Parallel Computing Concepts
11 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the term for a wireless access point installed on a secure network without explicit authorization?

  • Two-Factor Authentication
  • Distributed Denial of Service
  • Roque Access Point (correct)
  • Phishing Site
  • What is an example of Crowdsourcing in science?

  • Creative Commons
  • Citizen Science (correct)
  • Metadata
  • Computing Innovation
  • What is the purpose of a Public Key in cryptography?

  • To decrypt data
  • To create a digital signature
  • To encrypt data (correct)
  • To authenticate users
  • What is the term for the process of removing the fractional part of a number?

    <p>Truncating</p> Signup and view all the answers

    What is the term for systematic errors or distortions introduced into algorithms or systems due to human or systemic biases?

    <p>Computing Bias</p> Signup and view all the answers

    What is the term for making decisions in a program based on specific conditions?

    <p>Selection</p> Signup and view all the answers

    What is the term for the ratio of the time taken to execute a task sequentially to the time taken to execute the same task in parallel?

    <p>Speedup</p> Signup and view all the answers

    What type of error occurs when a calculation exceeds the maximum value that can be stored within a given data type?

    <p>Overflow Error</p> Signup and view all the answers

    What is the term for malicious software designed to disrupt, damage, or gain unauthorized access to a computer system?

    <p>Malware</p> Signup and view all the answers

    What is the term for an error in the syntax of a programming language that prevents the program from being compiled or interpreted?

    <p>Syntax Error</p> Signup and view all the answers

    What is the term for the action of recording (logging) the keys struck on a keyboard, typically in a covert manner?

    <p>Keylogging</p> Signup and view all the answers

    More Like This

    Parallel Programming Models
    28 questions
    Pthreads for Parallel Applications
    19 questions
    Pthreads in High Performance Computing
    89 questions
    Use Quizgecko on...
    Browser
    Browser