Quiznetik

Computer Architecture | Set 7

1. The virtual memory basically stores the next segment of data to be executed on the

Correct : A. secondary storage

2. The associatively mapped virtual memory makes use of

Correct : A. tlb

3. The main reason for the discontinuation of semi conductor based storage devices for providing large storage space is

Correct : B. high cost per bit value

4. The digital information is stored on the hard disk by

Correct : A. applying a suitable electric pulse

5. For the synchronization of the read head, we make use of a

Correct : C. clock

6. One of the most widely used schemes of encoding used is

Correct : C. manchester

7. The drawback of Manchester encoding is

Correct : D. the low bit storage density provided

8. The read/write heads must be near to disk surfaces for better storage.

Correct : A. true

9. pushes the heads away from the surface as they rotate at their standard rates.

Correct : C. air pressure

10. The air pressure can be countered by putting               in the head-disc surface arrangement.

Correct : B. spring mechanism

11. The method of placing the heads and the discs in an air tight environment is also called as

Correct : C. winchester technology

12. A hard disk with 20 surfaces will have            heads.

Correct : D. 20

13. The set of corresponding tracks on all surfaces of a stack of disks form a

Correct : B. cylinder

14. The data can be accessed from the disk using

Correct : D. all of the mentioned

15. The read and write operations usually start at               of the sector.

Correct : D. boundaries

16. To distinguish between two sectors we make use of

Correct : A. inter sector gap

17. The            process divides the disk into sectors and tracks.

Correct : C. formatting

18. The access time is composed of

Correct : D. both seek time and rotational delay

19. The disk drive is connected to the system by using the

Correct : B. scsi bus

20. is used to deal with the difference in the transfer rates between the drive and the bus.

Correct : C. data buffers

21. is used to detect and correct the errors that may occur during data transfers.

Correct : A. ecc

22. ______ has been developed specifically for pipelined systems.

Correct : C. Optimizing compilers

23. The fetch and execution cycles are interleaved with the help of ________

Correct : B. Clock

24. Each stage in pipelining should be completed within ____ cycle.

Correct : A. 1

25. To increase the speed of memory access in pipelining, we make use of _______

Correct : C. Cache

26. The situation wherein the data of operands are not available is called ______

Correct : A. Data hazard

27. The time lost due to the branch instruction is often referred to as _____

Correct : C. Branch penalty

28. The algorithm followed in most of the systems to perform out of order execution is ______

Correct : A. Tomasulo algorithm

29. The logic operations are implemented using _______ circuits.

Correct : C. Combinatorial

30. The carry generation function: ci + 1 = yici + xici + xiyi, is implemented in ____________

Correct : B. Full adders

31. Which option is true regarding the carry in the ripple adders?

Correct : B. Must travel through the configuration

32. In full adders the sum circuit is implemented using ________

Correct : C. XOR

33. The usual implementation of the carry circuit involves _________

Correct : B. XOR

34. The advantage of I/O mapped devices to memory mapped is ___________

Correct : C. The devices have to deal with fewer address lines

35. The system is notified of a read or write operation by ___________

Correct : D. Sending a special signal along the BUS

36. To overcome the lag in the operating speeds of the I/O device and the processor we use ___________

Correct : B. Status flags

37. The method which offers higher speeds of I/O transfers is ___________

Correct : D. DMA

38. The instruction, Add #45, R1 does _______

Correct : B. Adds 45 to the value of R1 and stores it in R1

39. In the case of, Zero-address instruction method the operands are stored in _____

Correct : C. Push down stack

40. The addressing mode which makes use of in-direction pointers is ______

Correct : A. Indirect addressing mode

41. The addressing mode/s, which uses the PC instead of a general purpose register is ______

Correct : B. Relative

42. _____ addressing mode is most suitable to change the normal sequence of execution of instructions.

Correct : A. Relative

43. The reason for the implementation of the cache memory is ________

Correct : B. The difference in speeds of operation of the processor and memory

44. The effectiveness of the cache memory is based on the property of ________

Correct : A. Locality of reference

45. The spatial aspect of the locality of reference means ________

Correct : D. That the instruction in close proximity of the instruction executed will be executed in future

46. The correspondence between the main memory blocks and those in the cache is given by _________

Correct : B. Mapping function

47. The copy-back protocol is used ________

Correct : B. To update the contents of the memory from the cache

48. The address space is 22 bits the memory is 32 bit word addressable what is the memory size

Correct : A. 16MB

49. In which cycle the memory is read and the contents of memory at the address containedin the PC register are loaded into in to IR.

Correct : C. Fetch Cycle

50. The part of machine level instruction, which tells the central processor what has to be done, is

Correct : A. Operation code

51. A system program that combines the separately compiled modules of a program into a form suitable for execution

Correct : B. linking loader

52. Which parameter of computer determines its power to do various operations on data items

Correct : A. Instruction set

53. The multiplier is stored in

Correct : B. Shift Register

54. Which methods of representation of numbers occupies large amount of memory than others?

Correct : A. sign-magnitude

55. The register used to store the flags is called as

Correct : B. Status register

56. __________is used to implement virtual memory organization.

Correct : C. MMU

57. _________ method is used to establish priority by serially connecting all devices that request an interrupt.

Correct : B. Daisy chain