IT concepts? Flashcards
(50 cards)
What fundamental physical limitation is causing the failure of Moore’s Law?
Quantum tunneling and power dissipation
What phenomenon in quantum mechanics causes electrons to pass through barriers, impacting transistor miniaturization?
Electron tunneling
What type of transistor technology was introduced to mitigate leakage current in modern CPUs?
FinFET (Fin Field-Effect Transistor)
What is Dennard Scaling, and why has it broken down in modern semiconductor design?
Dennard Scaling stopped due to leakage current and heat dissipation
What concept in thermodynamics limits the energy efficiency of computation, defining the minimum possible energy required to erase one bit of information?
Landauer’s Principle
What is the name of the law stating that the number of transistors in an integrated circuit doubles approximately every two years?
Moore’s Law
In cryptography, what mathematical paradox explains the high probability of hash collisions in a relatively small set of inputs?
Birthday Paradox
What is the primary mathematical principle used in error detection and correction codes such as Hamming codes?
Linear Algebra and Hamming Distance
What statistical method is widely used in machine learning to find the best fit line for a dataset?
Linear Regression
What is the mathematical concept behind PageRank, Google’s algorithm for ranking search results?
Eigenvector Centrality (Graph Theory)
What mathematical transformation is used in JPEG compression to reduce image size without significant loss of quality?
Discrete Cosine Transform (DCT)
In quantum computing, what is the name of the algorithm that efficiently factors large numbers and threatens modern encryption?
Shor’s Algorithm
What type of cryptography relies on the difficulty of solving the discrete logarithm problem?
Elliptic Curve Cryptography (ECC)
What probability theorem is used in Bayesian networks and machine learning to update beliefs based on evidence?
Bayes’ Theorem
What concept in information theory quantifies the amount of information in a message and is measured in bits?
Shannon Entropy
What is the primary mathematical technique used in neural networks for backpropagation?
Gradient Descent
What type of algebra is used in logic gates and digital circuit design?
Boolean Algebra
In homomorphic encryption, what mathematical structure allows computations on encrypted data without decryption?
Lattice-based cryptography
What theorem in computer science states that some problems cannot be solved by any algorithm, such as the Halting Problem?
Rice’s Theorem and the Halting Problem
What computational model uses a tape and a set of rules to simulate any algorithm and is a fundamental concept in computer science?
Turing Machine
What is the principle behind differential privacy that adds noise to data to protect individual identities while preserving statistical patterns?
Laplace Mechanism in Differential Privacy
What machine learning algorithm is based on probability distributions and is commonly used for spam filtering?
Naïve Bayes Classifier
What branch of mathematics is used in blockchain technology to ensure the immutability of records?
Cryptographic Hash Functions and Merkle Trees
In quantum computing, what fundamental principle allows a quantum bit (qubit) to exist in multiple states simultaneously?
Superposition