Computer Architecture MCQ
Computer Architecture MCQ
Answer: c
Explanation: The program written and
before being compiled or assembled is
called as a source program.
4. Which memory device is generally
made of semiconductors?
a) RAM
b) Hard-disk
UNIT I BASIC STRUCTURE c) Floppy disk
d) Cd disk
OF A COMPUTER SYSTEM
Answer: a
1. The format is usually used to Explanation: Memory devices are
store data. usually made of semiconductors for
a) BCD faster manipulation of the contents.
b) Decimal
c) Hexadecimal 5. The small extremely fast, RAM’s are
d) Octal called as
a) Cache
Answer: a b) Heaps
Explanation: The data usually used by c) Accumulators
computers have to be stored and d) Stacks
represented in a particular format for
ease of use. Answer: a
Explanation: These small and fast
2. The 8-bit encoding format used to memory devices are compared to RAM
store data in a computer is because they optimize the performance
a) ASCII of the system and they only keep files
b) EBCDIC which are required by the current
c) ANCI process in them
d) USCII
6. The ALU makes use of to
Answer: b store the intermediate results.
Explanation: The data to be stored in a) Accumulators
the computers have to be encoded in a b) Registers
particular way so as to provide secure c) Heap
processing of the data. d) Stack
Answer: a a) Single bus
Explanation: The ALU is the b) Multiple bus
computational center of the CPU. It c) Star bus
performs all mathematical and logical d) Rambus
operations. In order to perform better, it
uses some internal memory spaces to Answer: a
store immediate results. Explanation: BUS is a bunch of wires
which carry address, control signals and
7. The control unit controls other units data. It is used to connect various
by generating components of the computer.
a) Control signals
b) Timing signals 11. The I/O interface required to
c) Transfer signals connect the I/O device to the bus
d) Command Signals consists of
a) Address decoder and registers
Answer: b b) Control circuits
Explanation: This unit is used to control c) Address decoder, registers and Control
and coordinate between the various circuits
parts and components of the CPU. d) Only Control circuits
Answer: b Answer: a
Explanation: SCSI BUS is usually used to Explanation: None.
connect video devices to the processor.
10. The ISA standard Buses are used to
6. ANSI stands for connect
a) American National Standards Institute a) RAM and processor
b) American National Standard Interface b) GPU and processor
c) American Network Standard c) Harddisk and Processor
Interfacing d) CD/DVD drives and Processor
d) American Network Security Interrupt
Answer: c
Answer: a Explanation: None.
Explanation: None.
Answer: d Answer: c
Explanation: None. Explanation: In super-scalar
architecture, the instructions are set in
2. Two processors A and B have clock groups and they’re decoded and
frequencies of 700 Mhz and 900 Mhz executed together reducing the amount
respectively. Suppose A can execute an of time required to process them.
instruction with an average of 3 steps
and B can execute with an average of 5 5. The clock rate of the processor can be
steps. For the execution of the same improved by
instruction which processor is faster? a) Improving the IC technology of the
a) A logic circuits
b) B b) Reducing the amount of processing
c) Both take the same time done in one step
d) Insufficient information c) By using the overclocking method
d) All of the mentioned
Answer: a
Explanation: The performance of a Answer: d
system can be found out using the Basic Explanation: The clock rate(frequency
performance formula. of the processor) is the hardware
dependent quantity it is fixed for a given
3. A processor performing fetch or processor.
decoding of different instruction during
the execution of another instruction is 6. An optimizing Compiler does
called
a) Super-scaling a) Better compilation of the given piece
b) Pipe-lining of code
c) Parallel Computation b) Takes advantage of the type of
d) None of the mentioned processor and reduces its process time
c) Does better memory management
Answer: b d) None of the mentioned
Explanation: Pipe-lining is the process
of improving the performance of the Answer: b
system by processing different Explanation: An optimizing compiler is
instructions at the same time, with only a compiler designed for the specific
one instruction performing one specific purpose of increasing the operation
operation. speed of the processor by reducing the
time taken to compile the program
4. For a given FINITE number of instructions.
instructions to be executed, which
architecture of the processor provides 7. The ultimate goal of a compiler is to
for a faster execution?
a) ISA a) Reduce the clock cycles for a
programming task Answer: b
b) Reduce the size of the object code Explanation: When a looping or
c) Be versatile branching operation is carried out the
d) Be able to detect even the smallest of offset value is stored in the cache along
errors with the data.
Answer: b Answer: b
Explanation: None. Explanation: None.
6. The addressing mode/s, which uses 9. The effective address of the following
the PC instead of a general purpose instruction is MUL 5(R1,R2).
register is a) 5+R1+R2
a) Indexed with offset b) 5+(R1*R2)
b) Relative c) 5+[R1]+[R2]
c) Direct d) 5*([R1]+[R2])
d) Both Indexed with offset and direct
Answer: c
Answer: b Explanation: The addressing mode used
Explanation: In this, the contents of the is base with offset and index.
PC are directly incremented.
10. addressing mode is most
7. When we use auto increment or auto suitable to change the normal sequence
decrements, which of the following of execution of instructions.
is/are true? a) Relative
1) In both, the address is used to b) Indirect
retrieve the operand and then the c) Index with Offset
address gets altered d) Immediate
2) In auto increment, the operand is
retrieved first and then the address Answer: a
altered Explanation: The relative addressing
3) Both of them can be used on general mode is used for this since it directly
purpose registers as well as memory updates the PC.
locations
a) 1, 2, 3
b) 2 1. Which method/s of representation of
c) 1, 3 numbers occupies a large amount of
d) 2, 3 memory than others?
a) Sign-magnitude
Answer: d b) 1’s complement
Explanation: In the case of, auto c) 2’s complement
increment the increment is done d) 1’s & 2’s compliment
afterward and in auto decrement the
decrement is done first. Answer: a
Explanation: It takes more memory as
8. The addressing mode, where you one bit used up to store the sign.
directly specify the operand value is
2. Which representation is most efficient
a) Immediate to perform arithmetic operations on the
numbers? Answer: b
a) Sign-magnitude Explanation: First the 2’s complement
b) 1’s complement is found and that is added to the number
c) 2’S complement and the overflow is ignored.
d) None of the mentioned
6. When we subtract -3 from 2 , the
Answer: c answer in 2’s complement form is
Explanation: The two’s complement
form is more suitable to perform a) 0001
arithmetic operations as there is no b) 1101
need to involve the sign of the number c) 0101
into consideration. d) 1001
Answer: a Answer: c
Explanation: By using this instruction Explanation: The shift registers are
the condition flags won’t be affected at used to store the multiplied answer.
all.
15. When 1101 is used to divide
11. The most efficient method followed 100010010 the remainder is
by computers to multiply two unsigned a) 101
numbers is b) 11
a) Booth algorithm c) 0
b) Bit pair recording of multipliers d) 1
c) Restoring algorithm
d) Non restoring algorithm Answer: d
Explanation: None.
Answer: b
Explanation: None.
1. The smallest entity of memory is
12. For the addition of large integers, called
most of the systems make use of a) Cell
a) Fast adders b) Block
b) Full adders c) Instance
c) Carry look-ahead adders d) Unit
d) None of the mentioned
Answer: a
Answer: c Explanation: Each data is made up of a
Explanation: In this method, the carries number of units.
for each step are generated first.
2. The collection of the above
13. In a normal n-bit adder, to find out if mentioned entities where data is stored
an overflow as occurred we make use of is called
a) Block 6. When using the Big Endian assignment
b) Set to store a number, the sign bit of the
c) Word number is stored in
d) Byte a) The higher order byte of the word
b) The lower order byte of the word
Answer: c c) Can’t say
Explanation: Each readable part of the d) None of the mentioned
data is called blocks.
Answer: a
3. An 24 bit address generates an Explanation: None.
address space of locations.
a) 1024 7. To get the physical address from the
b) 4096 logical address generated by CPU we use
c) 248
d) 16,777,216 a) MAR
b) MMU
Answer: d c) Overlays
Explanation: The number of d) TLB
addressable locations in the system is
called as address space. Answer: b
Explanation: Memory Management Unit,
4. If a system is 64 bit machine, then the is used to add the offset to the logical
length of each word will be address generated by the CPU to get the
a) 4 bytes physical address.
b) 8 bytes
c) 16 bytes 8. method is used to map logical
d) 12 bytes addresses of variable length onto
physical memory.
Answer: b a) Paging
Explanation: A 64 bit system means, b) Overlays
that at a time 64 bit instruction can be c) Segmentation
executed. d) Paging with segmentation
a) System stacks
b) Overlays 1. RTN stands for
c) Page Table a) Register Transfer Notation
d) TLB b) Register Transmission Notation
c) Regular Transmission Notation
Answer: d d) Regular Transfer Notation
Explanation: None.
Answer: a
8. The BOOT sector files of the system Explanation: This is the way of writing
are stored in the assembly language code with the
a) Harddisk help of register notations.
b) ROM
c) RAM 2. The instruction, Add Loc,R1 in RTN is
d) Fast solid state chips in the
motherboard a) AddSetCC Loc+R1
b) R1=Loc+R1
Answer: b c) Not possible to write in RTN
Explanation: The files which are d) R1<-[Loc]+[R1]
required for the starting up of a system
are stored on the ROM. Answer: d
Explanation: None.
9. The transfer of large chunks of data
with the involvement of the processor is 3. Can you perform an addition on three
done by operands simultaneously in ALN using
a) DMA controller Add instruction?
b) Arbitrator a) Yes
c) User system programs b) Not possible using Add, we’ve to use
d) None of the mentioned AddSetCC
c) Not permitted
Answer: a d) None of the mentioned
Explanation: This mode of transfer
involves the transfer of a large block of Answer: c
data from the memory. Explanation: You cannot perform an
addition on three operands
10. Which of the following techniques simultaneously because the third
used to effectively utilize main memory? operand is where the result is stored.
a) Address binding
b) Dynamic linking
4. The instruction, Add R1,R2,R3 in RTN d) Decoding the data in MDR and placing
is it in IR
a) R3=R1+R2+R3
b) R3<-[R1]+[R2]+[R3] Answer: d
c) R3=[R1]+[R2] Explanation: The fetch ends with the
d) R3<-[R1]+[R2] instruction getting decoded and being
placed in the IR and the PC getting
Answer: d incremented.
Explanation: In RTN the first operand is
the destination and the second operand 8. While using the iterative construct
is the source. (Branching) in execution
instruction is used to check the
5. In a system, which has 32 registers condition.
the register id is long. a) TestAndSet
a) 16 bit b) Branch
b) 8 bits c) TestCondn
c) 5 bits d) None of the mentioned
d) 6 bits
Answer: b
Answer: c Explanation: Branch instruction is used
Explanation: The ID is the name tag to check the test condition and to
given to each of the registers and used perform the memory jump with the help
to identify them. of offset.
Answer: b Answer: a
Explanation: First, the instructions are Explanation: None.
fetched and decoded and then they’re
executed and stored. 10. The condition flag Z is set to 1 to
indicate
7. The Instruction fetch phase ends with a) The operation has resulted in an error
b) The operation requires an interrupt
a) Placing the data from the address in call
MAR into MDR c) The result is zero
b) Placing the address of the data into d) There is no empty register available
MAR
c) Completing the execution of the data Answer: c
and placing its storage address into MAR Explanation: This condition flag is used
to check if the arithmetic operation c) Comments
yields a zero output. d) Assembler Directives
Answer: d
1. converts the programs Explanation: The directives help the
written in assembly language into program in getting compiled and hence
machine instructions. won’t be there in the object code.
a) Machine compiler
b) Interpreter 5. The assembler directive EQU, when
c) Assembler used in the instruction: Sum EQU 200
d) Converter does
a) Finds the first occurrence of Sum and
Answer: c assigns value 200 to it
Explanation: An assembler is a software b) Replaces every occurrence of Sum
used to convert the programs into with 200
machine instructions. c) Re-assigns the address of Sum by
adding 200 to its original address
2. The instructions like MOV or ADD are d) Assigns 200 bytes of memory starting
called as the location of Sum
a) OP-Code
b) Operators Answer: b
c) Commands Explanation: This basically is used to
d) None of the mentioned replace the variable with a constant
value.
Answer: a
Explanation: This OP – codes tell the 6. The purpose of the ORIGIN directive is
system what operation to perform on
the operands. a) To indicate the starting position in
memory, where the program block is to
3. The alternate way of writing the be stored
instruction, ADD #5,R1 is b) To indicate the starting of the
a) ADD [5],[R1]; computation code
b) ADDI 5,R1; c) To indicate the purpose of the code
c) ADDIME 5,[R1]; d) To list the locations of all the
d) There is no other way registers used
Answer: b Answer: a
Explanation: The ADDI instruction, Explanation: This does the function
means the addition is in immediate similar to the main statement.
addressing mode.
7. The directive used to perform
4. Instructions which won’t appear in initialization before the execution of the
the object program are called as code is
a) Redundant instructions a) Reserve
b) Exceptions b) Store
c) Dataword condition is satisfied
d) EQU c) Finds the Branch offset and replaces
the Branch target with it
Answer: c d) Replaces the target with the value
Explanation: None. specified by the DATAWORD directive
Answer: a Answer: a
Explanation: In this method, the Explanation: None.
processor constantly checks the status
flags, and when it finds that the flag is
set it performs the appropriate 1. The interrupt-request line is a part of
operation. the
a) Data line
8. The method of synchronising the b) Control line
processor with the I/O device in which c) Address line
the device sends a signal when it is d) None of the mentioned
ready is?
a) Exceptions Answer: b
b) Signal handling Explanation: The Interrupt-request line
c) Interrupts is a control line along which the device
d) DMA is allowed to send the interrupt signal.
7. A single Interrupt line can be used to 11. The 8085 microprocessor responds to
service n different devices. the presence of an interrupt
a) True
b) False a) As soon as the trap pin becomes
‘LOW’ for its completion. Hence trap is
b) By checking the trap pin for ‘high’ unmaskable.
status at the end of each instruction
fetch 14. From amongst the following given
c) By checking the trap pin for ‘high’ scenarios determine the right one to
status at the end of execution of each justify interrupt mode of data transfer.
instruction i) Bulk transfer of several kilo-byte
d) By checking the trap pin for ‘high’ ii) Moderately large data transfer of
status at regular intervals more than 1kb
iii) Short events like mouse action
Answer: c iv) Keyboard inputs
Explanation: The 8085 microprocessor a) i and ii
are designed to complete the execution b) ii
of the current instruction and then to c) i, ii and iv
service the interrupts. d) iv
Answer: c Answer: d
Explanation: These instructions are Explanation: DMA is an approach of
those which can are crucial for the performing data transfers in bulk
system’s performance and hence cannot between memory and the external
be adultered by user programs, so is run device without the intervention of the
only in supervisor mode. processor.
Answer: b Answer: a
Explanation: The controller raises an Explanation: The DMA controller can
interrupt signal to notify the processor perform operations on two different
that the transfer was complete. disks if the appropriate details are
known.
5. The DMA controller has
registers. 9. The technique whereby the DMA
a) 4 controller steals the access cycles of the
b) 2 processor to operate is called
c) 3
d) 1 a) Fast conning
b) Memory Con
Answer: c c) Cycle stealing
Explanation: The Controller uses the d) Memory stealing
registers to store the starting address,
word count and the status of the Answer: c
operation. Explanation: The controller takes over
the processor’s access cycles and
6. When the R/W bit of the status performs memory operations.
register of the DMA controller is set to 1.
10. The technique where the controller Answer: c
is given complete access to main Explanation: None.
memory is
a) Cycle stealing 14. When the process requests for a DMA
b) Memory stealing transfer?
c) Memory Con a) Then the process is temporarily
d) Burst mode suspended
b) The process continues execution
Answer: d c) Another process gets executed
Explanation: The controller is given full d) process is temporarily suspended &
control of the memory access cycles and Another process gets executed
can transfer blocks at a faster rate.
Answer: d
11. The controller uses to help Explanation: The process requesting
with the transfers when handling the transfer is paused and the operation
network interfaces. is performed, meanwhile another
a) Input Buffer storage process is run on the processor.
b) Signal enhancers
c) Bridge circuits 15. The DMA transfer is initiated by
d) All of the mentioned
a) Processor
Answer: a b) The process being executed
Explanation: The controller stores the c) I/O devices
data to transfer in the buffer and then d) OS
transfers it.
Answer: c
12. To overcome the conflict over the Explanation: The transfer can only be
possession of the BUS we use initiated by an instruction of a program
a) Optimizers being executed.
b) BUS arbitrators
c) Multiple BUS structure
d) None of the mentioned 1. To resolve the clash over the access of
the system BUS we use
Answer: b a) Multiple BUS
Explanation: The BUS arbitrator is used b) BUS arbitrator
to overcome the contention over the c) Priority access
BUS possession. d) None of the mentioned
Answer: a Answer: b
Explanation: The device which is Explanation: The Grant signal is passed
currently accessing the BUS is called as from one device to the other until the
the BUS master. device that has requested is found.
Answer: a Answer: d
Explanation: In this approach, the Explanation: The BUS master is the one
processor takes into account the various that decides which will get the BUS.
parameters and assigns the BUS to that
device. 8. Once the BUS is granted to a device
4. The circuit used for the request line is a) It activates the BUS busy line
a b) Performs the required operation
a) Open-collector c) Raises an interrupt
b) EX-OR circuit d) All of the mentioned
c) Open-drain
d) Nand circuit Answer: a
Explanation: The BUS busy activated
Answer: c indicates that the BUS is already
Explanation: None. allocated to a device and is being used.
Answer: d Answer: b
Explanation: None. Explanation: None.
6. When the processor receives the 10. After the device completes its
request from a device, it responds by operation assumes the control of
sending the BUS.
a) Another device a) By NANDing the signals passed on all
b) Processor the 4 lines
c) Controller b) By ANDing the signals passed on all
d) None of the mentioned the 4 lines
c) By ORing the signals passed on all the
Answer: b 4 lines
Explanation: After the device d) None of the mentioned
completes the operation it releases the
BUS and the processor takes over it. Answer: c
Explanation: The OR output of all the 4
11. The BUS busy line is used lines is obtained and the device with the
larger value is assigned the BUS.
a) To indicate the processor is busy
b) To indicate that the BUS master is 15. If two devices A and B contesting for
busy the BUS have ID’s 5 and 6 respectively,
c) To indicate the BUS is already which device gets the BUS based on the
allocated Distributed arbitration.
d) None of the mentioned a) Device A
b) Device B
Answer: c c) Insufficient information
Explanation: None. d) None of the mentioned
12. Distributed arbitration makes use of Answer: b
Explanation: The device Id’s of both the
a) BUS master devices are passed on the lines and since
b) Processor the value of B is greater after the Or
c) Arbitrator operation it gets the BUS.
d) 4-bit ID
5. In synchronous BUS, the devices get 9. Which is fed into the BUS first by the
the timing signals from initiator?
a) Timing generator in the device a) Data
b) A common clock line b) Address
c) Timing signals are not used at all c) Commands or controls
d) None of the mentioned d) Address, Commands or controls
Answer: b Answer: d
Explanation: The devices receive their Explanation: None.
timing signals from the clock line of the
BUS. 10. signal is used as an
acknowledgement signal by the slave in
Multiple cycle transfers. c) After the slave gets the commands
a) Ack signal d) None of the mentioned
b) Slave ready signal
c) Master ready signal Answer: b
d) Slave received signal Explanation: This signal is activated by
the master to tell the slave that the
Answer: b required commands are on the BUS.
Explanation: The slave once it receives
the commands and address from the 4. In IBM’s S360/370 systems lines
master strobes the ready line indicating are used to select the I/O devices.
to the master that the commands are a) SCAN in and out
received. b) Connect
c) Search
d) Peripheral
1. The master indicates that the address
is loaded onto the BUS, by activating Answer: a
signal. Explanation: The signal is used to scan
a) MSYN and connect to input or output devices.
b) SSYN
c) WMFC 5. The meter in and out lines are used
d) INTR for
a) Monitoring the usage of devices
Answer: a b) Monitoring the amount of data
Explanation: The signal activated by transferred
the master in the asynchronous mode of c) Measure the CPU usage
transmission is used to intimate the d) None of the mentioned
slave the required data is on the BUS.
Answer: a
2. The devices with variable speeds are Explanation: The line is used to monitor
usually connected using asynchronous the usage of the device for a process.
BUS.
a) True 6. MRDC stands for
b) False a) Memory Read Enable
b) Memory Ready Command
Answer: a c) Memory Re-direct Command
Explanation: The devices with variable d) None of the mentioned
speeds are connected using
asynchronous BUS, as the devices share Answer: b
a master-slave relationship. Explanation: The command is used to
initiate a read from memory operation.
3. The MSYN signal is initiated
7. The BUS that allows I/O, memory and
a) Soon after the address and commands Processor to coexist is
are loaded a) Attributed BUS
b) Soon after the decoding of the b) Processor BUS
address
c) Backplane BUS Answer: a
d) External BUS Explanation: The interface circuits act
as a hardware interface between the
Answer: c device and the software side.
Explanation: None.
2. The side of the interface circuits, that
8. The transmission on the asynchronous has the data path and the control signals
BUS is also called to transfer data between interface and
a) Switch mode transmission device is
b) Variable transfer a) BUS side
c) Bulk transfer b) Port side
d) Hand-Shake transmission c) Hardwell side
d) Software side
Answer: d
Explanation: The asynchronous Answer: b
transmission is termed as Hand-Shake Explanation: This side connects the
transfer because the master intimates device to the motherboard.
the slave after each step of the transfer.
3. What is the interface circuit?
9. Asynchronous mode of transmission is a) Helps in installing of the software
suitable for systems with multiple driver for the device
peripheral devices. b) Houses the buffer that helps in data
a) True transfer
b) False c) Helps in the decoding of the address
on the address BUs
Answer: a d) None of the mentioned
Explanation: This mode of transmission
is suitable for multiple device situation Answer: c
as it supports variable speed transfer. Explanation: Once the address is put on
the BUS the interface circuit decodes
10. The asynchronous BUS mode of the address and uses the buffer space to
transmission allows for a faster mode of transfer data.
data transfer.
a) True 4. The conversion from parallel to serial
b) False data transmission and vice versa takes
place inside the interface circuits.
Answer: b a) True
Explanation: None. b) False
Answer: a
1. serves as an intermediary Explanation: By doing this the interface
between the device and the BUSes. circuits provide a better interconnection
a) Interface circuits between devices.
b) Device drivers
c) Buffers 5. The parallel mode of communication
d) None of the mentioned is not suitable for long devices because
of a) Mouse
a) Timing skew b) Magnetic disk
b) Memory access delay c) Visual display terminal
c) Latency d) Card punch
d) None of the mentioned
Answer: a
Answer: a Explanation: In batch processing
Explanation: None. systems the processes are grouped into
batches and they’re executed in
6. The Interface circuits generate the batches.
appropriate timing signals required by
the BUS control scheme. 10. The use of spooler programs or
a) True Hardware allows PC operators
b) False to do the processing work at the same
time a printing operation is in progress.
Answer: a a) Registers
Explanation: The interface circuits b) Memory
generate the required clock signal for c) Buffer
the synchronous mode of transfer. d) CPU
Answer: c Answer: a
Explanation: The UART is a standard Explanation: None.
developed for designing serial ports.
Answer: d Answer: c
Explanation: None. Explanation: The PCI BUS has a closer
resemblance to IBM architecture.
8. The data transfer in UART is done in
2. The is the BUS used in
a) Asynchronous start stop format Macintosh PC’s.
b) Synchronous start stop format a) NuBUS
c) Isochronous format b) EISA
d) EBDIC format c) PCI
d) None of the mentioned
Answer: a
Explanation: This basically means that Answer: a
the data transfer is done in Explanation: The NuBUS is an extension
asynchronous mode. of the processor BUS in Macintosh PC’s.
3. The key feature of the PCI BUS is 7. provides a separate physical
connection to the memory.
a) Low cost connectivity a) PCI BUS
b) Plug and Play capability b) PCI interface
c) Expansion of Bandwidth c) PCI bridge
d) None of the mentioned d) Switch circuit
Answer: b Answer: c
Explanation: The PCI BUS was the first Explanation: The PCI bridge is a circuit
to introduce plug and play interface for that acts as a bridge between the BUS
I/O devices. and the memory.
3. The PCI BUS has interrupt 7. The signal used to indicate that the
request lines. slave is ready is
a) 6 a) SLRY#
b) 1 b) TRDY#
c) 4 c) DSDY#
d) 3 d) None of the mentioned
Answer: c Answer: b
Explanation: The interrupt request lines Explanation: None.
are used by the devices connected to
raise the interrupts. 8. DEVSEL# signal is used
a) To select the device
4. signal is sent by the initiator to b) To list all the devices connected
indicate the duration of the transaction. c) By the device to indicate that it is
a) FRAME# ready for a transaction
b) IRDY# d) None of the mentioned
c) TMY#
d) SELD# Answer: c
Explanation: This is signal is activated
Answer: a by the device after it as recognized the
Explanation: The FRAME signal is used address and commands put on the BUS.
9. The signal used to initiate device Answer: d
select Explanation: The initiator involves in
a) IRDY# the arbitration process and after winning
b) S/BE the BUS it’ll hand over the control to the
c) DEVSEL# target controller.
d) IDSEL#
3. In SCSI transfers the processor is not
Answer: d aware of the data being transferred.
Explanation: This signal is used to a) True
initialization of device select. b) False
6. For better transfer rates on the SCSI 10. The data is stored on the disk in the
BUS the length of the cable is limited to form of blocks called
a) Pages
a) 2m b) Frames
b) 4m c) Sectors
c) 1.3m d) Tables
d) 1.6m
Answer: c
Answer: d Explanation: The data is stored on the
Explanation: To increase the disk in the form of a collection of blocks
transmission rate in SCSI in SE mode of called as sectors.
transfer the wire length is restricted to
1.6m.
1. The transfer rate, when the USB is
7. The maximum number of devices that operating in low-speed of operation is
can be connected to SCSI BUS is
a) 12 a) 5 Mb/s
b) 10 b) 12 Mb/s
c) 16 c) 2.5 Mb/s
d) 8 d) 1.5 Mb/s
Answer: c Answer: d
Explanation: None. Explanation: The USB has two rates of
operation the low-speed and the full-
8. The SCSI BUS is connected to the speed one.
processor through
a) SCSI Controller 2. The high speed mode of operation of
b) Bridge the USB was introduced by
a) ISA 6. USB is a parallel mode of transmission
b) USB 3.0 of data and this enables for the fast
c) USB 2.0 speeds of data transfers.
d) ANSI a) True
b) False
Answer: c
Explanation: The high-speed mode of Answer: b
operation was introduced with USB 2.0, Explanation: The USB does a serial
which enabled the USB to operate at 480 mode of data transfer.
Mb/s.
7. In USB the devices can communicate
3. The sampling process in speaker with each other.
output is a process. a) True
a) Asynchronous b) False
b) Synchronous
c) Isochronous Answer: b
d) None of the mentioned Explanation: It allows only the host to
communicate with the devices and not
Answer: c between themselves.
Explanation: The isochronous process
means each bit of data is separated by a 8. The device can send a message to the
time interval. host by taking part in for the
communication path.
4. The USB device follows a) Arbitration
structure. b) Polling
a) List c) Prioritizing
b) Huffman d) None of the mentioned
c) Hash
d) Tree Answer: b
Explanation: None.
Answer: d
Explanation: The USB has a tree 9. When the USB is connected to a
structure with the root hub at the system, its root hub is connected to the
centre.
a) PCI BUS
5. The I/O devices form the of the b) SCSI BUS
tree structure. c) Processor BUS
a) Leaves d) IDE
b) Subordinate roots
c) Left subtrees Answer: c
d) Right subtrees Explanation: The USB’s root is
connected to the processor directly
Answer: a using the BUS.
Explanation: The I/o devices form the
leaves of the structure. 10. The devices connected to USB is
assigned a address.
a) 9 bit c) Full-Duplex
b) 16 bit d) Both Simplex and Full-Duplex
c) 4 bit
d) 7 bit Answer: c
Explanation: This means that the pipe
Answer: d is bi-directional in sending messages or
Explanation: To make it easier for information.
recognition the devices are given 7 bit
addresses. 15. The type/s of packets sent by the
USB is/are
11. The USB address space can be shared a) Data
by the user’s memory space. b) Address
a) True c) Control
b) False d) Both Data and Control
Answer: b Answer: d
Explanation: The USB memory space is Explanation: This means that the USB
not under any address spaces and cannot gets both data and control signals
be accessed. required for the transfer operation.
Answer: b Answer: a
Explanation: By standard, the usual Explanation: The PID is the field that is
address of a new device is zero. used to identify the device (the device
id).
13. Locations in the device to or from
which data transfers can take place is 2. The 4 bit PID’s are transmitted twice.
called a) True
a) End points b) False
b) Hosts
c) Source Answer: a
d) None of the mentioned Explanation: The fields are transmitted
twice, once with the true values and the
Answer: a second time with the complemented
Explanation: None. values.
Answer: d Answer: a
Explanation: The last 5 bits of the Explanation: To support the isochronous
packet is used for error checking, that is mode of operation the usb transmission
cyclic redundancy check. is divided into frames.
4. The CRC bits are computed based on 8. The signal is used to indicate
the values of the the beginning of a new frame.
a) PID a) Start
b) ADDR b) SOF
c) ENDP c) BEG
d) Both ADDR and ENDP d) None of the mentioned
Answer: d Answer: b
Explanation: The CRC bits are Explanation: The SOF(State Of Frame)
calculated based on the values of the is used to indicate the beginning of a
address and endp. new frame.
5. The data packets can contain data 9. The SOF is transmitted every
upto a) 1s
a) 512 bytes b) 5s
b) 256 bytes c) 1ms
c) 1024 bytes d) 1Us
d) 2 KB
Answer: c
Answer: c Explanation: None.
Explanation: None.
10. The power specification of usb is
6. The most important objective of the
USB is to provide a) 5v
a) Isochronous transmission b) 10v
b) Plug and play c) 24v
c) Easy device connection d) 10v
d) All of the mentioned
Answer: a
Answer: d Explanation: None.
Explanation: The above are all the
common features of the USB.
Answer: c Answer: b
Explanation: The fast adders are used Explanation: None.
to add the multiplied numbers.
7. The method used to reduce the
3. The multiplier is stored in maximum number of summands by half
a) PC Register is
b) Shift register a) Fast multiplication
b) Bit-pair recording
c) Quick multiplication Answer: a
d) None of the mentioned Explanation: By doing this the
computer is capable of accommodating
Answer: b the large float numbers also.
Explanation: It reduces the number of
summands by concatenating them. 2. The numbers written to the power of
10 in the representation of decimal
8. The bits 1 & 1 are recorded as numbers are called as
in bit-pair recording. a) Height factors
a) -1 b) Size factors
b) 0 c) Scale factors
c) +1 d) None of the mentioned
d) both -1 and 0
Answer: c
Answer: d Explanation: These are called as scale
Explanation: Its ‘-1’ when the previous factors cause they’re responsible in
bit is 0 and ‘0’ when the previous bit is determining the degree of specification
1. of a number.
Answer: c Answer: a
Explanation: The mantissa also consists Explanation: Since the exponent field
of the decimal point. has only 8 bits to store the value.
6. In IEEE 32-bit representations, the 10. In double precision format, the size
mantissa of the fraction is said to occupy of the mantissa is
bits. a) 32 bit
a) 24 b) 52 bit
b) 23 c) 64 bit
c) 20 d) 72 bit
d) 16
Answer: b
Answer: b Explanation: The double precision
Explanation: The mantissa is made to format is also called as 64 bit
occupy 23 bits, with 8 bit exponent. representation.
6. If a unit completes its task before the 10. The situation wherein the data of
allotted time period, then operands are not available is called
a) It’ll perform some other task in the
remaining time a) Data hazard
b) Its time gets reallocated to a b) Stock
different task c) Deadlock
c) It’ll remain idle for the remaining d) Structural hazard
time
d) None of the mentioned Answer: a
Explanation: Data hazards are generally
Answer: c caused when the data is not ready on
Explanation: None. the destination side.
Answer: b
1. The throughput of a super scalar Explanation: The processor since as
processor is executed the following instructions even
a) less than 1 though an exception was raised, hence
b) 1 the exception is treated as imprecise.
c) More than 1
d) Not Known 5. In super-scalar mode, all the similar
instructions are grouped and executed
Answer: c together.
Explanation: The throughput of a a) True
processor is measured by using the b) False
number of instructions executed per
second. Answer: a
Explanation: The instructions are
2. When the processor executes multiple grouped meaning that the instructions
instructions at a time it is said to use fetch and decode and other cycles are
overlapped.
a) single issue
b) Multiplicity 6. In super-scalar processors,
c) Visualization mode of execution is used.
d) Multiple issues a) In-order
b) Post order
Answer: d c) Out of order
Explanation: None. d) None of the mentioned
Answer: a Answer: b
Explanation: None. Explanation: The RISC processor design
is more simpler than CISC and it consists
of fewer transistors.
1. The CISC stands for
a) Computer Instruction Set Compliment 5. The iconic feature of the RISC
b) Complete Instruction Set Compliment machine among the following is
c) Computer Indexed Set Components a) Reduced number of addressing modes
d) Complex Instruction set computer b) Increased memory size
c) Having a branch delay slot
Answer: d d) All of the mentioned
Explanation: CISC is a computer
architecture where in the processor Answer: c
performs more complex operations in Explanation: A branch delay slot is an
one step. instruction space immediately following
a jump or branch.
6. Both the CISC and RISC architectures and the instructions take over a cycle to
have been developed to reduce the complete.
4. The page table should be ideally 8. Whenever a request to the page that
situated within is not present in the main memory is
a) Processor accessed is triggered.
b) TLB a) Interrupt
c) MMU b) Request
d) Cache
c) Page fault 2. The word length in the 68000
d) None of the mentioned computer is
a) 32 bit
Answer: c b) 64 bit
Explanation: When a page fault is c) 16 bit
triggered, the os brings the required d) 8 bit
page into memory.
Answer: c
9. The general purpose registers are Explanation: The length of an
combined into a block called as instruction that can be read or accessed
a) Register bank at a time is referred to as word length.
b) Register Case
c) Register file 3. Is 68000 computer Byte addressable?
d) None of the mentioned a) True
b) False
Answer: c
Explanation: To make the access of the Answer: a
registers easier, we classify them into Explanation: The ability of a system to
register files. access the entire data of a process by
reading consecutive bytes is called as
10. What does the RUN signal do? Byte addressability
a) It causes the termination of a signal
b) It causes a particular signal to 4. The register in 68000 can contain up
perform its operation to bits.
c) It causes a particular signal to end a) 24
d) It increments the step counter by one b) 32
c) 16
Answer: d d) 64
Explanation: The RUN signal increments
the step counter by one for each clock Answer: b
cycle. Explanation: None.
Answer: d Answer: d
Explanation: These flags are basically Explanation: None.
used to check the system for exceptions.
14. The instruction JG loop does
10. The register used to serve as PC is a) jumps to the memory location loop if
called as the result of the most recent arithmetic
a) Indirection register op is even
b) Instruction pointer b) jumps to the memory location loop if
c) R-32 the result of the most recent arithmetic
d) None of the mentioned op is greater than 0
c) jumps to the memory location loop if
Answer: b the test condition is satisfied with the
Explanation: The PC is used to store the value of loop
next instruction that is going to be d) none of the mentioned
executed.
Answer: b
11. The IA-32 processor can switch Explanation: This instruction is used to
between 16 bit operation and 32 bit cause a branch based on the outcome of
operation with the help of instruction the arithmetic operation.
prefix bit.
a) True 15. The LEA mnemonic is used to
b) False
a) Load the effective address of an
Answer: a instruction
Explanation: This switching enables a b) Load the values of operands onto an
wide range of operations to be accumulator
performed. c) Declare the values as global constants
d) Store the outcome of the operation at
12. The Bit extension of the register is a memory location
denoted with the help of
symbol. Answer: a
a) $ Explanation: The effective address is
b) ` the address of the memory location
c) E required for the execution of the
d) ~ instruction.
5. The instruction used to cause
1. The instructions of IA-32 machines are unconditional jump is
of length up to a) UJG
a) 4 bytes b) JG
b) 8 bytes c) JMP
c) 16 bytes d) GOTO
d) 12 bytes
Answer: c
Answer: d Explanation: This statement causes a
Explanation: The size of instruction jump from one instruction to another
that can be executed at once. without the condition.
Answer: a
UNIT IV PARALLELISIM Explanation: Data hazards are generally
caused when the data is not ready on
1. Any condition that causes a processor the destination side.
to stall is called as
a) Hazard 5. The stalling of the processor due to
b) Page fault the unavailability of the instructions is
c) System error called as
d) None of the mentioned a) Control hazard
b) structural hazard
Answer: a c) Input hazard
Explanation: An hazard causes a delay d) None of the mentioned
in the execution process of the
processor. Answer: a
Explanation: The control hazard also
2. The periods of time when the unit is called as instruction hazard is usually
idle is called as caused by a cache miss.
a) Stalls
b) Bubbles 6. The time lost due to the branch
c) Hazards instruction is often referred to as
d) Both Stalls and Bubbles
a) Latency
Answer: d b) Delay
Explanation: The stalls are a type of c) Branch penalty
hazards that affect a pipe-lined system. d) None of the mentioned
3. The contention for the usage of a Answer: c
hardware device is called Explanation: This time also retards the
a) Structural hazard performance speed of the processor.
b) Stalk
c) Deadlock 7. The pipeline bubbling is a method
d) None of the mentioned used to prevent data hazard and
structural hazards.
Answer: a a) True
Explanation: The processor contends b) False
for the usage of the hardware and might
enter into a deadlock state. Answer: a
Explanation: The periods of time when
4. The situation wherein the data of the unit is idle is called a Bubble.
operands are not available is called
8. method is used in 1. The set of loosely connected
centralized systems to perform out of computers are called as
order execution. a) LAN
a) Scorecard b) WAN
b) Score boarding c) Workstation
c) Optimizing d) Cluster
d) Redundancy
Answer: d
Answer: b Explanation: In a computer cluster all
Explanation: In a scoreboard, the data the participating computers work
dependencies of every instruction are together on a particular task.
logged. Instructions are released only
when the scoreboard determines that 2. Each computer in a cluster is
there are no conflicts with previously connected using
issued and incomplete instructions. a) UTP
b) Rj-45
9. The algorithm followed in most of the c) STP
systems to perform out of order d) Coaxial cable
execution is
a) Tomasulo algorithm Answer: b
b) Score carding Explanation: The computers are
c) Reader-writer algorithm connected to each other using a LAN
d) None of the mentioned connector cable.
Answer: a Answer: a
Explanation: This approach the work Explanation: None.
gets divided among the systems equally.
8. The cells in each column are 12. Circuits that can hold their state as
connected to long as power is applied is
a) Word line a) Dynamic memory
b) Data line b) Static memory
c) Read line c) Register
d) Sense/ Write line d) Cache
Answer: d Answer: b
Explanation: The cells in each column Explanation: None.
are connected to the sense/write circuit
using two bit lines and which is in turn 13. The number of external connections
connected to the data lines. required in 16 X 8 memory organisation
is
9. The word line is driven by the a) 14
a) Chip select b) 19
b) Address decoder c) 15
c) Data line d) 12
d) Control line
Answer: a
Answer: b Explanation: In the 14, 8-data lines,4-
Explanation: None. address lines and 2 are sense/write and
CS signals.
10. A 16 X 8 Organisation of memory
cells, can store upto 14. The advantage of CMOS SRAM over
a) 256 bits the transistor one’s is
b) 1024 bits a) Low cost
c) 512 bits b) High efficiency
d) 128 bits c) High durability
d) Low power consumption
Answer: d
Explanation: It can store upto 128 bits Answer: d
as each cell can hold one bit of data. Explanation: This is because the cell
consumes power only when it is being
11. A memory organisation that can hold accessed.
upto 1024 bits and has a minimum of 10
address lines can be organized into
15. In a 4M-bit chip organisation has a Answer: b
total of 19 external connections.then it Explanation: Since capacitors are used
has address if 8 data lines are the charge dissipates over time.
there.
a) 10 4. The capacitors lose the charge over
b) 8 time due to
c) 9 a) The leakage resistance of the
d) 12 capacitor
b) The small current in the transistor
Answer: c after being turned on
Explanation: To have 8 data lines and c) The defect of the capacitor
19 external connections it has to have 9 d) None of the mentioned
address lines(i.e 512 x 8 organisation).
Answer: a
Explanation: The capacitor loses charge
1. The Reason for the disregarding of the due to the backward current of the
SRAM’s is transistor and due to the small
a) Low Efficiency resistance.
b) High power consumption
c) High Cost 5. circuit is used to restore
d) All of the mentioned the capacitor value.
a) Sense amplify
Answer: c b) Signal amplifier
Explanation: The reason for the high c) Delta modulator
cost of the SRAM is because of the usage d) None of the mentioned
of more number of transistors.
Answer: a
2. The disadvantage of DRAM over SRAM Explanation: The sense amplifier
is/are detects if the value is above or below
a) Lower data storage capacities the threshold and then restores it.
b) Higher heat dissipation
c) The cells are not static 6. To reduce the number of external
d) All of the mentioned connections required, we make use of
Answer: c a) De-multiplexer
Explanation: This means that the cells b) Multiplexer
won’t hold their state indefinitely. c) Encoder
d) Decoder
3. The reason for the cells to lose their
state over time is Answer: b
a) The lower voltage levels Explanation: We multiplex the various
b) Usage of capacitors to store the address lines onto fewer pins.
charge
c) Use of Shift registers 7. The processor must take into account
d) None of the mentioned the delay in accessing the memory
location, such memories are called
1. The difference between DRAM’s and
a) Delay integrated SDRAM’s is/are
b) Asynchronous memories a) The DRAM’s will not use the master
c) Synchronous memories slave relationship in data transfer
d) Isochronous memories b) The SDRAM’s make use of clock
c) The SDRAM’s are more power efficient
Answer: b d) None of the mentioned
Explanation: None.
Answer: d
8. To get the row address of the required Explanation: The SDRAM’s make use of
data is enabled. clock signals to synchronize their
a) CAS operation.
b) RAS
c) CS 2. The difference in the address and
d) Sense/write data connection between DRAM’s and
SDRAM’s is
Answer: b a) The usage of more number of pins in
Explanation: This makes the contents of SDRAM’s
the row required refreshed. b) The requirement of more address
lines in SDRAM’s
9. In order to read multiple bytes of a c) The usage of a buffer in SDRAM’s
row at the same time, we make use of d) None of the mentioned
a) Latch Answer: c
b) Shift register Explanation: The SDRAM uses buffered
c) Cache storage of address and data.
d) Memory extension
3. A is used to restore the
Answer: a contents of the cells.
Explanation: The latch makes it easy to a) Sense amplifier
ready multiple bytes of data of the same b) Refresh counter
row simultaneously by just giving the c) Restorer
consecutive column address. d) None of the mentioned
10. The block transfer capability of the Answer: b
DRAM is called Explanation: The Counter helps to
a) Burst mode restore the charge on the capacitor.
b) Block mode
c) Fast page mode 4. The mode register is used to
d) Fast frame mode a) Select the row or column data
transfer mode
Answer: c b) Select the mode of operation
Explanation: None. c) Select mode of storing the data
d) All of the mentioned
Answer: b triggered.
Explanation: The mode register is used
to choose between burst mode or bit 9. DDR SDRAM’s perform faster data
mode of operation. transfer by
a) Integrating the hardware
5. In a SDRAM each row is refreshed b) Transferring on both edges
every 64ms. c) Improving the clock speeds
a) True d) Increasing the bandwidth
b) False
Answer: b
Answer: a Explanation: By transferring data on
Explanation: None. both the edges the bandwidth is
effectively doubled.
6. The time taken to transfer a word of
data to or from the memory is called as 10. To improve the data retrieval rate
Answer: c Answer: a
Explanation: The performance of the Explanation: The division of memory
memory is measured by means of into two banks makes it easy to access
latency. two different words at each edge of the
clock.
7. In SDRAM’s buffers are used to store
data that is read or written.
a) True 1. The chip can be disabled or cut off
b) False from an external connection using
5. The higher order bits of the address 9. Consider a memory organised into 8K
are used to rows, and that it takes 4 cycles to
a) Specify the row address complete a read operation. Then the
b) Specify the column address refresh overhead of the chip is
c) Input the CS a) 0.0021
d) None of the mentioned b) 0.0038
c) 0.0064
Answer: a d) 0.0128
Explanation: None.
Answer: b
6. The address lines multiplexing is done Explanation: The refresh overhead is
using calculated by taking into account the
a) MMU
total time for refreshing and the interval reduced from the Vsupply about 2v.
of each refresh.
4. The data is transferred over the
10. When DRAM’s are used to build a RAMBUS as
complex large memory, then the a) Packets
controller only provides the refresh b) Blocks
counter. c) Swing voltages
a) True d) Bits
b) False
Answer: c
Answer: a Explanation: By using voltage swings to
Explanation: None. transfer data, the transfer rate along
with efficiency is improved.
1. RAMBUS is better than the other 5. The type of signaling used in RAMBUS
memory chips in terms of is
a) Efficiency a) CLK signaling
b) Speed of operation b) Differential signaling
c) Wider bandwidth c) Integral signaling
d) All of the mentioned d) None of the mentioned
Answer: b Answer: b
Explanation: The RAMBUS is much Explanation: The differential signaling
advanced mode of memory storage. basically means using voltage swings to
transmit data.
2. The key feature of the RAMBUS tech is
6. The special communication used in
a) Greater memory utilisation RAMBUS are
b) Efficiency a) RAMBUS channel
c) Speed of transfer b) D-link
d) None of the mentioned c) Dial-up
d) None of the mentioned
Answer: c
Explanation: The RAMBUS was Answer: a
developed basically to lessen the data Explanation: The special
transfer time. communication link is used to provide
the necessary design and required
3. The increase in operation speed is hardware for the transmission.
done by
a) Reducing the reference voltage 7. The original design of the RAMBUS
b) Increasing the clk frequency required for data lines.
c) Using enhanced hardware a) 4
d) None of the mentioned b) 6
c) 8
Answer: a d) 9
Explanation: The reference voltage is
Answer: d transistor is closed then, the value of
Explanation: Out of the 9 data lines, 8 zero is stored in the ROM.
were used for data transmission and the
one left was used for parity checking. 2. PROM stands for
a) Programmable Read Only Memory
8. The RAMBUS requires specially b) Pre-fed Read Only Memory
designed memory chips similar to c) Pre-required Read Only Memory
a) SRAM d) Programmed Read Only Memory
b) SDRAM
c) DRAM Answer: a
d) DDRRAM Explanation: It allows the user to
program the ROM.
Answer: c
Explanation: The special memory chip 3. The PROM is more effective than ROM
should be able to transmit data on both chips in regard to
the edges and is called as RDRAM’s. a) Cost
b) Memory management
9. A RAMBUS which has 18 data lines is c) Speed of operation
called as d) Both Cost and Speed of operation
a) Extended RAMBUS
b) Direct RAMBUS Answer: d
c) Multiple RAMBUS Explanation: The PROM is cheaper than
d) Indirect RAMBUS ROM as they can be programmed
manually.
Answer: b
Explanation: The direct RAMBUS is used 4. The difference between the EPROM
to transmit 2 bytes of data at a time. and ROM circuitry is
a) The usage of MOSFET’s over
10. The RDRAM chips assembled into transistors
larger memory modules called b) The usage of JFET’s over transistors
a) RRIM c) The usage of an extra transistor
b) DIMM d) None of the mentioned
c) SIMM
d) All of the mentioned Answer: c
Explanation: The EPROM uses an extra
Answer: a transistor where the ground connection
Explanation: None. is there in the ROM chip.
Answer: d Answer: a
Explanation: None. Explanation: This is not permitted as
the previous contents of the cells will be
8. EEPROM stands for Electrically overwritten.
Erasable Programmable Read Only
Memory. 12. The flash memories find application
a) True in
b) False a) Super computers
b) Mainframe systems
Answer: a c) Distributed systems
Explanation: The disadvantages of the d) Portable devices
EPROM led to the development of the
EEPROM. Answer: d
Explanation: The flash memories low
9. The disadvantage of the EEPROM power requirement enables them to be
is/are used in a wide range of hand held
a) The requirement of different voltages devices.
to read, write and store information
b) The Latency read operation 13. The memory module obtained by
c) The inefficient memory mapping placing a number of flash chips for
higher memory storage called as Answer: b
Explanation: As they require a large
a) FIMM number of transistors, their cost per bit
b) SIMM increases.
c) Flash card
d) RIMM 2. The drawback of building a large
memory with DRAM is
Answer: c a) The large cost factor
Explanation: None. b) The inefficient memory organisation
c) The Slow speed of operation
14. The flash memory modules designed d) All of the mentioned
to replace the functioning of a hard disk
is Answer: c
a) RIMM Explanation: The DRAM’s were used for
b) Flash drives large memory modules for a long time
c) FIMM until a substitute was found.
d) DIMM
3. To overcome the slow operating
Answer: b speeds of the secondary memory we
Explanation: The flash drives have been make use of faster flash drives.
developed to provide faster operation a) True
but with lesser space. b) False
7. The next level of memory hierarchy 1. The reason for the implementation of
after the L2 cache is the cache memory is
a) Secondary storage a) To increase the internal memory of
b) TLB the system
c) Main memory b) The difference in speeds of operation
d) Register of the processor and memory
c) To reduce the memory access and
Answer: d cycle time
Explanation: None. d) All of the mentioned
4. The spatial aspect of the locality of a) To write onto the memory directly
reference means b) To write and read from memory
a) That the recently executed simultaneously
instruction is executed again next c) To write directly on the memory and
b) That the recently executed won’t be the cache simultaneously
executed again d) None of the mentioned
c) That the instruction executed will be
executed at a later time Answer: c
d) That the instruction in close proximity Explanation: When write operation is
of the instruction executed will be issued then the corresponding operation
executed in future is performed.
Answer: a
1. The main memory is structured into Explanation: The hit rate is an
modules each with its own address important factor in performance
register called measurement.
a) ABR
b) TLB 5. The number failed attempts to access
c) PC memory, stated in the form of a fraction
d) IR is called as
a) Hit rate
Answer: a b) Miss rate
Explanation: ABR stands for Address c) Failure rate
Buffer Register. d) Delay rate
Answer: b Answer: a
Explanation: Miss usually occurs when Explanation: The extra time needed to
the memory block required is not bring the data into memory in case of a
present in the cache. miss is called as miss penalty.
9. The extra time needed to bring the a) After the instruction decoding
data into memory in case of a miss is b) After the IR instruction gets executed
called as c) After the fetch cycle
a) Delay d) None of the mentioned
b) Propagation time
c) Miss penalty Answer: c
d) None of the mentioned Explanation: The PC always points to
the next instruction to be executed.
Answer: c
Explanation: None. 4. Which register in the processor is
single directional?
10. The miss penalty can be reduced by a) MAR
improving the mechanisms for data b) MDR
transfer between the different levels of c) PC
hierarchy. d) Temp
Answer: a Answer: d
Explanation: The MAR is single Explanation: None.
directional as it just takes the address
from the processor bus and passes it to 9. When two or more clock cycles are
the external bus. used to complete data transfer it is
called as
5. The transparent register/s is/are a) Single phase clocking
b) Multi-phase clocking
a) Y c) Edge triggered clocking
b) Z d) None of the mentioned
c) Temp
d) All of the mentioned Answer: b
Explanation: This is basically used in
Answer: d systems without edge-triggered flip
Explanation: These registers are usually flops.
used to store temporary values.
10. signal is used to show
6. Which register is connected to the complete of memory operation.
MUX? a) MFC
a) Y b) WMFC
b) Z c) CFC
c) R0 d) None of the mentioned
d) Temp
Answer: a
Answer: a Explanation: MFC stands for Memory
Explanation: The MUX can either read Function Complete.
the operand from the Y register or
increment the PC.
1. Is the below code segment correct,
7. The registers, ALU and the for the addition of two numbers?
interconnecting path together are called
as R1in, Yin
a) Control path R2out, Select Y, ADD, Zin
b) Flow path
c) Data path Zout, R3in
d) None of the mentioned
a) True
Answer: c b) False
Explanation: None.
Answer: a
8. The input and output of the registers Explanation: This is the gate transfer
are governed by notation, which indicates the usage of
a) Transistors switches to control the flow of data.
b) Diodes
c) Gates 2. The completion of the memory
d) Switches operation is indicated using
signal. 6. To extend the connectivity of the
a) MFC processor bus we use
b) WMFC a) PCI bus
c) CFC b) SCSI bus
d) None of the mentioned c) Controllers
d) Multiple bus
Answer: a
Explanation: MFC stands for Memory Answer: a
Function Complete. Explanation: The PCI BUS basically is
used to connect to memory devices.
3. signal enables the
processor to wait for the memory 7. The bus used to connect the monitor
operation to complete. to the CPU is
a) MFC a) PCI bus
b) TLB b) SCSI bus
c) WMFC c) Memory bus
d) ALB d) Rambus
Answer: c Answer: b
Explanation: This signal stands for Wait Explanation: The SCSI (Small
For Memory Function Complete. Component System Interconnect) is used
to connect to display devices.
4. The small extremely fast, RAM’s all
called as 8. The ISA standard Buses are used to
a) Cache connect
b) Heaps a) RAM and processor
c) Accumulators b) GPU and processor
d) Stacks c) Harddisk and Processor
d) CD/DVD drives and Processor
Answer: b
Explanation: Cache’s are extremely Answer: c
essential in single BUS organisation to Explanation: None.
achieve fast operation.
9. ANSI stands for
5. The main virtue for using single Bus a) American National Standards Institute
structure is b) American National Standard Interface
a) Fast data transfers c) American Network Standard
b) Cost effective connectivity and speed Interfacing
c) Cost effective connectivity and ease d) American Network Security Interrupt
of attaching peripheral devices
d) None of the mentioned Answer: a
Explanation: It is one of the standards
Answer: c of developing a BUS.
Explanation: None.
10. IBM developed a bus standard for
their line of computers ‘PC AT’ called
4. For a 3 BUS architecture, is the below
a) IB bus code correct for adding three numbers?
b) M-bus
c) ISA PCout, R = B, Marin, READ, Inc PC
d) None of the mentioned WMFC
a) True
1. The general purpose registers are
b) False
combined into a block called as
a) Register bank Answer: a
b) Register Case Explanation: We have assumed the
c) Register file names of the three BUSes have A, B and
d) None of the mentioned C.
Answer: c 5. The main advantage of multiple bus
Explanation: To make the access of the organisation over a single bus is
registers easier, we classify them into
register files. a) Reduction in the number of cycles for
execution
2. In technology, the
b) Increase in size of the registers
implementation of the register file is by
c) Better Connectivity
using an array of memory locations.
d) None of the mentioned
a) VLSI
b) ANSI Answer: a
c) ISA Explanation: None.
d) ASCI
6. CISC stands for
Answer: a a) Complete Instruction Sequential
Explanation: By doing so the access of Compilation
the registers can be made faster. b) Computer Integrated Sequential
Compiler
3. In a three BUS architecture, how
c) Complex Instruction Set Computer
many input and output ports are there?
d) Complex Instruction Sequential
a) 2 output and 2 input
Compilation
b) 1 output and 2 input
c) 2 output and 1 input Answer: c
d) 1 output and 1 input Explanation: The CISC machines are
well adept at handling multiple BUS
Answer: c
organisation.
Explanation: That is enabling reading
from two locations and writing into one. 7. If the instruction Add R1, R2, R3 is
executed in a system which is pipelined,
then the value of S is (Where S is term of
the Basic performance equation). 1. are the different type/s of
a) 3 generating control signals.
b) ~2 a) Micro-programmed
c) ~1 b) Hardwired
d) 6 c) Micro-instruction
d) Both Micro-programmed and
Answer: c Hardwired
Explanation: The value will be much
lower in case of multiple BUS Answer: d
organisation. Explanation: The above is used to
generate control signals in different
8. In multiple BUS organisation types of system architectures.
is used to select any of the
BUSes for input into ALU. 2. The type of control signal is
a) MUX generated based on
b) DE-MUX a) contents of the step counter
c) En-CDS b) Contents of IR
d) None of the mentioned c) Contents of condition flags
d) All of the mentioned
Answer: a
Explanation: The MUX can be used to Answer: d
either select the BUS or to increment Explanation: Based on the information
the PC. above the type of control signal is
decided.
9. There exists a separate block
consisting of various units to decode an 3. What does the hardwired control
instruction. generator consist of?
a) True a) Decoder/encoder
b) False b) Condition codes
c) Control step counter
Answer: a d) All of the mentioned
Explanation: This block is used to
decode the instruction and place it in Answer: d
the IR. Explanation: The CU uses the above
blocks and IR to produce the necessary
10. There exists a separate block to signal.
increment the PC in multiple BUS
organisation. 4. What does the end instruction do?
a) True a) It ends the generation of a signal
b) False b) It ends the complete generation
process
Answer: a c) It starts a new instruction fetch cycle
Explanation: None. and resets the counter
d) It is used to shift the control to the
processor
Answer: c 9. The disadvantage/s of the hardwired
Explanation: It is basically used to start approach is
the generation of a new signal. a) It is less flexible
b) It cannot be used for complex
5. The Zin signal to the processor is instructions
generated using, Zin = T1+T6 ADD + c) It is costly
T4.BR… d) less flexible & cannot be used for
a) True complex instructions
b) False
Answer: d
Answer: a Explanation: The more complex the
Explanation: The signal is generated instruction set less applicable to a
using the logic of the formula above. hardwired approach.
6. What does the RUN signal do? 10. The End signal is generated using,
a) It causes the termination of a signal End = T7.ADD + T5.BR + (T5.N+ T4.-
b) It causes a particular signal to N).BRN…
perform its operation a) True
c) It causes a particular signal to end b) False
d) It increments the step counter by one
Answer: a
Answer: d Explanation: None.
Explanation: The RUN signal increments
the step counter by one for each clock
cycle. 1. In micro-programmed approach, the
signals are generated by
7. The name hardwired came because a) Machine instructions
the sequence of operations carried out is b) System programs
determined by the wiring. c) Utility tools
a) True d) None of the mentioned
b) False
Answer: a
Answer: a Explanation: The machine instructions
Explanation: In other words hardwired generate the signals.
is another name for Hardware Control
signal generator. 2. A word whose individual bits
represent a control signal is
8. The benefit of using this approach is a) Command word
b) Control word
a) It is cost effective c) Co-ordination word
b) It is highly efficient d) Generation word
c) It is very reliable
d) It increases the speed of operation Answer: b
Explanation: The control word is used
Answer: d to get the different types of control
Explanation: None. signals required.
3. A sequence of control words 7. Every time a new instruction is loaded
corresponding to a control sequence is into IR the output of is loaded
called into UPC.
a) Micro routine a) Starting address generator
b) Micro function b) Loader
c) Micro procedure c) Linker
d) None of the mentioned d) Clock
Answer: a Answer: a
Explanation: The micro routines are Explanation: The starting address
used to perform a particular task. generator is used to load the address of
the next micro instruction.
4. Individual control words of the micro
routine are called as 8. The case/s where micro-programmed
a) Micro task can perform well
b) Micro operation a) When it requires to check the
c) Micro instruction condition codes
d) Micro command b) When it has to choose between the
two alternatives
Answer: c c) When it is triggered by an interrupt
Explanation: The each instruction d) None of the mentioned
which put together performs the task.
Answer: d
5. The special memory used to store the Explanation: None.
micro routines of a computer is
9. The signals are grouped such that
a) Control table mutually exclusive signals are put
b) Control store together.
c) Control mart a) True
d) Control shop b) False
Answer: b Answer: a
Explanation: The control store is used Explanation: This is done to improve
as a reference to get the required the efficiency of the controller.
control routine.
10. Highly encoded schemes that use
6. To read the control words sequentially compact codes to specify a small
is used. number of functions in each micro
a) PC instruction is
b) IR a) Horizontal organisation
c) UPC b) Vertical organisation
d) None of the mentioned c) Diagonal organisation
d) None of the mentioned
Answer: c
Explanation: The UPC stands for Micro Answer: b
program counter. Explanation: None.
5. In associative mapping during LRU,
1. The directly mapped cache no the counter of the new block is set to
replacement algorithm is required. ‘0’ and all the others are incremented
a) True by one when occurs.
b) False a) Delay
b) Miss
Answer: a c) Hit
Explanation: The position of each block d) Delayed hit
is pre-determined in the direct mapped
cache, hence no need for replacement. Answer: b
Explanation: Miss usually occurs when
2. The surroundings of the recently the memory block required is not
accessed block is called as present in the cache.
a) Neighborhood
b) Neighbour 6. The LRU provides very bad
c) Locality of reference performance when it comes to
d) None of the mentioned
a) Blocks being accessed is sequential
Answer: c b) When the blocks are randomised
Explanation: The locality of reference c) When the consecutive blocks accessed
is a key factor in many of the are in the extremes
replacement algorithms. d) None of the mentioned
3. In set associative and associative Answer: a
mapping there exists less flexibility. Explanation: The LRU in case of the
a) True sequential blocks as to waste its one
b) False cycle just incrementing the counters.
Answer: a Answer: a
Explanation: The MMU translates the Explanation: TLB stands for Translation
logical address into a physical address by Look-aside Buffer.
adding an offset.
7. The main aim of virtual memory 1. The main reason for the
organisation is discontinuation of semi conductor based
a) To provide effective memory access storage devices for providing large
b) To provide better memory transfer storage space is
c) To improve the execution of the a) Lack of sufficient resources
b) High cost per bit value
c) Lack of speed of operation 5. The drawback of Manchester encoding
d) None of the mentioned is
a) The cost of the encoding scheme
Answer: b b) The speed of encoding the data
Explanation: In the case of semi c) The Latency offered
conductor based memory technology, we d) The low bit storage density provided
get speed but the increase in the
integration of various devices the cost is Answer: d
high. Explanation: The space required to
represent each bit must be large enough
2. The digital information is stored on to accommodate two changes in
the hard disk by magnetization.
a) Applying a suitable electric pulse
b) Applying a suitable magnetic field 6. The read/write heads must be near to
c) Applying a suitable nuclear field disk surfaces for better storage.
d) By using optic waves a) True
b) False
Answer: a
Explanation: The digital data is sorted Answer: a
on the magnetized discs by magnetizing Explanation: By maintaining the heads
the areas. near to the surface greater bit densities
can be achieved.
3. For the synchronization of the read
head, we make use of a 7. pushes the heads away from
a) Framing bit the surface as they rotate at their
b) Synchronization bit standard rates.
c) Clock a) Magnetic tension
d) Dirty bit b) Electric force
c) Air pressure
Answer: c d) None of the mentioned
Explanation: The clock makes it easy to
distinguish between different values red Answer: c
by a head. Explanation: Due to the speed of
rotation of the discs air pressure
4. One of the most widely used schemes develops in the hard disk.
of encoding used is
a) NRZ-polar 8. The air pressure can be countered by
b) RZ-polar putting in the head-disc surface
c) Manchester arrangement.
d) Block encoding a) Air filter
b) Spring mechanism
Answer: c c) coolant
Explanation: The Manchester encoding d) None of the mentioned
used is also called as phase encoding and
it is used to encode both clock and data. Answer: b
Explanation: The spring mechanism
pushes the head along the surface to b) Cylinder
reduce the air pressure effect. c) Group
d) Set
9. The method of placing the heads and
the discs in an air tight environment is Answer: b
also called as Explanation: The data is stored in these
a) RAID Arrays sections called as cylinders.
b) ATP tech
c) Winchester technology 3. The data can be accessed from the
d) Fleming reduction disk using
a) Surface number
Answer: c b) Sector number
Explanation: The Disks and the heads c) Track number
operate faster due to the absence of the d) All of the mentioned
dust particles.
Answer: d
10. A hard disk with 20 surfaces will Explanation: None.
have heads.
a) 10 4. The read and write operations usually
b) 5 start at of the sector.
c) 1 a) Center
d) 20 b) Middle
c) From the last used point
Answer: d d) Boundaries
Explanation: Each surface will have its
own head to perform read/write Answer: d
operation. Explanation: The heads read and write
data from the ends to the center.
Answer: b
Explanation: None.