor provides for a faster execution ?
- ISA
- ANSA
- Super-scalar
- All of the above
Show Answer
Super-scalar
11. HPC works out to be economical.
- True
- false
Show Answer
True
12. High Performance Computing of the Computer System tasks are done by
- Node Cluster
- Network Cluster
- Beowulf Cluster
- Stratified Cluster
Show Answer
Beowulf Cluster
13. Octa Core Processors are the processors of the computer system that contains
- 2 Processors
- 4 Processors
- 6 Processors
- 8 Processors
Show Answer
8 Processors
14. Parallel computing uses _ execution
- sequential
- unique
- simultaneous
- None of above
Show Answer
simultaneous
15. Which of the following is NOT a characteristic of parallel computing?
- Breaks a task into pieces
- Uses a single processor or computer
- Simultaneous execution
- May use networking
Show Answer
Uses a single processor or computer
16. Which of the following is true about parallel computing performance?
- Computations use multiple processors
- There is an increase in speed
- The increase in speed is loosely tied to the number of processor or computers used
- All of the answers are correct.
Show Answer
All of the answers are correct.
17. __ leads to concurrency.
- Serialization
- Parallelism
- Serial processing
- Distribution
Show Answer
Parallelism
18. MIPS stands for?
- Mandatory Instructions/sec
- Millions of Instructions/sec
- Most of Instructions/sec
- Many Instructions / sec
Show Answer
Millions of Instructions/sec
19. Which MIMD systems are best scalable with respect to the number of processors
- Distributed memory computers
- consume systems
- Symmetric multiprocessors
- None of above
Show Answer
Distributed memory computers
20. To which class of systems does the von Neumann computer belong?
- SIMD (Single Instruction Multiple Data)
- MIMD (Multiple Instruction Multiple Data)
- MISD (Multiple Instruction Single Data)
- SISD (Single Instruction Single Data)
Show Answer
SISD (Single Instruction Single Data)
21. Which of the architecture is power efficient?
- CISC
- RISC
- ISA
- IANA
Show Answer
RISC
22. Pipe-lining is a unique feature of _.
- RISC
- CISC
- ISA
- IANA
Show Answer
RISC
23. The computer architecture aimed at reducing the time of execution of instructions is __.
- RISC
- CISC
- ISA
- IANA
Show Answer
RISC
24. Type of microcomputer memory is
- processor memory
- primary memory
- secondary memory
- All of above
Show Answer
All of above
25. A pipeline is like_
- Overlaps various stages of instruction execution to achieve performance.
- House pipeline
- Both a and b
- A gas line
Show Answer
Overlaps various stages of instruction execution to achieve performance.
26. Scheduling of instructions is determined_
- True Data Dependency
- Resource Dependency
- Branch Dependency
- All of above
Show Answer
All of above
27. The fraction of data references satisfied by the cache is called_
- Cache hit ratio
- Cache fit ratio
- Cache best ratio
- none of above
Show Answer
Cache hit ratio
28. A single control unit that dispatches the same Instruction to various processors is__
- SIMD
- SPMD
- MIMD
- none of above
Show Answer
SIMD
29. The primary forms of data exchange between parallel tasks are_
- Accessing a shared data space
- Exchanging messages.
- Both A and B
- none of above
Show Answer
Both A and B
30. Switches map a fixed number of inputs to outputs.
- True
- False
Show Answer
True
The First step in developing a parallel algorithm is_
- To Decompose the problem into tasks that can be executed concurrently
- Execute directly
- Execute indirectly
- None of Above
Answer
To Decompose the problem into tasks that can be executed concurrently
2. The number of tasks into which a problem is decomposed determines its_
- Granularity
- Priority
- Modernity
- None of Above
Answer
Granularity
3. The length of the longest path in a task dependency graph is called_
- the critical path length
- the critical data length
- the critical bit length
- None of Above
Answer
he critical path length
4. The graph of tasks (nodes) and their interactions/data exchange (edges)_
- Is referred to as a task interaction graph
- Is referred to as a task Communication graph
- Is referred to as a task interface graph
- None of Above
Answer
Is referred to as a task interaction graph
5. Mappings are determined by_
- task dependency
- task interaction graphs
- Both A and B
- None of Above
Answer
Both A and B
6. Decomposition Techniques are_
- recursive decomposition
- data decomposition
- exploratory decomposition
- speculative decomposition
- All of above
Answer
All of above
7. The Owner Computes rule generally states that the process assigned a particular data item is responsible for _
- All computation associated with it
- Only one computation
- Only two computation
- Only occasionally computation
Answer
All computation associated with it
8. A simple application of exploratory decomposition is_
- The solution to a 15 puzzle
- The solution to 20 puzzle
- The solution to any puzzle
- None of Above
Answer
The solution to a 15 puzzle
9. Speculative Decomposition consist of _
- conservative approaches
- optimistic approaches
- Both A and B
- only B
Answer
Both A and B
hpc mcq questions
10. task characteristics include:
- Task generation.
- Task sizes.
- Size of data associated with tasks.
- All of above
Answer
All of above
11. What is a high performance multi-core processor that can be used to accelerate a wide variety of applications using parallel computing.
- CLU
- GPU
- CPU
- DSP
Answer
GPU
12. What is GPU?
- Grouped Processing Unit
- Graphics Processing Unit
- Graphical Performance Utility
- Graphical Portable Unit
Answer
Graphics Processing Unit
13. A code, known as GRID, which runs on GPU consisting of a set of
- 32 Thread
- 32 Block
- Unit Block
- Thread Block
Answer
Thread Block
14. Interprocessor communication that takes place
- Centralized memory
- Shared memory
- Message passing
- Both A and B
Answer
Both A and B
15. Decomposition into a large number of tasks results in coarse-grained decomposition
- True
- False
Answer
False
16. Relevant task characteristics include
- Task generation.
- Task sizes
- Size of data associated with tasks
- Overhead
- both A and B
Answer
both A and B
17. The fetch and execution cycles are interleaved with the help of __
- Modification in processor architecture
- Clock
- Special unit
- Control unit
Answer
Clock
18. The processor of system which can read /write GPU memory is known as
- kernal
- device
- Server
- Host
Answer
Host
19. Increasing the granularity of decomposition and utilizing the resulting concurrency to perform more tasks in parallel decreses performance.
- TRUE
- FALSE
Answer
FALSE
Parallel computing mcq with answers
20. If there is dependency between tasks it implies their is no need of interaction between them.
- TRUE
- FALSE
Answer
FALSE
21. Parallel quick sort is example of task parallel model
- TRUE
- FALSE
Answer
TRUE
22. True Data Dependency is
- The result of one operation is an input to the next.
- Two operations require the same resource.
Answer
The result of one operation is an input to the next.
23. What is Granularity ?
- The size of database
- The size of data item
- The size of record
- The size of file
Answer
The size of data item
24. In coarse-grained parallelism, a program is split into …………………… task and ……………………… Size
- Large tasks , Smaller Size
- Small Tasks , Larger Size
- Small Tasks , Smaller Size
- Equal task, Equal Size
Answer
Large tasks , Smaller Size
- Gather-scatter operations
- Gather operations
- Scatter operations
- Gather-scatter technique
Answer
Gather-scatter operations
2. In the gather operation, a single node collects a ———
- Unique message from each node
- Unique message from only one node
- Different message from each node
- None of Above
Answer
Unique message from each node
3. In the scatter operation, a single node sends a ————
- Unique message of size m to every other node
- Different message of size m to every other node
- Different message of different size m to every other node
- All of Above
Answer
Unique message of size m to every other node
4. Is All to all Bradcasting is same as All to all personalized communication?
- Yes
- No
Answer
No
5. Is scatter operation is same as Broadcast?
- Yes
- No
Answer
No
6. All-to-all personalized communication is also known as
- Total Exchange
- Personal Message
- Scatter
- Gather
Answer
Total Exchange
7. By which way, scatter operation is different than broadcast
- Message size
- Number of nodes
- Same
- None of above
Answer
Message size
8. The gather operation is exactly the _ of the scatter operation
- Inverse
- Reverse
- Multiple
- Same
Answer
Inverse
9. The gather operation is exactly the inverse of the_
- Scatter operation
- Broadcast operation
- Prefix Sum
- Reduction operation
Answer
Scatter operation
10. The dual of one-to-all broadcast is all-to-one reduction. True or False?
- TRUE
- FALSE
Answer
TRUE
11. A binary tree in which processors are (logically) at the leaves and internal nodes are routing nodes.
- TRUE
- FALSE
Answer
TRUE
12. Group communication operations are built using point-to-point messaging primitives
- TRUE
- FALSE
Answer
TRUE
13. Communicating a message of size m over an uncongested network takes time ts + tmw
- True
- False
Answer
True
14. Parallel programs: Which speedup could be achieved according to Amdahl´s law for infinite number of processors if 5% of a program is sequential and the remaining part is ideally parallel?
- Infinite speedup
- 5
- 20
- None of above
Answer
20
15. Shift register that performs a circular shift is called
- Invalid Counter
- Valid Counter
- Ring
- Undefined
Answer
Ring
16. 8 bit information can be stored in
- 2 Registers
- 4 Registers
- 6 Registers
- 8 Registers
Answer
8 Registers
17. The result of prefix expression * / b + – d a c d, where a = 3, b = 6, c = 1, d = 5 is
- 0
- 5
- 10
- 8
Answer
10
18. The height of a binary tree is the maximum number of edges in any root to leaf path. The maximum number of nodes in a binary tree of height h is?
- 2h – 1
- 2h – 1 – 1
- 2h + 1 – 1
- 2 * (h+1)
Answer
2h + 1 – 1
19. A hypercube has_
- 2^d nodes
- 2d nodes
- 2n Nodes
- N Nodes
Answer
2^d nodes
Parallel computing mcq with answers
20. The Prefix Sum Operation can be implemented using the_
- All-to-all broadcast kernel
- All-to-one broadcast kernel
- One-to-all broadcast Kernel
- Scatter Kernel
Answer
All-to-all broadcast kernel
21.In the scatter operation_
- Single node send a unique message of size m to every other node
- Single node send a same message of size m to every other node
- Single node send a unique message of size m to next node
- None of Above
Answer
Single node send a unique message of size m to every other node
22. In All-to-All Personalized Communication Each node has a distinct message of size m for every other node
- True
- False
Answer
True
23. A binary tree in which processors are (logically) at the leaves and internal nodes are
routing nodes.
- True
- False
Answer
True
24. In All-to-All Broadcast each processor is the source as well as destination.
- True
- False
Answer
True
1. The First step in developing a parallel algorithm is_
- To Decompose the problem into tasks that can be executed concurrently
- Execute directly
- Execute indirectly
- None of Above
Answer
To Decompose the problem into tasks that can be executed concurrently
2. The number of tasks into which a problem is decomposed determines its_
- Granularity
- Priority
- Modernity
- None of Above
Answer
Granularity
3. The length of the longest path in a task dependency graph is called_
- the critical path length
- the critical data length
- the critical bit length
- None of Above
Answer
he critical path length
4. The graph of tasks (nodes) and their interactions/data exchange (edges)_
- Is referred to as a task interaction graph
- Is referred to as a task Communication graph
- Is referred to as a task interface graph
- None of Above
Answer
Is referred to as a task interaction graph
5. Mappings are determined by_
- task dependency
- task interaction graphs
- Both A and B
- None of Above
Answer
Both A and B
6. Decomposition Techniques are_
- recursive decomposition
- data decomposition
- exploratory decomposition
- speculative decomposition
- All of above
Answer
All of above
7. The Owner Computes rule generally states that the process assigned a particular data item is responsible for _
- All computation associated with it
- Only one computation
- Only two computation
- Only occasionally computation
Answer
All computation associated with it
8. A simple application of exploratory decomposition is_
- The solution to a 15 puzzle
- The solution to 20 puzzle
- The solution to any puzzle
- None of Above
Answer
The solution to a 15 puzzle
9. Speculative Decomposition consist of _
- conservative approaches
- optimistic approaches
- Both A and B
- only B
Answer
Both A and B
hpc mcq questions
10. task characteristics include:
- Task generation.
- Task sizes.
- Size of data associated with tasks.
- All of above
Answer
All of above
11. What is a high performance multi-core processor that can be used to accelerate a wide variety of applications using parallel computing.
- CLU
- GPU
- CPU
- DSP
Answer
GPU
12. What is GPU?
- Grouped Processing Unit
- Graphics Processing Unit
- Graphical Performance Utility
- Graphical Portable Unit
Answer
13. A code, known as GRID, which runs on GPU consisting of a set of
- 32 Thread
- 32 Block
- Unit Block
- Thread Block
Answer
Thread Block
14. Interprocessor communication that takes place
- Centralized memory
- Shared memory
- Message passing
- Both A and B
Answer
Both A and B
15. Decomposition into a large number of tasks results in coarse-grained decomposition
- True
- False
Answer
False
16. Relevant task characteristics include
- Task generation.
- Task sizes
- Size of data associated with tasks
- Overhead
- both A and B
Answer
both A and B
17. The fetch and execution cycles are interleaved with the help of __
- Modification in processor architecture
- Clock
- Special unit
- Control unit
Answer
Clock
18. The processor of system which can read /write GPU memory is known as
- kernal
- device
- Server
- Host
Answer
Host
19. Increasing the granularity of decomposition and utilizing the resulting concurrency to perform more tasks in parallel decreses performance.
- TRUE
- FALSE
Answer
FALSE
Parallel computing mcq with answers
20. If there is dependency between tasks it implies their is no need of interaction between them.
- TRUE
- FALSE
Answer
FALSE
21. Parallel quick sort is example of task parallel model
- TRUE
- FALSE
Answer
TRUE
22. True Data Dependency is
- The result of one operation is an input to the next.
- Two operations require the same resource.
Answer
The result of one operation is an input to the next.
23. What is Granularity ?
- The size of database
- The size of data item
- The size of record
- The size of file
Answer
The size of data item
24. In coarse-grained parallelism, a program is split into …………………… task and ……………………… Size
- Large tasks , Smaller Size
- Small Tasks , Larger Size
- Small Tasks , Smaller Size
- Equal task, Equal Size
Answer
Large tasks , Smaller Size
1. The primary and essential mechanism to support the sparse matrices is
- Gather-scatter operations
- Gather operations
- Scatter operations
- Gather-scatter technique
Answer
Gather-scatter operations
2. In the gather operation, a single node collects a ———
- Unique message from each node
- Unique message from only one node
- Different message from each node
- None of Above
Answer
Unique message from each node
3. In the scatter operation, a single node sends a ————
- Unique message of size m to every other node
- Different message of size m to every other node
- Different message of different size m to every other node
- All of Above
Answer
Unique message of size m to every other node
4. Is All to all Bradcasting is same as All to all personalized communication?
- Yes
- No
Answer
No
5. Is scatter operation is same as Broadcast?
- Yes
- No
Answer
No
6. All-to-all personalized communication is also known as
- Total Exchange
- Personal Message
- Scatter
- Gather
Answer
Total Exchange
7. By which way, scatter operation is different than broadcast
- Message size
- Number of nodes
- Same
- None of above
Answer
Message size
8. The gather operation is exactly the _ of the scatter operation
- Inverse
- Reverse
- Multiple
- Same
Answer
Inverse
9. The gather operation is exactly the inverse of the_
- Scatter operation
- Broadcast operation
- Prefix Sum
- Reduction operation
Answer
Scatter operation
10. The dual of one-to-all broadcast is all-to-one reduction. True or False?
- TRUE
- FALSE
Answer
TRUE
11. A binary tree in which processors are (logically) at the leaves and internal nodes are routing nodes.
- TRUE
- FALSE
Answer
TRUE
12. Group communication operations are built using point-to-point messaging primitives
- TRUE
- FALSE
Answer
TRUE
13. Communicating a message of size m over an uncongested network takes time ts + tmw
- True
- False
Answer
True
14. Parallel programs: Which speedup could be achieved according to Amdahl´s law for infinite number of processors if 5% of a program is sequential and the remaining part is ideally parallel?
- Infinite speedup
- 5
- 20
- None of above
Answer
20
15. Shift register that performs a circular shift is called
- Invalid Counter
- Valid Counter
- Ring
- Undefined
Answer
Ring
16. 8 bit information can be stored in
- 2 Registers
- 4 Registers
- 6 Registers
- 8 Registers
Answer
8 Registers
17. The result of prefix expression * / b + – d a c d, where a = 3, b = 6, c = 1, d = 5 is
- 0
- 5
- 10
- 8
Answer
10
18. The height of a binary tree is the maximum number of edges in any root to leaf path. The maximum number of nodes in a binary tree of height h is?
- 2h – 1
- 2h – 1 – 1
- 2h + 1 – 1
- 2 * (h+1)
Answer
2h + 1 – 1
19. A hypercube has_
- 2^d nodes
- 2d nodes
- 2n Nodes
- N Nodes
Answer
2^d nodes
Parallel computing mcq with answers
20. The Prefix Sum Operation can be implemented using the_
- All-to-all broadcast kernel
- All-to-one broadcast kernel
- One-to-all broadcast Kernel
- Scatter Kernel
Answer
All-to-all broadcast kernel
21.In the scatter operation_
- Single node send a unique message of size m to every other node
- Single node send a same message of size m to every other node
- Single node send a unique message of size m to next node
- None of Above
Answer
Single node send a unique message of size m to every other node
22. In All-to-All Personalized Communication Each node has a distinct message of size m for every other node
- True
- False
Answer
True
23. A binary tree in which processors are (logically) at the leaves and internal nodes are
routing nodes.
- True
- False
Answer
True
24. In All-to-All Broadcast each processor is thesource as well as destination.
- True
- False
Answer
True
Comments
Post a Comment