Quiznetik
Computer Architecture | Set 7
1. The virtual memory basically stores the next segment of data to be executed on the
A. secondary storage
B. disks
C. ram
D. rom
Correct : A. secondary storage
2. The associatively mapped virtual memory makes use of
A. tlb
B. page table
C. frame table
D. none of the mentioned
Correct : A. tlb
3. The main reason for the discontinuation of semi conductor based storage devices for providing large storage space is
A. lack of sufficient resources
B. high cost per bit value
C. lack of speed of operation
D. none of the mentioned
Correct : B. high cost per bit value
4. The digital information is stored on the hard disk by
A. applying a suitable electric pulse
B. applying a suitable magnetic field
C. applying a suitable nuclear field
D. by using optic waves
Correct : A. applying a suitable electric pulse
5. For the synchronization of the read head, we make use of a
A. framing bit
B. synchronization bit
C. clock
D. dirty bit
Correct : C. clock
6. One of the most widely used schemes of encoding used is
A. nrz-polar
B. rz-polar
C. manchester
D. block encoding
Correct : C. manchester
7. The drawback of Manchester encoding is
A. the cost of the encoding scheme
B. the speed of encoding the data
C. the latency offered
D. the low bit storage density provided
Correct : D. the low bit storage density provided
8. The read/write heads must be near to disk surfaces for better storage.
A. true
B. false
Correct : A. true
9. pushes the heads away from the surface as they rotate at their standard rates.
A. magnetic tension
B. electric force
C. air pressure
D. none of the mentioned
Correct : C. air pressure
10. The air pressure can be countered by putting in the head-disc surface arrangement.
A. air filter
B. spring mechanism
C. coolant
D. none of the mentioned
Correct : B. spring mechanism
11. The method of placing the heads and the discs in an air tight environment is also called as
A. raid arrays
B. atp tech
C. winchester technology
D. fleming reduction
Correct : C. winchester technology
12. A hard disk with 20 surfaces will have heads.
A. 10
B. 5
C. 1
D. 20
Correct : D. 20
13. The set of corresponding tracks on all surfaces of a stack of disks form a
A. cluster
B. cylinder
C. group
D. set
Correct : B. cylinder
14. The data can be accessed from the disk using
A. surface number
B. sector number
C. track number
D. all of the mentioned
Correct : D. all of the mentioned
15. The read and write operations usually start at of the sector.
A. center
B. middle
C. from the last used point
D. boundaries
Correct : D. boundaries
16. To distinguish between two sectors we make use of
A. inter sector gap
B. splitting bit
C. numbering bit
D. none of the mentioned
Correct : A. inter sector gap
17. The process divides the disk into sectors and tracks.
A. creation
B. initiation
C. formatting
D. modification
Correct : C. formatting
18. The access time is composed of
A. seek time
B. rotational delay
C. latency
D. both seek time and rotational delay
Correct : D. both seek time and rotational delay
19. The disk drive is connected to the system by using the
A. pci bus
B. scsi bus
C. hdmi
D. isa
Correct : B. scsi bus
20. is used to deal with the difference in the transfer rates between the drive and the bus.
A. data repeaters
B. enhancers
C. data buffers
D. none of the mentioned
Correct : C. data buffers
21. is used to detect and correct the errors that may occur during data transfers.
A. ecc
B. crc
C. checksum
D. none of the mentioned
Correct : A. ecc
22. ______ has been developed specifically for pipelined systems.
A. Utility software
B. Speed up utilities
C. Optimizing compilers
D. None of the mentioned
Correct : C. Optimizing compilers
23. The fetch and execution cycles are interleaved with the help of ________
A. Modification in processor architecture
B. Clock
C. Special unit
D. Control unit
Correct : B. Clock
24. Each stage in pipelining should be completed within ____ cycle.
A. 1
B. 2
C. 3
D. 4
Correct : A. 1
25. To increase the speed of memory access in pipelining, we make use of _______
A. Special memory locations
B. Special purpose registers
C. Cache
D. Buffers
Correct : C. Cache
26. The situation wherein the data of operands are not available is called ______
A. Data hazard
B. Stock
C. Deadlock
D. Structural hazard
Correct : A. Data hazard
27. The time lost due to the branch instruction is often referred to as _____
A. Latency
B. Delay
C. Branch penalty
D. None of the mentioned
Correct : C. Branch penalty
28. The algorithm followed in most of the systems to perform out of order execution is ______
A. Tomasulo algorithm
B. Score carding
C. Reader-writer algorithm
D. None of the mentioned
Correct : A. Tomasulo algorithm
29. The logic operations are implemented using _______ circuits.
A. Bridge
B. Logical
C. Combinatorial
D. Gate
Correct : C. Combinatorial
30. The carry generation function: ci + 1 = yici + xici + xiyi, is implemented in ____________
A. Half adders
B. Full adders
C. Ripple adders
D. Fast adders
Correct : B. Full adders
31. Which option is true regarding the carry in the ripple adders?
A. Are generated at the beginning only
B. Must travel through the configuration
C. Is generated at the end of each operation
D. None of the mentioned
Correct : B. Must travel through the configuration
32. In full adders the sum circuit is implemented using ________
A. And & or gates
B. NAND gate
C. XOR
D. XNOR
Correct : C. XOR
33. The usual implementation of the carry circuit involves _________
A. And & or gates
B. XOR
C. NAND
D. XNOR
Correct : B. XOR
34. The advantage of I/O mapped devices to memory mapped is ___________
A. The former offers faster transfer of data
B. The devices connected using I/O mapping have a bigger buffer space
C. The devices have to deal with fewer address lines
D. No advantage as such
Correct : C. The devices have to deal with fewer address lines
35. The system is notified of a read or write operation by ___________
A. Appending an extra bit of the address
B. Enabling the read or write bits of the devices
C. Raising an appropriate interrupt signal
D. Sending a special signal along the BUS
Correct : D. Sending a special signal along the BUS
36. To overcome the lag in the operating speeds of the I/O device and the processor we use ___________
A. Buffer spaces
B. Status flags
C. Interrupt signals
D. Exceptions
Correct : B. Status flags
37. The method which offers higher speeds of I/O transfers is ___________
A. Interrupts
B. Memory mapping
C. Program-controlled I/O
D. DMA
Correct : D. DMA
38. The instruction, Add #45, R1 does _______
A. Adds the value of 45 to the address of R1 and stores 45 in that address
B. Adds 45 to the value of R1 and stores it in R1
C. Finds the memory location 45 and adds that content to that of R1
D. None of the mentioned
Correct : B. Adds 45 to the value of R1 and stores it in R1
39. In the case of, Zero-address instruction method the operands are stored in _____
A. Registers
B. Accumulators
C. Push down stack
D. Cache
Correct : C. Push down stack
40. The addressing mode which makes use of in-direction pointers is ______
A. Indirect addressing mode
B. Index addressing mode
C. Relative addressing mode
D. Offset addressing mode
Correct : A. Indirect addressing mode
41. The addressing mode/s, which uses the PC instead of a general purpose register is ______
A. Indexed with offset
B. Relative
C. direct
D. both Indexed with offset and direct
Correct : B. Relative
42. _____ addressing mode is most suitable to change the normal sequence of execution of instructions.
A. Relative
B. Indirect
C. Index with Offset
D. Immediate
Correct : A. Relative
43. The reason for the implementation of the cache memory is ________
A. To increase the internal memory of the system
B. The difference in speeds of operation of the processor and memory
C. To reduce the memory access and cycle time
D. All of the mentioned
Correct : B. The difference in speeds of operation of the processor and memory
44. The effectiveness of the cache memory is based on the property of ________
A. Locality of reference
B. Memory localisation
C. Memory size
D. None of the mentioned
Correct : A. Locality of reference
45. The spatial aspect of the locality of reference means ________
A. That the recently executed instruction is executed again next
B. That the recently executed won’t be executed again
C. That the instruction executed will be executed at a later time
D. That the instruction in close proximity of the instruction executed will be executed in future
Correct : D. That the instruction in close proximity of the instruction executed will be executed in future
46. The correspondence between the main memory blocks and those in the cache is given by _________
A. Hash function
B. Mapping function
C. Locale function
D. Assign function
Correct : B. Mapping function
47. The copy-back protocol is used ________
A. To copy the contents of the memory onto the cache
B. To update the contents of the memory from the cache
C. To remove the contents of the cache and push it on to the memory
D. None of the mentioned
Correct : B. To update the contents of the memory from the cache
48. The address space is 22 bits the memory is 32 bit word addressable what is the memory size
A. 16MB
B. 512KB
C. 4MB
D. 1GB
Correct : A. 16MB
49. In which cycle the memory is read and the contents of memory at the address containedin the PC register are loaded into in to IR.
A. Execution Cycle
B. Memory Cycle
C. Fetch Cycle
D. Decode Cycle
Correct : C. Fetch Cycle
50. The part of machine level instruction, which tells the central processor what has to be done, is
A. Operation code
B. Address
C. Locator
D. Flip-Flop
Correct : A. Operation code
51. A system program that combines the separately compiled modules of a program into a form suitable for execution
A. assembler
B. linking loader
C. cross compiler
D. load and go
Correct : B. linking loader
52. Which parameter of computer determines its power to do various operations on data items
A. Instruction set
B. Memory size
C. Assembly language
D. Application language
Correct : A. Instruction set
53. The multiplier is stored in
A. PC Register
B. Shift Register
C. Cache
D. None of the above
Correct : B. Shift Register
54. Which methods of representation of numbers occupies large amount of memory than others?
A. sign-magnitude
B. 1’s compliment
C. 2’s compliment
D. Both a and b
Correct : A. sign-magnitude
55. The register used to store the flags is called as
A. Flag register
B. Status register
C. Test register
D. log register
Correct : B. Status register
56. __________is used to implement virtual memory organization.
A. Page table
B. Frame table
C. MMU
D. None of the mentioned
Correct : C. MMU
57. _________ method is used to establish priority by serially connecting all devices that request an interrupt.
A. Vectored-interrupting
B. Daisy chain
C. Priority
D. Polling
Correct : B. Daisy chain