Jntu Online Examinations
Jntu Online Examinations
1. Assume we have a computer where the clock per instruction (cpi) is 1.0 when all memory
accesses hit in the cache. The only data accesses are loads and s tores and these total 50 % of the
instructions. If the miss penalty is 25 clock cycle and miss rate is 2 %,how much faster would the
computer be if all the ins tructions were cache hits.
a. 0. 25
b. 0.75
c. 1.5
d. 1.75
5. If the memory hierarchies of the two computers are identical, the cpu with _ _ _ _ _ _ _ _ clock
rate has a _ _ _ _ _ _ _ _ _ number of clock cycles per miss.
a. higher, smaller
b. higher, larger
c. lower, smaller
d. lowe r, larger
8. The _ _ _ _ _ _ _ the CPI execution, the _ _ _ _ _ _ _ the relative impact of the fixed no of cache
miss clock cycles.
a. lower,lower
b. higher,lower
c. lower, higher
d. higher, higher
9. CPU time = _ _ _ _ _ _ _ _
a. cpu execution clock cycles *(memory stall clock cycles+clock cycle time)
b. cpu execution clock cycles +memory stall clock cycles+clock cycle time
c. (cpu execution clock cycles +memory stall clock cycles)*clock cycle time
d. cpu execution clock cycles+ memory stall clock cycles*clock cycle time
11. What are the local and global miss rates of second level cache if in 1000 memory references there
are 40 misses in the first level cache and 20 misses in the second level cache
a. 50 % and 20 %
b. 2 % a nd 50 %
c. 50 % and 2 %
d. 20 % and 50 %
12. Depending on the program, a _ _ _ _ _ _ _ _ victim cache might remove one- quarter of the
misses in a 4KB direct mapped data cache
a. one entry
b. two entry
c. four entry
d. five entry
13. _ _ _ _ _ _ _ _ _ _ is the no of misses in cache divided by the total no of memory accesses to this
cache
a. local miss rate
b. global miss rate
c. local miss penalty
d. global miss penalty
14. Which miss penalty technique is based on the observation that the cpu normally needs just one
word of the block at a time
a. multilevel caches
b. critical word first and early restart
c. giving prio rity to read misses over writes
d. merging write buffers
15. _ _ _ _ _ _ _ _ cache contains only blocks that are discarded from a cache because of a miss
a. write back
b. write through
c. optimized
d. victim
16. Which miss penalty reduction technique ignores the cpu, concentrating on the interface between
the cache and main memory
a. multilevel caches
b. critical word first and early resta rt
c. giving priority to read misses over writes
d. merging write buffers
20. Which miss penalty technique combines writes to sequential words into a single block to create a
more efficient transfer of memory
a. victim caches
b. merging write buffer
c. multi level caches
d. critical word first and early restart
b. blocking
c. pseudo associative cache
d. prediction
25. Which miss rate reduction technique reduces miss rates without any hardware changes
a. compiler optimizations
b. way prediction and pseudo associative caches
c. large caches
d. higher associativity
26. The very first access to a block cannot be in the cache, so the block must the brought into the
cache. These are called _ _ _ _ _ misses
a. collision
b. conflict
c. capacity
d. compulsory
27. _ _ _ _ _ _ _ conflict misses -are due to going from eight way associative to four- way associative
a. Eight way
b. four way
c. two way
d. one wa y
29. Which miss rate reduction technique is popular in off chip caches
a. large block size
b. larger caches
c. higher associativity
d. compiler optimization
30. If the upper level memory is smaller than what is needed for a program and a significant
percentage of the time is spend moving data between two levels in the hierarchy, the memory
hierarchy is said to _ _ _ _ _ _ _ _
a. crash
b. trash
c. fault
d. miss
31. What is the s ize of the page table, given a 32 bit virtual address, 4 KB pages and 4 bytes per page
table entry
a. 2MB
b. 4MB
c. 8MB
d. 16MB
Advanced Computer Architecture
32. consider a logical address space of eight pages of 1024 words each, mapped on to a physical
memory of 32 frames . How many bits are there in the physical address
a. 10
b. 13
c. 15
d. 18
33. Virtual memory system include a _ _ _ _ _ _ _ _ bit, since the cost of an unnecessary access to
the next lower level is so high
a. valid
b. invalid
c. dirty
d. mo dify
36. _ _ _ _ _ _ _ _ memory, divided physical memory into blocks and allocates them to different
processes
a. primary
b. cache
c. magnetic bubble
d. virtual
37. Which mechanism allows the same program to run in any location in physical memory
a. reloading
b. Relocation
c. memory mapping
d. linking
39. To reduce the address translation time , computers use a cache dedicated to these address
translations called a _ _ _ _ _ _ _ _ _
a. TLB
b. paging buffer
c. segmented buffer
d. inverted page table
41. The civilian programs are the _ _ _ _ _ _ trusted and hence, have the _ _ _ _ _ _ limited range of
accesses
a. most , most
b. least , least
c. most , least
d. least , most
42. A descriptor pointing to a _ _ _ _ _ _ _ _ segment is placed in the global descriptor table, while a
desc riptor for a _ _ _ _ _ _ _ _ _ _ segment is placed in the local descriptor table.
Advanced Computer Architecture
a. shared, private
b. private, shared
c. shared, public
d. public, shared.
43. _ _ _ _ _ _ _ added to the cpu protection structure expand memory access protection from two
levels to many more
a. rings
b. bounds
c. uses
d. locks
44. In alpha memory management, which protection field allows the kernel to read the data within
the page
a. valid
b. user read enable
c. kernel read enable
d. kernel write enable
46. In _ _ _ _ _ _ _ , the c pu and the memory is shared among several interactive uses at the same
time, giving the illusion that all users have their own computers
a. multiprogramming
b. timesharing
c. multiprocessors
d. real time systems
47. In alpha memory management, _ _ _ _ _ _ _ _ _ is reserved for the operating system kernel, has
uniform protection for the whole space, and does not use memory management
a. seg 0
b. kseg
c. seg 1
d. seg 2.
48. The alpha memory management uses a _ _ _ _ _ _ _ page table to map the address space to keep
the size reasonable
a. inverted
b. TLB
c. two level hierarchical
d. three level hierarchical
49. Segment registers in the IA - 32 contains and index to a virtual memory data structure called a _
_ _ _ _ _ _ table
a. page
b. segment
c. mapping
d. descriptor
50. _ _ _ _ _ _ _ field in the segment descriptor of IA-32 specifies the valid opera tions and
protection levels for operations that use this segment
a. limit
b. attributes
c. access bit
d. base
51. what fraction of the original computation can be sequential to achieve a speed up of 80 with 100
processors?
a. 0.25
b. 0.5
c. 0.75
d. 1
52. What is the remote request cost for an application running on a 32- processor Multiprocessors,
Advanced Computer Architecture
which has a 400ns time to handle reference to a remote memory. The processors clock rate is
1GHz
a. 400 cycles
b. 200 cycles
c. 100 cycles
d. 800 cycles
53. Which of the following is a false statement regarding distributed shared memory multiprocessors.
a. they are also called NUMA's
b. communication occurs through a shared memory
c. It is a cost - effective way to scale the memory bandwidth
d. It increases the latency for accesses to the local memory
54. A multi computer consisting of completely separate computers connected on a local area network
are called _ _ _ _ _ _ _ _
a. Nodes
b. Workstations
c. Server
d. Cluster
57. In which of the multiprocessors communication of data is done by explicitly passing messages
among the processors?
a. message passing multiprocessors
b. distributive shared memory multiprocessors
c. Symmetric shared memory multiprocessors
d. asymmetric multiprocessors
59. What is the maximum number of processes in sun star fire servers ?
a. 2048
b. 512
c. 64
d. 32
60. What is the typical remote memory access time of HPV series?
a. 500
b. 300
c. 1000
d. 400
62. An attempt to write a block in the _ _ _ _ _ _ _ state always generates a miss, even if the block is
present in the cache , since the block must be made _ _ _ _ _ _ _ _ _ _ _ _
a. share d , Invalid
b. shared ,exclusive
c. Invalid , exclusive
Advanced Computer Architecture
d. exclusive, shared
63. Replication _ _ _ _ _ _ _ _ latenc y of access and _ _ _ _ _ _ _ _ contention for a read shared data
item
a. reduces ,increases
b. reduces , reduces
c. increases ,reduces
d. increases, increases
64. Write - back caches generate _ _ _ _ _ _ requirements for memory bandwidth , and slightly _ _ _
_ _ _ _ _ _ _ _ _ in complexity
a. lowe r, decrease
b. greater, decrease
c. lower, increase
d. greater, increase
65. If an operation is done with out intervening operation then the operation are _ _ _ _ _ _ _ _ _ _
a. deadlocked
b. starved
c. atomic
d. non atomic
66. The behavior of reads and writes to the same memory location is defined as _ _ _
a. coherence
b. consistency
c. dependency
d. serializa tion
67. Multiple writes to the same word with no intervening reads require _ _ _ _ _ _ _ write broadcast
in an update protocol
a. Only one
b. One or two
c. atmost one
d. multiple
68. The processors with the sole copy of a cache block is normally called the _ _ _ _ of the cache
block.
a. owner
b. user
c. dictator
d. master
69. If the CPU uses a multi level cache with the _ _ _ _ _ property , then every entry in the Primary
cache is required to be in the secondary cache
a. ex clusion
b. inclusion
c. diffusion
d. shared
70. _ _ _ _ _ _ _ actions introduce the possibility that the protocol can deadlock
a. atomic
b. non atomic
c. illega l
d. sharing
71. Directory requests need to _ _ _ _ _ _ _ _ _ the set shares and also _ _ _ _ _ _ _ the set to
perform invalidations
a. update , update
b. update,read
c. read , update
d. update,update
73. What message type and contents are to be transmitted from the local cache to the home director
when a processor P has a read miss at address A request data and make P a read sharer
a. read miss A
b. Read miss P,A
c. Write miss A
d. Write miss P,A
74. _ _ _ _ _ _ _ are used to send a value from the home node back to the requesting node
a. Invaliddate
b. Fetch
c. Data value reply
d. Data write back
75. Which directory request sets the shares to the identity of the new owner and the state of the
block remains exclusive.
a. Read miss
b. Data write back
c. write miss
d. Fetch
78. In which state exactly one processor has a copy of the cache block and it has written the block ,
so the memory copy is out of date
a. shared
b. uncached
c. Invalid
d. exclusive
79. _ _ _ _ _ _ _ _ _ _ is the node where the memory location and the directory entry of an address
reside.
a. local node
b. home node
c. remote node
d. source node
80. In a directory protocol in which state no processor has a copy of the cache block?
a. shared
b. uncached
c. exclusive
d. Invalidate
81. What is the number of bus transactions required for all n processors to acquire a lock on a
variable simultaneously, assuming they are all spinning when the lock is released at time 0.
a. n*n
b. 2n+1
c. 2n
d. n 2 +2n
82. Suppose there are 10 processors on a bus that each they to execute a barrier Simultaneously .
Determine the number of bus transactions required for all 10 Processors to reach the barrier, be
released from the barrier and exit the barrier
a. 204
b. 205
c. 120
d. 102
83. How many bus transactions are needed to have 10 processors lock and unlock the variable using
Advanced Computer Architecture
84. The cost of building basic synchronization primitives will be too _ _ _ _ _ _ _ _ _ and will _ _ _ _
_ _ _ _ as the processor count increases
a. high,decrease
b. high,increase
c. low, decrease
d. low, increase
86. _ _ _ _ _ _ _ synchronization primitives returns the value of a memory location and automatically
increments it
a. ex change
b. test-and-set
c. fetch-and-increment
d. read-and-update
87. If multiprocessors are attempting to get the lock, each will generate the _ _ _ _ _ _
a. Read
b. update
c. set lock
d. write
88. _ _ _ _ _ _ _ _ _ is a common technique for reducing contention in shared resources inc luding
access to shared networks and buses
a. Simple barrier
b. exponential back off
c. sense -reversing barrier
d. true based barrier
91. SMT exploits _ _ _ _ _ _ _ _ _ _ _ parallelism on a multiple- issue supers calar and hence it is
included in _ _ _ _ _ _ _ _ _ proc essors targeted at server markets
a. thread-level, low end
b. thread level, high-end
c. Instruction - leve l, low end
d. Instructio n - level, high end
92. Data cache performs slightly _ _ _ _ _ with SMT, while the l2 cache performs slightly _ _ _ _ _ _ _
_
a. worse ,better
b. better,worse
c. better,better
d. wo rse,worse
94. _ _ _ _ _ _ _ _ _ _ provides unique register identifiers , instructions from multiple threads can be
mixed in the data path without confusing sources and destinations across the threads
a. Register renaming
b. Register exchange
c. Register reordering
d. Register prefetch
96. _ _ _ _ _ _ multithreading switches between threads on each instruction causing the execution of
multiple threads to be interleaved
a. super scalar
b. coarse - grained
c. fine - grained
d. simultaneous
97. _ _ _ _ _ _ _ multithreading uses the insight that a dynamically scheduled processor already has
many of the hardware mechanisms needed to support the integrated exploitation of TLP through
multithreading .
a. super scalar
b. coarse - grained
c. fine - graine d
d. simultaneous
98. In the _ _ _ _ _ _ _ _ case the interleaving of threads eliminate fully empty slots
a. super scalar
b. coarse - grained
c. fine - grained
d. simultaneous
99. Simulation results have shown that sharing everything is key to maximizing _ _ _ _ _ _ _ _
Performance
a. super scalar
b. coarse - grained
c. fine - grained
d. simultaneous MT
100. The processor configuration for the evaluation of an SMT extension starts with an aggressive
superscalar that has roughly _ _ _ _ _ _ _ _ the capacity of existing superscalar processors in
2001.
a. sam e as
b. double
c. thrice
d. te n times
101. Th advertised average seek time is 5 ms, the transfer rate is 40MB/Sec, it rotates at 10,000 RPM
and the controller overhead is 0.1ms. Assume the disk is idle so that there is no queuing delay.
What is the average time to read or write a 512 byte sector for a disk?
a. 8. 01
b. 8. 21
c. 8.11
d. 8. 0
102. For flash ,assume it takes 65ns to read 1 byte,1.5 µs to write 1 byte and 5ms to erase 4KB.What
are the times required to read and write a 64KB block to flash memory.
a. 178.3,4.3
b. 178.3,178.3
c. 4.3,178.3
d. 4. 3,4.3
Advanced Computer Architecture
103. _ _ _ _ _ _ _ _ _ _ _ device is used to handle the c omplexities of disconnect / connect and read
ahead in magnetic disks.
a. Disk controller
b. array controller
c. DMA controller
d. I/O controller
105. _ _ _ _ _ _ _ _ _ tapes limit the speed at which the tapes can spin with out breaking or jamming.
a. Longitudinal
b. near line
c. latitudinal
d. helical scan
107. Rewritable DVD drives cost _ _ _ _ _ _ times as much as DVD -ROM drives
a. 5
b. 10
c. 50
d. 100
112. Which of the following is a false statement regarding the I/O processor
a. They facilitate simultaneous execution of several processes
b. They have dedicated tasks
c. parallelism they enable is very high
d. Doesn't norm ally change information
114. Which option for a bus among the following leads to high performance.
a. A multiplex address and data lines
Advanced Computer Architecture
b. Narrower
c. No arbitration
d. Synchronous
117. Which of the following is a serial I/O bus often used in embedded computers.
a. SCSI
b. PCI
c. PCI-X
d. SPI
118. In _ _ _ _ _ _ _ _ _ _ _ _ , portions of the machines address space are assigned to I/O devices.
a. Isolated I/O
b. Memory mapped I/O
c. Programmed I/O
d. Interruptdriven
119. _ _ _ _ _ _ _ _ _ _ _ _ relieves the CPU from waiting for every I/O event, but many CPU cycles are
still spent in transferring data
a. Interrupt-driver I/O
b. Programmed I/O
c. DMA
d. I/O mapped I/O
120. Au1000 includes about _ _ _ _ _ _ _ _ _ DMA channels and _ _ _ _ _ _ _ _ I/O device controllers
on chip respectively.
a. 1,2
b. 10,20
c. 100,200
d. 50,100
122. Achieving higher _ _ _ _ _ _ _ _ _ _ requires improvement in software quality and software fault
tolerance.
a. Reliability
b. Availability
c. Dependability
d. Operability
123. _ _ _ _ _ _ _ _ faults exist for a limited time and are not recurring
a. Hard
b. Transient
c. Intermittent
d. Permanent
124. _ _ _ _ _ _ _ _ _ _ faults have declined due to a decreasing number of chips in systems, reduced
power, and fewer connectors
a. Design
b. Operation
c. Environment
d. Hardware
Advanced Computer Architecture
125. Which among the following is not a fault classification in VAX systems
a. Hardware
b. Operating system
c. design fault
d. system management
130. A system _ _ _ _ _ _ _ _ _ occurs when the actual behavior deviates from the specified behavior
a. Fault
b. error
c. failure
d. change
132. What is the performance metric of complex query OLTP bench mark
a. Transactions per second
b. new order transactions per minute
c. Queries per hour
d. web interactions per second
133. The work-load is gradually _ _ _ _ _ _ _ _ _ _ until the server software is saturated with hits and
the response time _ _ _ _ _ _ _ _ _ _ _ significantly
a. Increases, increases
b. increases, decreases
c. Decreases, increases
d. Decrea ses, decreases
137. What is the bench mark used for evaluating the performance of WWW Servers
a. SPECSFS
b. TPC
c. SPECWEB
d. SPEC89
138. For every 100 NFS operations per second, the capacity must increase by _ _ _ _ _ _ _
a. 1GB
b. 10GB
c. 100GB
d. 1000GB
139. Disk media failures on writes fall into which category of faults?
a. Transient
b. Intermittent
c. Permanent
d. Operation
141. Assuming that the components lifetimes are exponentially dis tributed and that failures are
independent, compute the failure rate of a disk subsystem with the following components and
MTTF.
. 10 disks, each rated at 1,000,000 - hours MTTF
. 1 SCSI controller, 200,000 - hours MTTF.
. 1 power supply, 200,000 - hours MTTF
a. 10/1,000,000
b. 12/1,000,000
c. 22/1,000,000
d. 20/1,000,000
142. Assume a disk subsystem with the following components and MTTF
. 10 disks, each rated at 1,000,000 - hours MTTF
. 1 SCSI controller, 200,000 - hours MTTF.
. 1 power supply, 200,000 - hours MTTF
. 1 FAN 200,000 - hours MTTF.
. 1 SCSI cable, 1,000, 000 - hours MTTF.
Compute the MTTF of the system as a whole assuming that the age of the component is not
important in probability of failure and that failures are independent
a. 2,700,000-hours
b. 2,000,000-hours
c. 192, 860 ho urs
d. 43,500 hours
143. What is the response time of an I/O system with a single disk, if it gets on average 64 I/O
requests per second and the average disk service time in 7.8 ms.
a. 7.8ms
b. 15.6ms
c. 14ms
d. 3.9ms
145. What is the utilization of seek time per disk, if the time of average seek in 5s with 100 IOPS
Advanced Computer Architecture
a. 100 %
b. 50 %
c. 25 %
d. 1 %
146. In which design of I/O system shows the folly of 100 % utilization
a. Response times of the naive cost-preformance design & evaluation
b. Availability if the naove cost-pref ormance desogn & evaluation
c. more realistic cost performance design and evaluation
d. more realistic design for availability and its evaluation
147. If the OS uses 50,000 CPU instructions for a disk I/O. What is the maximum IOPS for CPU with
2500 MIPS?
a. 50,000 IOPS
b. 25,000 IOPS
c. 10,000 IOPS
d. 1,00,000IOPS
148. Mean-time until data loss (MTDL) increase with _ _ _ _ _ _ _ _ disk reliability, and _ _ _ _ _ _ _ _
_ _ MTTR.
a. Increased, reduced
b. increased, increased
c. reduced, reduced
d. reduced, increased
150. What is the disk access latency for performance and availability tuned organization
a. 238ms
b. 40ms
c. 41ms
d. 90ms
151. The loss of signal strength as it passes through a medium, called _ _ _ _ _ _ , limits the length of
the fiber
a. Attenuation
b. multipart f ading
c. signal to noise ratio
d. interference
152. Suppose you have 25 magnetic tapes, each containing 40GB.Assume that you have enough tape
readers to keep any network busy. How long will it take to transmit the data over a distance of 1
Km using cat5 twisted pair wires at 100M bits/sec.
a. 22.8 hrs
b. 2.3hrs
c. 0.9hrs
d. 0.25hrs
153. By limiting the length to 100 meters,``Cat5" wiring can be used for _ _ _ _ _ _ _ _ _
a. 1M bits /sec
b. 10M bits/sec
c. 100M bits/sec
d. 1000M bits/sec
154. Which of the following statement is true about single mode fiber
a. Poor transm itter
b. more reliable
c. More expensive
d. Easy to attach connectors to single mode
155. Level 3 unshielded twisted pairs was good enough for _ _ _ _ _ _ _ _ _ Ethernet
a. 1M bits /sec
b. 10M bits/sec
c. 100M bits/sec
Advanced Computer Architecture
d. 1000M bits/se c
157. _ _ _ _ _ _ _ _ was deployed by cable television companies to deliver a higher rate over a few
kilometers.
a. coaxial cable
b. cat 5 UTP
c. level 3 UTP
d. fiber optic cable
160. _ _ _ _ _ _ _ _ _ sends different streams simultaneously on the same fiber using different
wavelengths of light.
a. WDM
b. TDM
c. FDM
d. CDM
161. In a failure-intolerant LAN if thetotal intervals and intervals of no failures are 8974 and 8605
respectively, then what percentages of hours a user can`t get his work done
a. 41 %
b. 4. 1 %
c. 4.5 %
d. 5 %
162. If the number of failures of 58 desktop computers on a traditional LAN are 654 and that these
failures are equally distributed among work stations, then what percentage of hours a user on a
workstation can't get his work done.
a. 0. 13 %
b. 1.3 %
c. 13 %
d. 4.1 %
163. _ _ _ _ _ _ followed open standards and have less stringent electrical requirements.
a. I/O buses
b. Mem ory buses
c. USB
d. network interface
166. Memory buses provide _ _ _ _ _ _ _ bandwidth and _ _ _ _ _ _ latency than I/O buses
a. Higher,lower
Advanced Computer Architechture
b. lower,higher
c. lower,lower
d. Higher,higher
169. The communication system must have mechanisms for _ _ _ _ _ _ _ of a message in case of
failure
a. Reco very
b. Diversion
c. destroying
d. Retransmission
170. _ _ _ _ _ _ _ _ _ _ have the ability to work around failed nodes and switches
a. SANs
b. MANs
c. LANs
d. WANs
171. A gigabit per second LAN can fully occupy a _ _ _ _ _ _ _ _ GHZ C PU when running TCP/IP
a. 1.0-1.1
b. 0.8-1.0
c. 0.8-0.9
d. 0.9 to 1.0
d. Transport
179. Which among the following operate at the network layer of OSI model
a. hubs
b. routers
c. bridges
d. switches
181. Small SMP's with _ _ _ _ _ _ _ _ processors has much better cost -performance than clusters
a. 6-8
b. 4-6
c. 2-4
d. 1-2
182. _ _ _ _ _ _ _ _ server has the goal that a node can fail or be upgraded without bringing down the
whole machine.
a. SPEC WEB
b. SPECSFS
c. IBM series 300
d. Sun Fire 6800
185. Clusters are used for the _ _ _ _ _ _ _ _ computers, NUMA the _ _ _ _ _ _ _ _ computers
a. smaller, largest
b. smaller, smaller
c. largest, smaller
d. largest, largest
b. N times
c. 2N times
d. 1/(2N )
191. Astandard VME rack is _ _ _ _ _ _ _ _ _ inches wide and about _ _ _ _ _ _ _ _ feet tall, with a
typical depth of _ _ _ _ _ _ _ _ _ _ inches respectively.
a. 6,19,30
b. 30,6,19
c. 19,30,6
d. 19,6,30
192. Which design cluster example includes the c ost of software, the cost of space, some maintenance
costs and operator costs.
a. Cost of cluster hardware alternatives with local disk
b. Cost of cluster hardware alternatives with disk over SAN
c. Cost of cluster options that in more realistic
d. Cost of performance of a cluster for transaction processing
193. The uniprocessor clusters costs _ _ _ _ _ _ times the two-way SMP option, and the 8 way SMP
cluster costs _ _ _ _ _ _ _ _ _ _ times the two way SMP.
a. 1.6, 1.1
b. 1.1, 1.6
c. 1,6
d. 1,1
195. Smaller computers are generally _ _ _ _ and _ _ _ _ _ _ _ for a given function compared to the
larger computers.
a. Costlier, Slower
b. Cheaper, Slower
c. Cheaper , fas ter
d. costlier, faster
d. 129
200. Collaction Sites are designed assuming no more than _ _ _ _ watts per square foot.
a. 1
b. 10
c. 100
d. 1000