_____ are manipulated to harness the power of quantum computing.
Bits
Neural networks
Atoms
Cryptographic devices - correct answer Atoms
This is indeed at the atomic level, where atoms (or ions, or electrons) are manipulated
to gain a powerful boost in algorithmic processing.
_____ is a single instruction that operates on many or multiple data segments.
SISD
MIMD
SIMD
MISD - correct answerSIMD
In SIMD, a single instruction operates on many or multiple data segments. Examples of
SIMD are array processors and vector processors.
https://study.com/academy/lesson/superscalar-vliw-architectures-characteristics-
limitations-functions.html#[1:22]
A computer architecture - correct answerA computer architecture is a description of the
building blocks of a computer: the memory, storage, and processing capability, and how
they are related. Associative memory is a component of a computer's architecture,
much like any other add-on device. Common items, such as a mouse, a webcam, and a
printer, immediately come to mind. You simply plug them into the system and you're
ready to go. Associative memory is similar, although it would be a circuit board, like a
network card or video card, that sits under the hood.
A flip-flop is a latch enabled by _____.
a triangle wave signal
one or both edges of the square signal
one of the edges of the square signal
both edges of the square signal - correct answerone or both edges of the square signal
A flip-flop might be enabled by one or both edges of the square signal.
A flip-flop is a latch enabled by _____.
one or both edges of the square signal
one of the edges of the square signal
,both edges of the square signal
a triangle wave signal - correct answerone or both edges of the square signal
A(n) is a geometric representation of the states of qubits.
Super-positioning
Hadamard gate
Bloch Sphere
Any of the gates: X, T, T, U - correct answerBloch Sphere
Because we are at the sub-atomic level, we can visualize the qubits as electrons
zipping around an atom; the Bloch Sphere represents this and shows the states of the
qubits along the sphere.
qubits bitbit bloch
https://study.com/academy/lesson/gates-types-in-quantum-computing-hadamard-
controlled-cnot.html
Add the binary numbers 1 + 1 + 1.
100
10
3
11 - correct answer11
You remember your rules for binary addition: 0 + 0 = 0, 1 + 0 = 1, 0 + 1 = 1 and 1 + 1 =
10.
1 + 1 = 10
Then 10 + 1 = 11.
Add the binary numbers 1 + 1.
1
11
10
2 - correct answer10
According to the rules for binary addition, 1 + 1 = 10.
Associative memory - correct answerAssociative memory is also a set of storage
locations, but they work a little differently. Instead of looking up a storage location by its
address, it looks up a storage location by its contents. So if you wanted to send that
same package or letter to your neighbor, you would send it to the house where your
neighbor is actually located, and it would get stored there.
,asymmetric encryption system - correct answerasymmetric system, the key used for
encryption (public key) is different than that which is used for decryption (private key)
At which of these institutions did George Boole hold a key teaching position?
Cambridge
Bainbridge's Commercial Academy
Queens College, Ireland
Hall's Academy in Waddington - correct answerQueens College, Ireland
George Boole held a key teaching position at Queens College, Ireland. He did teach at
Hall's Academy but that was early on. He went to school at Bainbridge, and he didn't
teach at Cambridge.
Benchmark should be - correct answerA benchmark should be relevant. This means
that its interpretation should be appropriate to the system on which it is tested.
A benchmark should be understandable. The results of the analysis should be easily
understandable by the relevant parties
A benchmark should be acceptable. Both users and vendors must be satisfied that the
results of the analysis are unbiased.
Benchmarks - correct answerBenchmarks may be in the form of computer programs or
some sort of operational process. This could be software that simulates a workload or
real-world workload tests.
Benchmarks are used to analyze the outputs of the various parameters in order to
determine whether the system is performing at its expected optimal levels as well as to
determine which improvements need to be made.
Benchmarks, therefore, act as a reference point with standard values against which the
system's parameter performance is measured
Both the microprogramming and hardwired approaches pass _____ to the AC
(Accumulator).
Control signals
Signed bits
Microinstructions
Control flags - correct answerControl signals
Regardless of approach, we are sending control signals from the ALU (Arithmetic Logic
Unit) to the AC (Accumulator).
, Bus Speed - correct answerhow fast data & info move between the CPU and the main
memory
keeps the computer operations running smoothly and quickly
bus timing diagram - correct answerA bus timing diagram is an architectural design tool
that shows the states of bytes as they are transferred through the system bus and
memory. The concept is similar to the raising and lowering of flags on a ship: when a
flag is raised, a given activity can occur; when lowered, another activity starts or stops.
Because it takes time to raise or lower the flag, the diagram displays a slow rise and a
slow fall. Over time, these small lag times do add delays in write and read operations.
bus width - correct answerdetermines the number of bits that the computer can transmit
at one time
cache - correct answerCache is memory on a node (computer) that is used to store
frequently accessed or recently used data
Cache - correct answerThe cache is indicated by MB (megabytes), and the larger the
cache, the more efficient the processor will be. The cache is the temporary storage unit
of the processor where the processor keeps its temporary working files
Cache Replacement policies and their importance - correct answerCache Replacement
policies and their importance.
Replacement policies determine which data is to be written back into the higher level
memory when space is required in the lower level memory.
This replaced data should be carefully chosen in order to increase the hit ratio. We
looked at three examples of replacement policies: LRU that writes back the blocks that
were not used for the longest time, FIFO that writes back the oldest block, regardless of
its use and finally Random that writes back a block chosen randomly.
https://study.com/academy/lesson/cache-replacing-policies-pros-cons.html
cache types
write through - writes to both disk and cache
(performance decrease but safe)
write back - writes to cache only
(good performance but possible data loss) good for low latency and high throughput -
correct answerwrite through - writes to both disk and cache
(performance decrease but safe)
write back - writes to cache only
(good performance but possible data loss) good for low latency and high throughput