AM Software Test 6 Leave a Comment / By fawadtwopointo@gmail.com / August 22, 2025 Welcome to your AM Software Test 6 Amdahl’s Law is used to: Measure compiler performance Predict maximum parallel speedup Estimate cache misses Optimize network routing None Which parallel programming model uses shared variables? CUDA OpenMP MapReduce MPI None The “Byzantine Generals Problem” is fundamental in: AI planning Fault-tolerant distributed systems Compiler optimization Cloud storage None Google’s Spanner DB achieves global consistency using: TrueTime API Lamport clocks Two-phase commit Paxos only None In blockchain, which consensus algorithm is energy-efficient compared to Proof of Work? Byzantine Fault Tolerance PoS (Proof of Stake) PBFT PoW None Which cloud model provides hardware resources only? IaaS FaaS SaaS PaaS None Kubernetes is mainly used for: Container orchestration Code compilation Network simulation Database queries None Edge computing reduces latency by: Storing data in the cloud Centralizing data Using faster compilers Processing data closer to the source None In serverless computing, billing is based on: Fixed monthly cost Number of servers Function execution time Storage size only None Which cloud storage system is eventually consistent? Google BigQuery Amazon S3 Oracle DB MySQL None Which algorithm is used in deep reinforcement learning? Naïve Bayes KNN Apriori Q-learning None Transformer-based models (like GPT) use: Self-attention LSTMs Genetic algorithms RNNs None In Support Vector Machines (SVM), the kernel trick allows: Faster hardware execution Reducing bias Normalization of input Mapping data into higher dimensions None Which type of learning involves “reward signals”? Unsupervised Transfer Supervised Reinforcement None GANs (Generative Adversarial Networks) consist of: Encoder + Decoder Classifier + Regressor Predictor + Estimator Generator + Discriminator None Which algorithm solves maximum flow problem? Kruskal Ford-Fulkerson Prim Dijkstra None NP-complete problems are: Easy to solve in polynomial time Solvable in constant time Hard to verify Verifiable in polynomial time None P vs NP problem asks whether: Memory = CPU All NP problems are solvable in polynomial time Algorithms terminate or not Parallel = sequential computation None Quantum algorithms like Shor’s algorithm are useful for: Sorting arrays Cache optimization Breaking RSA Data compression None Which hashing technique guarantees O(1) lookup in theory? Linear probing Perfect hashing Double hashing Chaining None Zero Trust Architecture is based on: Single sign-on Trusting internal users VPN-only security Verifying everything, always None Quantum key distribution (QKD) ensures security using: Symmetric algorithms Quantum mechanics Blockchain Factorization None The Tor network ensures anonymity using: Symmetric keys End-to-end encryption only Onion routing Hash functions None Which cybersecurity attack involves sending data faster than receiver can handle? MITM XSS DoS (Denial of Service) SQL Injection None Homomorphic encryption allows: Computation on encrypted data Keyless cryptography Decryption without keys Data sharing without security None The Turing Award is given for contributions in: Engineering Computer Science Mathematics Physics None Which organization created TCP/IP? IBM Google CERN DARPA None Who is considered the “father of AI”? Marvin Minsky John McCarthy Alan Turing Claude Shannon None Synonym of “Ephemeral”? Strong Rare Temporary Permanent None Antonym of “Prudent”? Careful Thoughtful Wise Reckless None Time's upTime is Up!