Assignment
Assignment
classical computing?
26
In quantum computing, what is the basic unit of information?
27
Which part of the drug discovery life cycle can quantum computing impact the most?
28
What does it mean when we say that we are currently in the noisy,
computing?
32
Which technology will quantum computing impact most significantly?
33
How could quantum computing benefit the Financial Service Industry?
34
Which problem is more classical effectively solved using quantum
35 computing rather than classical computer?
36 How you can define complex number as an ordered pair?
37 Let c = 1 + i. What is its polar representation?
38 What is complex vector space?
39 What can be depicted by C^4?
40 What can be called as an inverse of a vector?
41 When a set of vectors can be called linearly independent?
42 How a qubit pair can be written?
43 How a two bit qubit can be expressed?
44 What do you understand by probabilistic system?
A mathematician is trying to break down a large number into smaller prime numbers that,
45 when multiplied, would arrive at that larger number. what is this process called?
What is the term for breaking a larger number apart into smaller numbers that can be
46 multiplied together to get a specific result?
47 Which phenomena of quantum mechanics used in Quantum computing?
48 What can be states of a qubit?
In a Quantum circuit, If memory consists of n bits of information, then what will be the
49 possible no. of states?
50 When the information is between 0 and 1 in a quantum computer, what do we call this?
51 What does 'entanglement' mean?
52 Quantum encryption keys can be hacked and broken into. True or False?
53 Why are we not able to use quantum computers in our homes?
54 What is supercomputer?
55 How quantum computer differs from super computer?
56 Convert 23D916 to binary, decimal and octal.
57 Solve for the decimal equivalent of (101101.10101)2
58 Write De-Morgan’s law and verify it with the truth table.
59 Which possible Attacks in Quantum Cryptography can take place?
Which two principles of quantum mechanics on which quantum
60 cryptography are dependent?
What is the greatest threat to public cryptography or asymmetric
61 algorithms?
62 What is active attack?
63 What is passive attack?
64 What is the difference between symmetric and asymmetric cryptography?
65 What is information gain?
66 What is the modulus of c = (1-i)?
67 Calculate the modulus of c = (4-3i)
68 Consider the complex numbers c = 3 + 4i. Find the length of the vector.
73
5 marks Question
3
Write a program (any language) that accepts two complex numbers and outputs their sum and
4 their product.
5 Let c1 =(3, -2) and c2 = (1,2). Multiply them.
6 Let c1 =(-3, -1) and c2 = (1,-2). Calculate the product.
7 Let, c1 = (-2+i) and c2 = (1+2i). Compute c1/c2.
8 Let, c1 = (3i) and c2 = (-1 - i). Compute c1/c2.
9 Show that conjugation respects addition, i.e., c1 + c2 = c2 + c1.
10 Show that conjugation respects multiplication, i.e., c1 × c2 = c1 × c2
11 Describe complex plane with proper diagram.
Verify that multiplication by (-1,0) changes the sign of the real and imaginary components of a
12 complex number.
13 Discuss parallelogram rule for addition of vectors.
14 Discuss parallelogram rule for subtraction of vectors.
Write a program (any language) that converts a complex number from its Cartesian
15 representation to its polar representation and vice versa.
Draw the complex numbers c1 = (2-i) and c2 = (2+i) in the complex plane, and subtract them
using the parallelogram rule. Verify that you would get the same result as subtracting them
16 algebraically.
Take any C^5 vector and take another C^5 vector and prove that second one is an inverse of a
17 first one.
Add the given vectors
18
What can be possible eigen values for the given matrix?
19
Find eigen vector for the given matrix with a eigen
value of 7.
20
Find eigen vector for the given matrix with a eigen
value of 6.
21
When following set of vectors can be called as linearly independent?
22
When following set of vectors can be called as linearly independent?
23
Show that the following set of vectors are not linearly independent.
24
Show that given matrix is Hermitian matrix.
25
26 Express inputs and output of NAND gate as matrix.
27 Show that NAND is a combination of NOT and AND.
28 Express inputs and output of NOR gate as matrix.
29 Explain controlled-NOT gate.
30 Discuss pauli matrices.
Explain square root of NOT gate.
31
32 Explain Deutsch gate.
Find the probability of the qubit belonging to state |0> and |1>.
33
Calculate (i) 244,443 Mod 247 (ii) 18,154 Mod 247 (iii) 226,006 Mod 247.
34
Show that (i) 1,977 1 Mod 247 (ii) 16,183 15,442 Mod 247 (iii) 2,439,593 238,082 Mod 247
35
If state of a classical deterministic system is expressed as X = [6, 2, 1, 5, 3, 10]^T, what we
36 understand from this?
If state of a classical deterministic system is expressed as X = [5, 5, 0, 2, 0, 15]^T, what we
37 understand from this?
38 In a probabilistic system a state is expressed by X = [1/ 5 , 3/10 , 1/2 ]^T, explain X.
40
10 marks Question
4
Find eigen values for the given matrix.
5
Find eigen values for the given matrix.
6
Find eigen values and eigen vector for the given matrix.
7
Show that given matrix is unitary.
8
Express input and output of basic gates as matrix.
9
10 Discuss different quantum gates.
Consider the function from {0, 1}^2 to {0, 1} that always outputs a 1.
Give the corresponding 8-by-8 unitary matrix.
11
Explain Deutsch algorithm.
12 .
Explain Deutsch-Jozsa algorithm.
13 .
14 Explain Simon's Periodicity Algorithm.
15 Explain Shor's factoring algorithm.
10 marks Question
16
17 Let N = 15 and a = 2, 4, 13. Apply Shor’s algorithm to find f(a,N).
18 Calculate the first few values of f(a,N) for N = 247 and (i) a = 2 (ii) a = 17(iii) a = 23.
Consider a circuit that is represented by OR *(NOT AND). Find its corresponding matrix
19 operations.
Consider the given graph for a dynamic system and describe it as
matrix.
20
Multiply M*N and show the result is doubly stochastic matrix.
21
10 marks Question
22
23 Explain the quantum billiard ball with proper graph and matrix.
24 Prove that Shannon entropy is always positive or zero.
25 Justify von Neumann entropy.
26 Explain data compression techniques.
Explain Huffman coding and its application in data compression process.
27
28 Explain error-correcting codes.
A file contains the following characters with the frequencies as shown. If Huffman Coding is
used for data compression, determine-
a.Huffman Code for each character Average code length
b. Length of Huffman encoded message (in bits)
Characters Frequencies
a 10
e 15
i 12
o 3
u 4
s 13
t 1
29
Reframe error-correcting codes.
30