IT concepts? Flashcards

(50 cards)

1
Q

What fundamental physical limitation is causing the failure of Moore’s Law?

A

Quantum tunneling and power dissipation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What phenomenon in quantum mechanics causes electrons to pass through barriers, impacting transistor miniaturization?

A

Electron tunneling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of transistor technology was introduced to mitigate leakage current in modern CPUs?

A

FinFET (Fin Field-Effect Transistor)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Dennard Scaling, and why has it broken down in modern semiconductor design?

A

Dennard Scaling stopped due to leakage current and heat dissipation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What concept in thermodynamics limits the energy efficiency of computation, defining the minimum possible energy required to erase one bit of information?

A

Landauer’s Principle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the name of the law stating that the number of transistors in an integrated circuit doubles approximately every two years?

A

Moore’s Law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In cryptography, what mathematical paradox explains the high probability of hash collisions in a relatively small set of inputs?

A

Birthday Paradox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the primary mathematical principle used in error detection and correction codes such as Hamming codes?

A

Linear Algebra and Hamming Distance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What statistical method is widely used in machine learning to find the best fit line for a dataset?

A

Linear Regression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the mathematical concept behind PageRank, Google’s algorithm for ranking search results?

A

Eigenvector Centrality (Graph Theory)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What mathematical transformation is used in JPEG compression to reduce image size without significant loss of quality?

A

Discrete Cosine Transform (DCT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In quantum computing, what is the name of the algorithm that efficiently factors large numbers and threatens modern encryption?

A

Shor’s Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of cryptography relies on the difficulty of solving the discrete logarithm problem?

A

Elliptic Curve Cryptography (ECC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What probability theorem is used in Bayesian networks and machine learning to update beliefs based on evidence?

A

Bayes’ Theorem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What concept in information theory quantifies the amount of information in a message and is measured in bits?

A

Shannon Entropy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the primary mathematical technique used in neural networks for backpropagation?

A

Gradient Descent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What type of algebra is used in logic gates and digital circuit design?

A

Boolean Algebra

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In homomorphic encryption, what mathematical structure allows computations on encrypted data without decryption?

A

Lattice-based cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What theorem in computer science states that some problems cannot be solved by any algorithm, such as the Halting Problem?

A

Rice’s Theorem and the Halting Problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What computational model uses a tape and a set of rules to simulate any algorithm and is a fundamental concept in computer science?

A

Turing Machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the principle behind differential privacy that adds noise to data to protect individual identities while preserving statistical patterns?

A

Laplace Mechanism in Differential Privacy

22
Q

What machine learning algorithm is based on probability distributions and is commonly used for spam filtering?

A

Naïve Bayes Classifier

23
Q

What branch of mathematics is used in blockchain technology to ensure the immutability of records?

A

Cryptographic Hash Functions and Merkle Trees

24
Q

In quantum computing, what fundamental principle allows a quantum bit (qubit) to exist in multiple states simultaneously?

A

Superposition

25
What is the term for the phenomenon in cryptographic systems where small changes in input lead to drastic changes in output?
Avalanche Effect
26
What type of cryptographic attack exploits weaknesses in hash functions to find two different inputs that produce the same hash?
Birthday Attack
27
What is the name of the fundamental concept in combinatorics used in CAPTCHA systems to prevent automated bots from solving visual puzzles?
Combinatorial Graph Theory
28
What mathematical field deals with optimizing resources and is used in AI, networking, and logistics?
Operations Research
29
What paradox in probability theory demonstrates that two seemingly independent events can have counterintuitive dependencies?
Monty Hall Paradox
30
In artificial intelligence, what is the name of the function that represents how 'good' or 'bad' a certain state is in reinforcement learning?
Reward Function
31
What theorem in computer science states that no voting system can be both fair and deterministic for three or more candidates?
Arrow’s Impossibility Theorem
32
What mathematical function, often used in AI, compresses large input values into a smaller range while preserving order?
Sigmoid Function
33
What is the primary mathematical principle used in facial recognition and fingerprint analysis?
Fourier Transform and Principal Component Analysis (PCA)
34
What cryptographic algorithm, widely used in securing online communications, is based on the difficulty of factoring large prime numbers?
RSA Encryption
35
What law states that network speeds will double approximately every 18 months, affecting data transmission rates?
Nielsen’s Law of Internet Bandwidth
36
What is the mathematical concept behind error-correcting codes that allow communication over noisy channels, such as Reed-Solomon codes?
Coding Theory (Shannon and Hamming Codes)
37
What field of mathematics underpins graph databases and is widely used in social network analysis?
Graph Theory
38
What quantum computing principle enables two particles to be correlated regardless of distance, forming the basis of quantum cryptography?
Quantum Entanglement
39
What is the name of the theorem that establishes a fundamental limit to how precisely certain pairs of physical properties can be known?
Heisenberg Uncertainty Principle
40
What is the mathematical concept used in differential equations and control systems that is fundamental to robotics and automation?
Laplace Transforms and Control Theory
41
What is the name of the concept in statistical learning theory that explains why simpler models generalize better than complex ones?
Occam’s Razor and VC Dimension
42
What type of probability distribution models rare events, such as hardware failures or cyberattacks, occurring over a fixed time interval?
Poisson Distribution
43
What is the mathematical principle used in RSA cryptography that allows encryption and decryption with a public and private key?
Prime Factorization and Euler’s Theorem
44
What mathematical law states that in many naturally occurring datasets, the leading digit is more likely to be small than large?
Benford’s Law
45
What type of matrix decomposition is used in recommendation systems, such as Netflix's movie recommendation algorithm?
Singular Value Decomposition (SVD)
46
What is the fundamental mathematical problem that quantum key distribution protocols exploit to ensure secure communication?
No-Cloning Theorem
47
What is the name of the mathematical method used in digital signal processing to filter out unwanted noise?
Fourier Transform Filtering
48
What is the fundamental principle behind CAPTCHA systems that distinguishes between humans and bots based on cognitive abilities?
Turing Test and Image Recognition
49
What cryptographic method, based on elliptic curve mathematics, is increasingly used in modern security protocols due to its efficiency?
Elliptic Curve Digital Signature Algorithm (ECDSA)
50
What is the name of the paradox in computer science where increasing the number of processors does not always decrease computation time due to communication overhead?
Amdahl’s Law