Ec8551 Communication Networks
Ec8551 Communication Networks
com
processor is faster?
a) A
EC8552 b) B
c) Both take the same time
COMPUTER d) Insufficient information
om
ARCHITECTURE Answer: a
Explanation: The performance of a system
AND can be found out using the Basic performance
formula.
ORGANIZATION 3. A processor performing fetch or decoding
of different instruction during the execution
.c
of another instruction is called ______
a) Super-scaling
b) Pipe-lining
UNIT I COMPUTER
ul
c) Parallel Computation
d) None of the mentioned
ORGANIZATION &
INSTRUCTIONS pa Answer: b
Explanation: Pipe-lining is the process of
improving the performance of the system by
TOPIC 1.1 BASICS OF A processing different instructions at the same
COMPUTER SYSTEM: time, with only one instruction performing
EVOLUTION, IDEAS, one specific operation.
jin
TECHNOLOGY, 4. For a given FINITE number of instructions
PERFORMANCE, POWER to be executed, which architecture of the
WALL processor provides for a faster execution?
a) ISA
.re
Explanation: None.
5. The clock rate of the processor can be
2. Two processors A and B have clock improved by _________
frequencies of 700 Mhz and 900 Mhz a) Improving the IC technology of the logic
w
om
a) Better compilation of the given piece of system’s performance, a system is used as a
code reference against which other systems are
b) Takes advantage of the type of processor compared and performance is determined.
and reduces its process time
c) Does better memory management 10. When Performing a looping operation, the
d) None of the mentioned instruction gets stored in the ______
a) Registers
.c
Answer: b b) Cache
Explanation: An optimizing compiler is a c) System Heap
compiler designed for the specific purpose of d) System stack
increasing the operation speed of the
ul
processor by reducing the time taken to Answer: b
compile the program instructions. Explanation: When a looping or branching
operation is carried out the offset value is
7. The ultimate goal of a compiler is to stored in the cache along with the data.
________
pa
a) Reduce the clock cycles for a programming 11. The average number of steps taken to
task execute the set of instructions can be made to
b) Reduce the size of the object code be less than one by following _______
c) Be versatile a) ISA
jin
d) Be able to detect even the smallest of b) Pipe-lining
errors c) Super-scaling
d) Sequential
Answer: a
Explanation: None. Answer: c
.re
Corporation
d) Standard Processing Enhancement 12. If a processor clock is rated as 1250
Corporation million cycles per second, then its clock
period is ________
w
of a system’s performance.
d) 8 * 10-10 sec
9. As of 2000, the reference system to find
the performance of a system is _____ Answer: d
a) Ultra SPARC 10 Explanation: None.
om
c) ~1 other microprocessors or processing units.
d) 6
2. The feature of the multi-microprocessor
Answer: c architecture is
Explanation: S is the number of steps a) task dependent
required to execute the instructions. b) single bus provider for many processors
c) design is for a specific task
.c
14. CISC stands for _______ d) all of the mentioned
a) Complete Instruction Sequential
Compilation Answer: d
b) Computer Integrated Sequential Compiler Explanation: The main feature of multi-
ul
c) Complex Instruction Set Computer microprocessor is that it is task dependent. If
d) Complex Instruction Sequential it is designed for a specific task, then it may
Compilation pa not be useful for other tasks.
b) Ultra SPARC -IIi 300MHZ enhanced fault tolerance are the main
c) Amd Neutrino series objectives of the multi-microprocessor
d) ASUS A series 450 Mhz system. These systems incorporate a
multiplicity of hardware and software, for the
Answer: b purpose.
w
Explanation: None.
4. An interface between the user or an
application program, and the system
TOPIC 1.2 UNIPROCESSORS TO resources are
w
MULTIPROCESSORS a) microprocessor
b) microcontroller
1. The interconnection topologies are c) multi-microprocessor
w
om
b) input/output management system should have a mechanism to split a
c) memory management task, optimise system performance, and
d) all of the mentioned should handle structural changes.
.c
management including input/output and c) software to improve overall performance
memory management. d) all of the mentioned
ul
a) serial process Explanation: An operating system must have
b) parallel process process-processor allocation strategies, a
c) serial and parallel process mechanism to collect results of subtasks and
d) none of the mentioned software to improve overall performance.
Answer: d
pa 10. A multiprocessor operating system must
Explanation: Distributed systems are take care of
designed to run a parallel process. It is a) authorized data access and data protection
essential that a proper environment exists for b) unauthorized data access and data
jin
concurrent processes to communicate and protection
cooperate, in order to complete the allotted c) authorized data access
task. d) data protection
communication
d) interprocessor communication ADDRESSING MODES
R1
8. A multiprocessor operating system should c) Finds the memory location 45 and adds
perform that content to that of R1
a) a mechanism to split a task into concurrent d) None of the mentioned
subtasks
Answer: b c) EA = [R1]
Explanation: The instruction is using d) EA = 5+[R1]
immediate addressing mode hence the value
is stored in the location 45 is added. Answer: d
Explanation: This instruction is in Base with
2. In the case of, Zero-address instruction offset addressing mode.
om
method the operands are stored in _____
a) Registers 6. The addressing mode/s, which uses the PC
b) Accumulators instead of a general purpose register is
c) Push down stack ______
d) Cache a) Indexed with offset
b) Relative
Answer: c c) Direct
.c
Explanation: In this case, the operands are d) Both Indexed with offset and direct
implicitly loaded onto the ALU.
Answer: b
3. Add #45, when this instruction is executed Explanation: In this, the contents of the PC
ul
the following happen/s _______ are directly incremented.
a) The processor raises an error and requests
for one more operand 7. When we use auto increment or auto
b) The value stored in memory location 45 is decrements, which of the following is/are
pa
retrieved and one more operand is requested
c) The value 45 gets added to the value on the
true?
1) In both, the address is used to retrieve the
stack and is pushed onto the stack operand and then the address gets altered
d) None of the mentioned 2) In auto increment, the operand is retrieved
first and then the address altered
jin
Answer: b 3) Both of them can be used on general
Explanation: None. purpose registers as well as memory locations
a) 1, 2, 3
4. The addressing mode which makes use of b) 2
in-direction pointers is ______ c) 1, 3
.re
om
Answer: b
Answer: c Explanation: To assign values to any
Explanation: The addressing mode used is variable, the := operator is used. Since, y is a
base with offset and index. VARIABLE STD_LOGIC_VECTOR type,
we can only use := operator and not <=
10. _____ addressing mode is most suitable to operator. => can be used, but while assigning
change the normal sequence of execution of individual elements of a vector.
.c
instructions.
a) Relative 3. Refer to the VHDL code given below,
b) Indirect which is the legal assignment statement?
c) Index with Offset
ul
d) Immediate SIGNAL x: STD_LOGIC;
SIGNAL y: STD_LOGIC_VECTOR(3 DOWNTO 0);
Answer: a
Explanation: The relative addressing mode is
pa a) y <= (1 => ‘1’, OTHERS => ’0’);
b) y := “0100”;
used for this since it directly updates the PC.
c) y => “0100”;
d) y => x;
TOPIC 1.4 OPERATIONS AND
OPERANDS Answer: a
jin
Explanation: To assign a value to a SIGNAL,
either <= or => can be used only. But, if we
1. Which of the following is not an want to use =>, then values need to be
assignment operator? assigned to individual elements. => is used
a) <= with OTHERS. Y<= (1<=’1’, OTHERS
b) :=
.re
individual vector elements or others. more than one logical operator in the same
statement, then NOT will be given highest
2. A VARIABLE y is declared of preference. If there is any () in the statement
STD_LOGIC_VECTOR type of 4 bits, if you then first preference will be given to () and
want to assign 1001 to y, then what is the then to NOT operator.
5. In the following statements, y and z are number and similarly, when used with two
equivalent to________ operands then the result is difference of two
operands.
y <= NOT a AND b;
z <= NOT (a AND b); 8. The operator ‘&’ is called the_____
operator.
a) y <= a’+b’ and z <= (a.b)’
om
a) Logical AND operator
b) y <= (a+b)’ and z <= a’+b’ b) Bitwise AND operator
c) y <= a’+b and z <= a’+b’ c) Arithmetic addition operator
d) y <= a+b’ and z <= a.b d) Concatenation operator
Answer: c Answer: d
Explanation: As discussed above, NOT will Explanation: ‘&’ is called the concatenation
.c
be given highest preference. So, y becomes operator and is a binary operator. It needs two
((NOT a)AND b) which is a’+b. similarly, in operands and both of them must be arrays. It
z first of all () will be solved i.e.(a AND b)’
combines two arrays and produces one array
which is (a.b)’. By, De Morgan’s law, (a.b)’ =
of the size equal to the sum of sizes of two
ul
a’+b’. Therefore, y = a’+b and z = a’+b’.
arrays.
6. Which of the following VHDL statement is
9. What is the type of result of MOD
equivalent to NAND operation, if y, a and b
pa operator?
are SIGNALS?
a) Numeric
a) y <= NOT a AND b
b) Integer
b) y <= NOT a OR NOT b
c) Array
c) y <<= NOT a AND NOT b
d) Bit
d) y <<= NOT (a OR b)
jin
Answer: b
Answer: b
Explanation: The MOD operator is called the
Explanation: Logic NAND operation is
modulo operator which gives the remainder
(a.b)’ which is equivalent to a’ + b’ by using
of the division of two integers and hence the
De Morgan’s law. NOT a AND b is
result is of integer type. For example, y <= a
.re
called _________
a) – a) Arithmetic operators
b) * b) Concatenation operators
c) / c) Logical operators
w
d) ** d) Relational operators
Answer: a
Answer: d
Explanation: Unary operator is the one
w
than, greater than, less than or equal to, VHDL is represented by two asterisk signs.
greater than or equal to operators. So, ** is the exponentiation operator which
comes under the category of arithmetic
11. What is the type of result for comparison operators. In VHDL, a**b means a^b.
operators?
a) Boolean
TOPIC 1.5 REPRESENTING
om
b) Integer
c) Numeric INSTRUCTIONS
d) Array
1. In which of these modes, the immediate
Answer: a operand is included in the instruction itself?
Explanation: Comparison operators are used a) register operand mode
for the comparison of two operands and the b) immediate operand mode
.c
result is of Boolean type i.e. true or false. For c) register and immediate operand mode
example, b:= “0010” < “0001”; In this d) none of the mentioned
statement, the value assigned to b will be
FALSE, since this means 2 < 1, which is not Answer: b
ul
true. Explanation: In immediate operand mode,
the immediate operand is included in the
12. ABS operator is used to _________ instruction itself.
a) Shift the operand
VHDL, if we use following statements: pi = 16-bit general purpose registers or in SI, DI,
22/7; IF(pi = 3.14) THEN WAIT; Then we BX or BP.
might not get the result as we want. It will be
unreliable. If we use ABS operator along with 3. In which of the following addressing mode,
it, then it will be better. Like, the offset is obtained by adding displacement
w
IF(abs(pi)=3.14) THEN WAIT; this will give and contents of one of the base registers?
the desired result. a) direct mode
b) register mode
13. Which of the following is exponentiation c) based mode
w
4. In which of the following addressing mode, 7. The representation of 8-bit or 16-bit signed
the offset is obtained by adding displacement, binary operands using 2’s complement is a
with the contents of SI? data type of
a) direct mode a) Ordinal
b) register mode b) ASCII
c) based mode c) Packed BCD
om
d) indexed mode d) integer
Answer: d Answer: d
Explanation: In an indexed mode, the offset Explanation: In integer data type, 8-bit or 16-
is obtained by adding displacement, with bit signed binary operands are represented
contents of an index register, either SI or DI. using 2’s complement.
.c
5. The address of a location of the operand is 8. The instruction that pushes the general
calculated by adding the contents of any of purpose registers, pointer and index registers
the base registers, with the contents of any of on to the stack is
index registers in a) POPF
ul
a) based indexed mode with displacement b) PUSH Imd
b) based indexed mode c) PUSH*A
c) based mode pa d) PUSHF
d) indexed mode
Answer: c
Answer: b Explanation: The PUSH*A instruction,
Explanation: In a based indexed mode, the pushes the general purpose registers, AX,
operand is stored at a location, whose address CX, DX and BX, pointer and index registers,
is calculated by adding the contents of any of SP, BP, SI, DI, on to the stack.
jin
the base registers, with the contents of any of
the index registers. 9. While executing the PUSH*A instruction,
the stack pointer is decremented by
6. Which of the following is not a data type of a) 1 bit
80286? b) 2 bits
.re
5. ASCII PUSH*A
6. BCD d) all of the mentioned
7. Packed BCD.
Answer: d
Explanation: The POP*A instruction, pops
all the contents of the registers DI, SI, BP, SP, basis, except for NOT that is performed on a
BX, DX, CX and AX from the stack in this single image.
sequence, that is exactly opposite to that of
pushing. 2. Which of the following logical operator(s)
is/are functionally complete?
11. The instruction that multiplies the content a) AND
om
of AL with a signed immediate operand is b) OR
a) MUL c) NOT
b) SMUL d) All of the mentioned
c) IMUL
d) None of the mentioned Answer: d
Explanation: All the three logical operators
Answer: c given are functionally complete because all
.c
Explanation: The IMUL instruction other logical operators can be implemented
multiplies the content of AL with a signed using these three.
immediate operand, and the signed 16-bit
result is stored in AX. 3. While implementing logic operation on
ul
gray-scale images, the processing of pixel
12. The instruction that represents the ‘rotate values is done as __________
source, count’ is a) String of integer numbers
a) RCL b) String of floating numbers
b) RCR
c) ROR
pa c) String of binary numbers
d) None of the mentioned
d) All of the mentioned
Answer: c
Answer: d Explanation: Logic operation on gray-scale
jin
Explanation: The rotate source, count is a images are done by processing of pixel values
group of four instructions containing RCL, as string of binary numbers.
RCR, ROL, ROR.
4. What is the equivalent for a black, 8-bit
pixel to be processed under logic operation on
.re
om
so, is equivalent to negative transformation. humans or operate with what appears to be
almost human intelligence is called ________
6. Which of the following operations are used a) Robot
for masking? b) Human
a) AND, OR c) Animals
b) AND, NOT d) Reptiles
c) NOT, OR
.c
d) All of the mentioned Answer: a
Explanation: Robot is an automatic
Answer: c apparatus or device that performs functions
Explanation: AND, OR operators are used ordinarily ascribed to humans or operate with
ul
for masking, while NOT works as negative what appears to be almost human
transformation. intelligence.
7. Two images having one pixel gray value
pa
01010100 and 00000101 at the same location,
are operated against AND operator. What
2. The laws of Robotics are:
a) A robot may not injure a human being
b) A robot must abbey the order given by
would be the resultant pixel gray value at that human except when conflict with the first law
location in the enhanced image? c) A robot must protect its own existence
a) 10100100 except when it is violating first and second
jin
b) 11111011 law
c) 00000100 d) Both b and c
d) 01010101
Answer: d
Answer: c Explanation: A robot may not injure a
.re
Explanation: For AND operation results in 1 human being or through in action, allow
only for 1AND 1, else 0. human being to be harmed.
All the bits of the given gray value are
operated similar resulting in 00000100. 3. The basic components of robot are:
a) The mechanical linkage
w
b) Subtraction Answer: d
c) Multiplication Explanation: The basic components of robot
d) Division are the mechanical linkage, sensors and
w
motion in the body in space. b) Both A and R are true but R is not correct
Reason (R): Maximum degree of freedom can explanation of A.
be six in a robot. c) A is true but R is false
a) Both A and R are true and R is not correct d) A is false but R is true
explanation of A.
b) Both A and R are true but R is not correct Answer: a
om
explanation of A. Explanation: The system provides the
c) A is true but R is false theoretical position values for each step and
d) A is false but R is true continuously measures the actual position
during movement.
Answer: b
Explanation: Degree of freedom defines the 8. Hierarchical level control involves :
variables responsible for the motion of the a) Level 1: Actuator control controls
.c
robot and allows robot to reach all positions individual robot actuators
and orientations. b) Level 2: Path control coordinates robot
path movement
5. A _________ is connection between parts c) Level 3: Main control high level
ul
or links in a robot that allow motion. instruction interpreter
a) Hinge d) All of the mentioned
b) Joint
Answer: d
c) Dis joint
d) None of the mentioned
pa Explanation: Hierarchy refers to the system
where some form of levels are used as higher
Answer: b to lower or vice versa and this level control
Explanation: A joint is connection between mainly involves actuator control, path control
parts or links in a robot that allow motion. It and main control for various functioning of
jin
has translator and rotatory motion. the parts of the robot.
6. Classification of Robot is based on: 9. Non servo robots are also called as:
a) Geometry and geometric classification a) Pick and place
b) Left right classification b) Fixed stop robot
.re
Answer: d Answer: c
Explanation: Robots can be classified on the Explanation: Non servo robots are simplest
w
basis of the movement their structure and robots as they are the least complex structures
geometry as humanoid robots and gantry and they are made to do some specific and
robots. less jobs and it is an open loop system.
w
7. Assertion (A): The control system of an 10. Characteristics of non-servo robot are:
industrial robot determine its flexibility and a) Relatively inexpensive compared to servo
efficiency, within the limits set beforehand by robots
w
Answer: d Answer: b
Explanation: Non-servo robots are open loop Explanation: The binary point between the
system and less costly and they are less digits b0 and b1 does not exist physically in
complex and can be used once or twice for the computer. Simply, the logic circuits of the
some work and they are less reliable. computer are designed such that the
computations result in numbers that
om
correspond to the assumed location of this
point.
UNIT II ARITHMETIC 4. What is the resolution to cover a range of
numbers xmax-xmin with ‘b’ number of bits?
TOPIC 2.1 FIXED POINT a) (xmax+xmin)/(2b-1)
.c
ADDITION b) (xmax+xmin)/(2b+1)
c) (xmax-xmin)/(2b-1)
1. If (101.01)2=(x)10, then what is the value
d) (xmax-xmin)/(2b+1)
ul
of x?
a) 505.05
Answer: c
b) 10.101
c) 101.01
pa Explanation: A fixed point representation of
d) 5.25 numbers allows us to cover a range of
numbers, say, xmax-xmin with a resolution
Answer: d Δ=(xmax-xmin)/(m-1)
Explanation: where m=2b is the number of levels and ‘b’ is
(101.01)2=1*22+0*21+1*20+0*2-1+1*2-2= the number of bits.
jin
(5.25)10
=>x=5.25. 5. What are the mantissa and exponent
required respectively to represent ‘5’ in
2. If X is a real number with ‘r’ as the radix, binary floating point representation?
a) 011,0.110000
.re
i=−A i
om
Explanation: For a two’s complement
mantissa are multiplied and the exponents are
representation, the truncation error is always
added.
negative and falls in the range
7. What is the smallest floating point number -(2-b-2-bm) ≤ Et ≤ 0.
that can be represented using a 32-bit word?
a) 3*10-38 10. Due to non-uniform resolution, the
corresponding error in a floating point
.c
b) 2*10-38
representation is proportional to the number
c) 0.2*10-38 being quantized.
d) 0.3*10-38 a) True
ul
b) False
Answer: d
Explanation: Let the mantissa be represented Answer: a
by 23 bits plus a sign bit and let the exponent
pa Explanation: In floating point representation,
be represented by 7 bits plus a sign bit. the mantissa is either rounded or truncated.
Thus, the smallest floating point number that Due to non-uniform resolution, the
can be represented using the 32 bit number is corresponding error in a floating point
(1/2)*2-127=0.3*10-38 representation is proportional to the number
Thus, the smallest floating point number that being quantized.
jin
can be represented using the 32 bit number is
(1-2-23)*2127=1.7*1038. TOPIC 2.2 FIXED POINT
SUBTRACTION
8. If 0<E<255, then which of the following
statement is true about X?
.re
Answer: c
Explanation: According to the IEEE 754 a) 0111001000
standard, for a 32-bit machine, single b) 1100110110
precision floating point number is represented c) 11101111111
w
d) 10011010011
as X=(-1)s.2E-127(M).
From the above equation we can interpret Answer: c
that, Explanation: The rules for Binary Addition
w
1 ____________
0 1 1 0 1 0
1 1 0 1 1 0 1 1 0 1 0 _____________
om
_______________________
4. Binary subtraction of 100101 – 011110 is
2. Perform binary addition: 101101 + 011011 a) 000111
=? b) 111000
a) 011010 c) 010101
b) 1010100 d) 101010
c) 101110
Answer: a
.c
d) 1001000
Explanation: The rules for Binary
Answer: d Subtraction are :
Explanation:The rules for Binary Addition 0–0=0
ul
are : 0 – 1 = 1 ( Borrow 1)
0+0=0 1–0=1
0+1=1 1–1=0
1+0=1
1 + 1 = 0 ( Carry 1)
1 1 1 1 1 1
pa 1 0 0 1 0 1
- 0 1 1 1 1 0
___________
0 0 0 1 1 1
1 0 1 1 0 1 ___________
+ 0 1 1 0 1 1
_______________
Therefore, The subtraction of 100101 –
jin
1 0 0 1 0 0 0
_______________ 011110 = 000111.
a) 001100011
3. Perform binary subtraction: 101111 – b) 110011100
010101 = ? c) 010100110
a) 100100 d) 101010111
b) 010101
c) 011010 Answer: a
w
0 1 0 0 1
1–0=1 x 0 1 0 1 1
1–1=0 ____________
0 1 0 0 1
1 0 1 1 1 1 0 1 0 0 1 0
- 0 1 0 1 0 1 0 0 0 0 0 0 0
0 1 0 0 1 0 0 0 __________
0 0 0 0 0 0 0 0 0 1 0 1 0
___________________ 0 0 0 0 0
0 0 1 1 0 0 0 1 1 1 0 1 0 0 0
___________________ 0 0 0 0 0 0 0
_______________
Therefore, 01001 × 01011 = 001100011. 0 1 1.0 0 1 0
om
_________________
6. 100101 × 0110 = ?
a) 1011001111 Therefore, 10.10 x 01.01 = 011.0010.
b) 0100110011
8. Divide the binary numbers: 111101 ÷ 1001
c) 101111110
and find the remainder
d) 0110100101
a) 0010
.c
Answer: c b) 1010
Explanation: The rules for binary c) 1100
multiplication are: d) 0011
0*0=0
ul
Answer: d
0*1=0
Explanation: Binary Division is
1*0=0
accomplished using long division method.
1*1=1 pa 1 0 0 1 ) 1 1 1 1 0 1 ( 1 1
1 0 0 1 0 1 1 0 0 1
x 0 1 1 0 __________
___________ 0 1 1 0 0
0 0 0 0 0 0 1 0 0 1
1 0 0 1 0 1 0 ___________
1 0 0 1 0 1 0 0
jin
0 1 1 1
0 0 0 0 0 0 0 0 0
__________________
0 1 1 0 1 1 1 1 0 Therefore, the remainder of 111101 ÷ 1001 =
___________________ 0111.
c) 011.0010
d) 110.0011 Answer: b
Explanation:
Answer: c
w
0 1 0 1 ) 0 1 1 0 1 0 0 0 0 ( 0 1 0 1 1 1
Explanation: The rules for binary
0 0 0 0
multiplication are: _____________________
0*0=0 0 1 1 0 1
w
0*1=0 0 0 1 0 1
1*0=0 ______________
0 1 0 0 0 0
1*1=1
0 0 0 0 0 0
1 0.1 0 ______________________
x 0 1.0 1 1 0 0 0 0
0 0 1 0 1 c) 11110000
____________________ d) 11001100
0 1 0 1 1 0
0 0 0 1 0 1
____________________ Answer: a
1 0 0 0 1 0 Explanation: The above operation is
0 0 0 1 0 1 performed using binary multiplication.
om
________________________
1 1 1 0 1 0 2. We make use of ______ circuits to
0 0 0 1 0 1
________________________
implement multiplication.
1 0 1 0 1 a) Flip flops
0 0 1 0 1 b) Combinatorial
________________________ c) Fast adders
1 0 0 0 0 d) None of the mentioned
.c
Therefore, the quotient of 011010000 ÷ 1001 Answer: c
= 101001. Explanation: The fast adders are used to add
the multiplied numbers.
ul
10. Binary subtraction of 101101 – 001011 =
? 3. The multiplier is stored in ______
a) 100010 a) PC Register
b) 010110 b) Shift register
c) 110101
d) 101100
pa c) Cache
d) None of the mentioned
Answer: a Answer: b
Explanation: The rules for binary subtraction Explanation: The value is stored in a shift
jin
are: register so that each bit can be accessed
0–0=0 separately.
0 – 1 = 1 ( Borrow 1)
1–0=1 4. The ______ is used to coordinate the
1–1=0 operation of the multiplier.
.re
a) Controller
1 0 1 1 0 1
- 0 0 1 0 1 1 b) Coordinator
____________ c) Control sequencer
1 0 0 0 1 0 d) None of the mentioned
____________
Answer: c
w
TOPIC 2.3 FIXED POINT 5. The multiplicand and the control signals
are passed through to the n-bit adder via
MULTIPLICATION _____
a) MUX
w
om
b) 1101110001
c) 1010101010
d) 1111111000
TOPIC 2.4 FIXED POINT
DIVISION
Answer: b
Explanation: None. 1. Perform binary addition of 1101 + 0010 is
________
.c
7. The method used to reduce the maximum a) 1110
number of summands by half is _______ b) 1111
a) Fast multiplication c) 0111
b) Bit-pair recording d) 1,1101
ul
c) Quick multiplication
d) None of the mentioned Answer: b
Explanation: The addition is performed as :
Answer: b
____________
a) 0-1-2 a) 0
b) 0-1+1-10 b) 1
c) -2-10 c) invalid
w
om
d) Multiplier Explanation: The intermediate terms are
called partial terms. The mid terms obtained
Answer: d in the binary multiplications are the partial
Explanation: 111 is called the multiplier. ones whereas the answer obtained is called
Whenever a multiplication is performed the the final product.
second term is called the multiplier whereas
the first term is called the multiplicand. 8. The result that is smaller than the smallest
.c
number obtained is referred to as
5. The result obtained on binary ___________
multiplication of 1010 * 1100 is a) NaN
_____________ b) Underflow
ul
a) 0001111 c) Smallest
b) 0011111 d) Mantissa
c) 1111100
Answer: b
d) 1111000
Answer: d
pa Explanation: It is referred to as underflow.
Nan stands for not a number. Mantissa is the
Explanation: The solution is as follows : part after the decimal.
1010 9. The number of sign bits in a 32-bit IEEE
jin
* 1100
________
format is _______
0000 a) 1
0000 b) 11
1010 c) 9
1010 d) 23
.re
_______
1111000
Answer: a
6. Which of the following is often called the Explanation: There is only 1 sign bit in all
double precision format? the standards. In a 32-bit format, there is 1
a) 64-bit sign bit, 8 bits for the exponent and 23 bits
w
Answer: a a) 10
Explanation: The 64-bit format is referred to b) 12
as the double precision format. It has 1 sign c) -12
w
om
TOPIC 2.5 FLOATING POINT responsible for the representation of the
ARITHMETIC number.
.c
the number. c) Mantissa
a) True d) Exponent
b) False
Answer: c
ul
Answer: a Explanation: The mantissa also consists of
Explanation: By doing this the computer is the decimal point.
capable of accommodating the large float
numbers also. 6. In IEEE 32-bit representations, the
pa
2. The numbers written to the power of 10 in
mantissa of the fraction is said to occupy
______ bits.
the representation of decimal numbers are a) 24
called as _____ b) 23
a) Height factors c) 20
jin
b) Size factors d) 16
c) Scale factors
d) None of the mentioned Answer: b
Explanation: The mantissa is made to occupy
Answer: c 23 bits, with 8 bit exponent.
.re
c) 0 10101010 1110
called ________
d) 0 11110100 11100
a) Orthogonal
b) Normalized Answer: b
w
om
9. In 32 bit representation the scale factor as a Answer: a
range of ________ Explanation: ALU is a combinational
a) -128 to 127 electronic circuit which basically performs all
b) -256 to 255 the logical or the bitwise operations and the
c) 0 to 255 arithmetic operations. Therefore, it is the
d) None of the mentioned place where the actual executions of
instructions take place.
.c
Answer: a
Explanation: Since the exponent field has 3. Which of the following is not a bitwise
only 8 bits to store the value. operator?
a) |
ul
10. In double precision format, the size of the b) ^
mantissa is ______ c) .
a) 32 bit d) <<
b) 52 bit
c) 64 bit
d) 72 bit
pa Answer: c
Explanation: All except the dot(.) operator
are bitwise operators.
Answer: b | : Bitwise OR
Explanation: The double precision format is ^ : Bitwise XOR
jin
also called as 64 bit representation. << : Shift Left
b) 1110
1. The ‘heart’ of the processor which c) 1000
performs many different operations d) 1001
_____________
a) Arithmetic and logic unit Answer: d
w
om
electrical engineering. IEEE has given certain b) Parity
standards of its own which are followed in the c) Auxiliary
field of computer science and electrical d) Carry
engineering.
Answer: b
6. The ALU gives the output of the operations Explanation: The parity flag indicates the
and the output is stored in the ________ number of 1 bit in any operation. The
.c
a) Memory Devices resultant bit is called the parity bit. The main
b) Registers aim of the parity bit is to check for errors.
c) Flags
d) Output Unit 10. The bitwise complement of 0 is
ul
___________
Answer: b a) 00000001
Explanation: Any output generated by the b) 10000000
ALU gets stored in the registers. The registers c) 11111111
pa
are the temporary memory locations within
the processor that are connected by signal
d) 11111110
c) chrominance
Answer: c d) opaque
Explanation: Arithmetic and Logic Unit
consists of 16bits. They perform certain Answer: a
Arithmetic and bitwise operations (add, Explanation: The color image of a digital
om
a digital signal processor? sequentially and physically
a) VGBA
b) VIBGYOR Answer: c
c) White Explanation: A concurrent program executes
d) RGBA different parts of the program conceptually, a
parallel program executes different programs
Answer: d physically and a non-concurrent program
.c
Explanation: RGBA colors have four executes the program in sequential order.
channels red, green, blue, and alpha, which is
transparent. 6. Which is an imperative language?
a) C program
ul
3. Which of the following processor are b) SQL
designed to perform calculations in graphics c) XQuery
rendering? d) Concurrent model of HDL
a) GPU
b) digital signal processor
c) microprocessor
pa Answer: a
Explanation: Imperative language is one
d) microcontroller which executes the program in sequential
order. C program is an example of imperative
Answer: a language, SQL and XQuery are examples of
jin
Explanation: Graphics processing unit is declarative languages or non-imperative
designed to perform calculations in graphics language. Concurrent model in HDL is a
rendering. Intel, NVIDIA, and AMD are hardware description language which
dominant providers of GPU. executes the program concurrently.
.re
4. Which of the processor is a good match for 7. Which of the following instructions
applications such as video games? supports parallel execution?
a) GPU a) VLIW
b) VLIW b) TTA
c) Coprocessor c) ALU operation
w
Answer: a Answer: a
Explanation: GPU is a graphics processing Explanation: VLIW is a very long instruction
w
unit. Therefore, more graphical images can be word which receives many instructions and is
created by GPU which is necessary for video executed in one instructed word. VLIW is
games. Therefore, GPU is a good match for majorly designed for instruction-level parallel
w
om
b) John Ellis the one whose instruction set includes
c) John Ruttenberg operations on multiple data elements
d) John O’Donnell simultaneously.
.c
architecture. John Ellis described the VLIW b) CISC
compiler. John Ruttenberg develops some c) Superscalar
important algorithms in scheduling. d) Subword parallelism
ul
9. What is ILP? Answer: c
a) instruction-level parallelism Explanation: Superscalar architecture
b) instruction-level panel support out-of-order execution in which the
c) instruction-language panel instructions later in the stream are executed
d) inter-language parallelism
pa before earlier instructions.
15. Which is an example of the multi-core a byte of memory from a location to another
processor which possesses 10 cores? location in the computer.
a) Intel Xeon E7-2850
b) AMD Phenom IIX2 3. The operation that does not involves clock
c) Intel core duo cycles is _________
d) AMD Phenom IIX3 a) Installation of a device
om
b) Execute
Answer: a c) Fetch
Explanation: Intel Xeon E7-2850 have ten d) Decode
cores whereas AMD Phenom IIx2 and Intel
core duo has two cores and AMD Phenom Answer: a
IIX3 has three cores. Explanation: Normally, several clock cycles
are required to fetch, execute and decode a
.c
particular program.
Installation of a device is done by the system
on its own.
UNIT III THE
ul
4. The number of clock cycles per second is
PROCESSOR referred as ________
a) Clock speed
b) Clock frequency
TOPIC 3.1 PROCESSOR
INTRODUCTION, LOGIC
pa c) Clock rate
d) Clock timing
DESIGN CONVENTIONS OF
PROCESSOR Answer: a
Explanation: The number of clock cycles per
jin
second is the clock speed. It is generally
1. Computer has a built-in system clock that
emits millions of regularly spaced electric measured in gigahertz(109 cycles/sec) or
pulses per _____ called clock cycles. megahertz (106 cycles/sec).
a) second
.re
b) False a) CISC
b) RISC
Answer: a c) EPIC
Explanation: It takes exactly one clock cycle d) Multi-core
to perform a basic operation, such as moving
om
7. Processor which is complex and expensive Answer: d
to produce is ________ Explanation: The processor is responsible for
a) RISC processing the basic instructions in order to
b) EPIC drive a computer. The primary functions of a
c) CISC processor are fetch, decode and execute.
d) Multi-core
.c
Answer: c TOPIC 3.2 BUILDING A
Explanation: CISC stands for complex DATAPATH
instruction set computer. It is mostly used in
ul
personal computers. It has a large instruction 1. ____________ is the raw material used as
set and a variable length of instructions. input and __________ is the processed data
obtained as output of data processing.
8. The architecture that uses a tighter
processor is ____________
pa
coupling between the compiler and the
a) Data, Instructions
b) Instructions, Program
c) Data, Program
a) EPIC d) Program, Code
b) Multi-core
c) RISC Answer: a
jin
d) CISC Explanation: Data can be assumed as a raw
material which, in turns after processing gives
Answer: a the desired output in the form of instructions.
Explanation: EPIC stands for Explicitly Further, a set of ordered and meaningful
parallel instruction computing. It has a tighter
.re
high and its level of accuracy depends on its The registers act as intermediate storage for
design. A computer can perform any task if, it the data.
can be broken down into a series of logical
steps. Therefore, a computer is versatile. 5. What does MAR stand for?
a) Main Address Register
3. Fill in the blank in the diagram. b) Memory Access Register
om
c) Main Accessible Register
d) Memory Address Register
Answer: d
Explanation: MAR is a type of register
which is responsible for the fetch operation.
MAR is connected to the address bus and it
.c
specifies the address for the read and write
operations.
ul
b) Memory Unit combinational logic, then they are generated
c) Control Unit by a type of _______________ controlled
d) I/O Unit unit.
a) Micro programmed
Answer: c
pa
Explanation: The control unit manages and
b) Software
c) Logic
coordinates the operations of a computer d) Hardwired
system. The ALU is responsible for
performing all the arithmetic and bitwise Answer: d
jin
operations . Therefore, both these units Explanation: The main task of a control unit
combine to form the brain of the computer is to generate control signals. There are two
,which is the central processing unit. main types of control units:
A hardwired control unit generates control
4. The part of a processor which contains signals by using combinational logic circuits
.re
hardware necessary to perform all the and the Micro programmed control unit
operations required by a computer: generates control signals by using some
a) Data path softwares.
b) Controller
c) Registers 7. Which is the simplest method of
w
A data path which contains the hardware Explanation: There are 3 ways of
necessary to perform all the operations. A implementing hardwired control unit:
controller tells the data path what needs to be A state table is the simplest method in which
done. a number of circuits are designed based on
the cells in the table.
om
8. A set of microinstructions for a single
machine instruction is called ___________ 1. ______ have been developed specifically
a) Program for pipelined systems.
b) Command a) Utility software
c) Micro program b) Speed up utilities
d) Micro command c) Optimizing compilers
.c
d) None of the mentioned
Answer: c
Explanation: For every micro-operation, a Answer: c
set of microinstructions are written which Explanation: The compilers which are
ul
indicate the control signals to be activated. A designed to remove redundant parts of the
set of microinstructions is a micro program. code are called as optimizing compilers.
The address of the next microinstruction is
pa
given by a Micro-program counter. 2. The pipelining process is also called as
______
9. Micro-program consists of a set of a) Superscalar operation
microinstructions which are strings of 0s and b) Assembly line operation
1s. c) Von Neumann cycle
a) True d) None of the mentioned
jin
b) False
Answer: b
Answer: a Explanation: It is called so because it
Explanation: The computer understands only performs its operation at the assembly level.
binary language. So, the micro-program
.re
should have instructions which are in the 3. The fetch and execution cycles are
form of 0s and 1s. Each output line of the interleaved with the help of ________
micro-program corresponds to one control a) Modification in processor architecture
signal. b) Clock
c) Special unit
w
om
least time is performed first.
a) True Answer: a
b) False Explanation: None.
.c
b) Stock
6. If a unit completes its task before the c) Deadlock
allotted time period, then _______ d) Structural hazard
a) It’ll perform some other task in the
ul
remaining time Answer: a
b) Its time gets reallocated to a different task Explanation: Data hazards are generally
c) It’ll remain idle for the remaining time caused when the data is not ready on the
d) None of the mentioned destination side.
Answer: c
pa TOPIC 3.4 PIPELINED
Explanation: None.
DATAPATH AND CONTROL
7. To increase the speed of memory access in
jin
pipelining, we make use of _______ 1. ______ have been developed specifically
a) Special memory locations for pipelined systems.
b) Special purpose registers a) Utility software
c) Cache b) Speed up utilities
d) Buffers c) Optimizing compilers
.re
om
factor of 10.
Answer: b
Explanation: The time cycle of the clock is 8. The periods of time when the unit is idle is
adjusted to perform the interleaving. called as _____
a) Stalls
4. Each stage in pipelining should be b) Bubbles
completed within ___________ cycle. c) Hazards
.c
a) 1 d) Both Stalls and Bubbles
b) 2
c) 3 Answer: d
d) 4 Explanation: The stalls are a type of hazards
ul
that affect a pipelined system.
Answer: a
Explanation: The stages in the pipelining 9. The contention for the usage of a hardware
should get completed within one cycle to device is called ______
increase the speed of performance.
pa a) Structural hazard
b) Stalk
5. In pipelining the task which requires the c) Deadlock
least time is performed first. d) None of the mentioned
a) True
jin
b) False Answer: a
Explanation: None.
Answer: b
Explanation: This is done to avoid starvation 10. The situation wherein the data of
of the longer task. operands are not available is called ______
.re
a) Data hazard
6. If a unit completes its task before the b) Stock
allotted time period, then _______ c) Deadlock
a) It’ll perform some other task in the d) Structural hazard
remaining time
Answer: a
w
Answer: c
Explanation: None.
TOPIC 3.5 DATA HAZARDS:
7. To increase the speed of memory access in FORWARDING VERSUS
w
om
Answer: a
Answer: a Explanation: The control hazard also called
Explanation: An hazard causes a delay in the as instruction hazard is usually caused by a
execution process of the processor. cache miss.
2. The periods of time when the unit is idle is 6. The time lost due to the branch instruction
called as ________ is often referred to as ____________
.c
a) Stalls a) Latency
b) Bubbles b) Delay
c) Hazards c) Branch penalty
d) Both Stalls and Bubbles d) None of the mentioned
ul
Answer: d Answer: c
Explanation: The stalls are a type of hazards Explanation: This time also retards the
that affect a pipe-lined system. performance speed of the processor.
pa
3. The contention for the usage of a hardware 7. The pipeline bubbling is a method used to
device is called ______ prevent data hazard and structural hazards.
a) Structural hazard a) True
b) Stalk b) False
jin
c) Deadlock
d) None of the mentioned Answer: a
Explanation: The periods of time when the
Answer: a unit is idle is called a Bubble.
Explanation: The processor contends for the
.re
usage of the hardware and might enter into a 8. ____________ method is used in
deadlock state. centralized systems to perform out of order
execution.
4. The situation wherein the data of operands a) Scorecard
are not available is called ______ b) Score boarding
w
caused when the data is not ready on the scoreboard determines that there are no
destination side. conflicts with previously issued and
incomplete instructions.
5. The stalling of the processor due to the
unavailability of the instructions is called as
om
d) None of the mentioned performance is ___________
a) Cost effectiveness
Answer: a b) Increase in performance
Explanation: The Tomasulo algorithm is a c) Lack of complex hardware design
hardware algorithm developed in 1967 by d) All of the mentioned
Robert Tomasulo from IBM. It allows
sequential instructions that would normally Answer: c
.c
be stalled due to certain dependencies to Explanation: The Pipe-lining and super-
execute non-sequentially (out-of-order scalar architectures involved the usage of
execution). complex hardware circuits for the
implementation.
ul
10. The problem where process concurrency
becomes an issue is called as ___________ 4. In VLIW the decision for the order of
a) Philosophers problem execution of the instructions depends on the
program itself.
b) Bakery problem
c) Bankers problem
d) Reader-writer problem
pa a) True
b) False
Answer: d Answer: a
Explanation: None. Explanation: In other words, the order of
jin
execution of instructions has nothing to do
with the physical hardware implementation of
TOPIC 3.6 PARALLELISM VIA the system.
INSTRUCTIONS.
5. The parallel execution of operations in
.re
d) Encoder
Answer: a
Explanation: It is the architecture designed to Answer: c
perform multiple operations in parallel. Explanation: The compiler first checks the
w
Answer: d
Explanation: As the compiler only decides
the schedule of execution the schedule is not
UNIT IV MEMORY AND
om
required here.
.c
d) MIMD
1. The standard SRAM chips are costly as
Answer: d _________
Explanation: The MIMD stands for Multiple a) They use highly advanced micro-electronic
ul
Instructions Multiple Data. devices
b) They house 6 transistor per chip
8. The following instruction is allowed in c) They require specially designed PCB’s
VLIW:
pa
f12 = f0 * f4, f8 = f8 + f12, f0 = dm(i0, m3),
d) None of the mentioned
f4 = b
Answer: pm(i8, m9);
Explanation: As they require a large number
a) True of transistors, their cost per bit increases.
b) False
jin
2. The drawback of building a large memory
Answer: a
with DRAM is ______________
Explanation: The above mentioned
a) The large cost factor
instruction is a complex 48 bit instruction
b) The inefficient memory organisation
used to perform operations on floating
c) The Slow speed of operation
.re
numbers.
d) All of the mentioned
9. To compute the direction of the branch the
Answer: c
VLIW uses _____________ Explanation: The DRAM’s were used for
a) Seekers large memory modules for a long time until a
b) Heuristics
w
4. The fastest data access is provided using 8. The last on the hierarchy scale of memory
_______ devices is ______
a) Caches a) Main memory
b) DRAM’s b) Secondary memory
c) SRAM’s c) TLB
d) Registers d) Flash drives
om
Answer: d Answer: b
Explanation: The fastest data access is Explanation: The secondary memory is the
provided using registers as these memory slowest memory device.
locations are situated inside the processor.
9. In the memory hierarchy, as the speed of
5. The memory which is used to store the operation increases the memory size also
.c
copy of data or instructions stored in larger increases.
memories, inside the CPU is called _______ a) True
a) Level 1 cache b) False
b) Level 2 cache
ul
c) Registers Answer: b
d) TLB Explanation: As the speed of operation
increases the cost increases and the size
Answer: a decreases.
pa
Explanation: These memory devices are
generally used to map onto the data stored in 10. If we use the flash drives instead of the
the larger memories. harddisks, then the secondary storage can go
above primary memory in the hierarchy.
6. The larger memory placed between the a) True
jin
primary cache and the memory is called b) False
______
a) Level 1 cache Answer: b
b) Level 2 cache Explanation: The flash drives will increase
c) EEPROM the speed of transfer but still it won’t be faster
.re
Answer: b
Explanation: This is basically used to
TOPIC 4.2 MEMORY CHIP
provide effective memory mapping. ORGANIZATION
w
7. The next level of memory hierarchy after 1. Any electronic holding place where data
the L2 cache is _______ can be stored and retrieved later whenever
a) Secondary storage required is ____________
w
b) TLB a) memory
c) Main memory b) drive
d) Register c) disk
w
d) circuit
Answer: d
Explanation: None. Answer: a
Explanation: Memory is the place where data
can be stored and later retrieved. Memory can
om
permanent programs like BIOS.
Answer: a
Explanation: Cache Memory is the memory 6. Which of the following is independent of
closest to the CPU. Registers, Cache and the the address bus?
main memory are the means of onboard a) Secondary memory
storage in the computer system. b) Main memory
c) Onboard memory
.c
3. Which of the following is the fastest means d) Cache memory
of memory access for CPU?
a) Registers Answer: a
b) Cache Explanation: The secondary memory is
ul
c) Main memory independent of the address bus. It increases
d) Virtual Memory the storage space. It is implemented in the
form of magnetic storage devices.
Answer: a
pa
Explanation: Registers are the fastest means
of access for CPU. Registers are the small
7. ____________ storage is a system where a
robotic arm will connect or disconnect off-
memory locations which are present closest to line mass storage media according to the
the CPU. computer operating system demands.
a) Secondary
jin
4. The memory implemented using the b) Virtual
semiconductor chips is _________ c) Tertiary
a) Cache d) Magnetic
b) Main
c) Secondary Answer: c
.re
Main memory is located on the motherboard. personal computer never sees firsthand.
It mainly consists of RAM and small amount
of ROM. 8. What is the location of the internal
registers of CPU?
w
b) Virtual d) Motherboard
c) Secondary
d) Cache Answer: b
Explanation: The internal registers are
present on-chip. They are therefore present
om
c) Main accessible register the DRAM chips. SRAM stands for Static
d) Memory accessible register RAM. It is faster and is expensive.
.c
c) FOUND
10. If M denotes the number of memory d) ERROR
locations and N denotes the word size, then
an expression that denotes the storage Answer: a
ul
capacity is ______________ Explanation: Whenever the data is found in
a) M*N the cache memory, it is called as Cache HIT.
b) M+N CPU first checks in the cache memory since it
c) 2M+N is closest to the CPU.
d) 2M-N
pa 4. LRU stands for ___________
Answer: a a) Low Rate Usage
Explanation: Storage capacity is the product b) Least Rate Usage
of a number of memory locations that is the c) Least Recently Used
jin
number of words and the word size or the d) Low Required Usage
number of bits stored per location. Storage
capacity should be as large as possible. Answer: c
Explanation: LRU stands for Least Recently
Used. LRU is a type of replacement policy
.re
1. What is the high speed memory between 5. When the data at a location in cache is
the main memory and the CPU called? different from the data located in the main
a) Register Memory memory, the cache is called _____________
w
Answer: b
Explanation: It is called the Cache Memory. Answer: b
The cache memory is the high speed memory Explanation: The cache is said to be
w
between the main memory and the CPU. inconsistent. Inconsistency must be avoided
as it leads to serious data bugs.
2. Cache Memory is implemented using the
DRAM chips. 6. Which of the following is not a write
policy to avoid Cache Coherence?
a) Write through sign bit, 8 bits for the exponent and 23 bits
b) Write within for the mantissa.
c) Write back
d) Buffered write 10. The transfer between CPU and Cache is
______________
Answer: b a) Block transfer
om
Explanation: There is no policy which is b) Word transfer
called as the write within policy. The other c) Set transfer
three options are the write policies which are d) Associative transfer
used to avoid cache coherence.
Answer: b
7. Which of the following is an efficient Explanation: The transfer is a word transfer.
method of cache updating? In the memory subsystem, word is transferred
.c
a) Snoopy writes over the memory data bus and it typically has
b) Write through a width of a word or half-word.
c) Write within
d) Buffered write
ul
TOPIC 4.4 VIRTUAL MEMORY
Answer: a
Explanation: Snoopy writes is the efficient 1. Because of virtual memory, the memory
method for updating the cache. In this case, can be shared among ____________
pa
the cache controller snoops or monitors the
operations of other bus masters.
a) processes
b) threads
c) instructions
8. In ____________ mapping, the data can be d) none of the mentioned
mapped anywhere in the Cache Memory.
jin
a) Associative Answer: a
b) Direct Explanation: None.
c) Set Associative
d) Indirect 2. _____ is the concept in which a process is
copied into the main memory from the
.re
d) Swapping
9. The number of sign bits in a 32-bit IEEE
format is ____ Answer: b
a) 1 Explanation: None.
w
b) 11
c) 9 3. The pager concerns with the
d) 23 ____________
a) individual page of a process
w
om
c) cpu 9. A process is thrashing if ____________
d) none of the mentioned a) it is spending more time paging than
executing
Answer: b b) it is spending less time paging than
Explanation: None. executing
c) page fault occurs
5. When a program tries to access a page that d) swapping can not take place
.c
is mapped in address space but not loaded in
physical memory, then ____________ Answer: a
a) segmentation fault occurs Explanation: None.
b) fatal error occurs
ul
c) page fault occurs 10. Working set model for page replacement
d) no error occurs is based on the assumption of ____________
a) modularity
Answer: c b) locality
Explanation: None.
pa c) globalization
d) random access
6. Effective access time is directly
proportional to ____________ Answer: b
a) page-fault rate Explanation: None.
jin
b) hit ratio
c) memory access time
d) none of the mentioned
TOPIC 4.5 PARALLEL BUS
ARCHITECTURES
Answer: a
.re
om
Explanation: By using Buffer registers, the
processor sends the data to the I/O device at 7. _____ register Connected to the Processor
the processor speed and the data gets stored in bus is a single-way transfer capable.
the buffer. After that the data gets sent to or a) PC
from the buffer to the devices at the device b) IR
speed. c) Temp
d) Z
.c
3. To extend the connectivity of the processor
bus we use ________ Answer: d
a) PCI bus Explanation: The Z register is a special
b) SCSI bus register which can interact with the processor
ul
c) Controllers BUS only.
d) Multiple bus
8. In multiple Bus organisation, the registers
Answer: a are collectively placed and referred as ______
pa
Explanation: PCI BUS is used to connect
other peripheral devices that require a direct
a) Set registers
b) Register file
connection with the processor. c) Register Block
d) Map registers
4. IBM developed a bus standard for their line
jin
of computers ‘PC AT’ called _____ Answer: b
a) IB bus Explanation: None.
b) M-bus
c) ISA 9. The main advantage of multiple bus
d) None of the mentioned organisation over a single bus is _____
.re
CPU is ______
a) PCI bus Answer: a
b) SCSI bus Explanation: None.
c) Memory bus
w
om
present in the channels of communication? influenced by our emotions. Emotions play a
a) Noise very important role in our lives.
b) Semantic problems
5. In which of these problems, is the actual
c) Cultural barriers
message lost in the abundance of transmitted
d) Over communication
information?
Answer: a a) Selecting perception
.c
Explanation: Noise is the external sounds b) Over communication
present in the channels of communication, c) Under communication
which results in the reduction of the audibility d) Filtering
ul
or omission of some words from the message.
Answer: b
2. Which of these should not be avoided for Explanation: In the case of over
effective communication? communication, the actual message is lost in
the jungle of information whereas in under
a) Noise
b) Planning
c) Semantic problems
pa communication the sender is blamed for
sharing less information.
d) Wrong assumptions
6. Communication should serve as a conflict-
Answer: b reduction exercise.
jin
Explanation: Lack of planning must be a) True
avoided for effects communication. There are b) False
innumerable examples of people who would
Answer: a
give an ill planned, long winding lecture
Explanation: The statement is true.
.re
Answer: b c) Decoding
Explanation: The correct statement is: d) Feedback
Semantic problems are problems arising from
w
Answer: c
expression or transmission of meaning in
Explanation: The correct statement is:
communication.
Decoding means to impart understanding of
4. Both encoding and decoding of message the message. Receiver has to identify the
are influenced by our emotions. person, words symbols, etc..
om
message.
TOPIC 4.7 SERIAL BUS
Answer: d ARCHITECTURES
Explanation: Communication is complete
only when the receiver understands the 1. The main virtue for using single Bus
message. Many communication problems structure is ____________
arise because of misunderstandings. a) Fast data transfers
.c
b) Cost effective connectivity and speed
9. ______ is the first enemy of c) Cost effective connectivity and ease of
communication. attaching peripheral devices
a) Noise
ul
d) None of the mentioned
b) Clarity
c) Politeness Answer: c
d) Completeness pa Explanation: By using a single BUS
structure we can minimize the amount of
Answer: a hardware (wire) required and thereby
Explanation: The correct statement is: Noise reducing the cost.
is the first and foremost enemy of
communication. Every possible effort must be 2. ______ are used to overcome the
made to eliminate the element of noise that difference in data transfer speeds of various
jin
distorts communication. devices.
a) Speed enhancing circuitory
10. Which of these must be avoided for b) Bridge circuits
effective communication? c) Multiple Buses
a) Sharing of activity
.re
d) Buffer registers
b) Listening
c) Ambiguity Answer: d
d) Politeness Explanation: By using Buffer registers, the
processor sends the data to the I/O device at
Answer: c the processor speed and the data gets stored in
w
Explanation: Ambiguity must be avoided. the buffer. After that the data gets sent to or
Clarity and crispness of the message is very from the buffer to the devices at the device
important. The sender of the message should speed.
be careful to see that the receiver does not
w
have to go beyond the text of the message. 3. To extend the connectivity of the processor
bus we use ________
11. Which of these is not a commandment of a) PCI bus
w
om
of computers ‘PC AT’ called _____ Explanation: None.
a) IB bus
b) M-bus 9. The main advantage of multiple bus
c) ISA organisation over a single bus is _____
d) None of the mentioned a) Reduction in the number of cycles for
execution
Answer: c b) Increase in size of the registers
.c
Explanation: None. c) Better Connectivity
d) None of the mentioned
5. The bus used to connect the monitor to the
CPU is ______ Answer: a
ul
a) PCI bus Explanation: None.
b) SCSI bus
c) Memory bus 10. The ISA standard Buses are used to
d) Rambus connect ___________
Answer: b
pa a) RAM and processor
b) GPU and processor
Explanation: SCSI BUS is usually used to c) Harddisk and Processor
connect video devices to the processor. d) CD/DVD drives and Processor
jin
6. ANSI stands for __________ Answer: c
a) American National Standards Institute Explanation: None.
b) American National Standard Interface
c) American Network Standard Interfacing
d) American Network Security Interrupt
TOPIC 4.8 MASS STORAGE
.re
a) PC d) secondary storage
b) IR
c) Temp Answer: c
w
d) Z Explanation: None.
Answer: c Answer: b
Explanation: None. Explanation: None.
om
c) removable disk b) more
d) none of the mentioned c) much lesser
d) none of the mentioned
Answer: c
Explanation: None. Answer: b
Explanation: None.
4. The magneto-optic head flies ___________
.c
the disk surface than a magnetic disk head 9. Random access to tape is _______ a disk
does. seek.
a) much farther from a) much slower than
b) much closer to b) much faster than
ul
c) at the same distance as c) comparable to
d) none of the mentioned d) none of the mentioned
Answer: a Answer: a
Explanation: None.
pa Explanation: None.
5. Optical disks ______ magnetism. 10. A typical tape drive is ________ a typical
a) use disk drive.
b) do not use a) more expensive than
jin
c) may use b) cheaper than
d) none of the mentioned c) of the same cost as
d) none of the mentioned
Answer: b
Explanation: None. Answer: a
.re
Explanation: None.
6. The phase change disk is coated with a
material that can freeze into either _______ 11. The surface area of tape is ________ the
or ________ state. surface area of a disk.
a) crystalline, solid a) much lesser than
b) ice, amorphous b) much larger than
w
Answer: d Answer: b
Explanation: None. Explanation: None.
1. Input Devices that use a special ink that predefined set of characters and print one line
contains magnetizable particles of iron oxide at a time. Drum plotters is an ideal device for
are ____ architects and others who need to generate
a) Optical disks high-precision hard copy graphics output of
b) Magnetic disks widely varying sizes.
c) MICR
om
d) Magnetic drives 5. Name the device that converts text
information into spoken sentences.
Answer: c a) Speech Sensors
Explanation: MICR reads data on cheques b) Compact convertors
and sorts them for distribution to other banks c) Speech Synthesizers
or for further processing. MICR stands for d) Voice systems
Magnetic-Ink-Character Recognition.
.c
Answer: c
2. MICR character set consists of only 2 Explanation: A speech synthesizer converts
digits 0 and 1. text information into spoken sentences. It is
a) True used for reading out text information to blind
ul
b) False people. Allowing people to communicate
effectively.
Answer: b
Explanation: The statement is false. It 6. Which of the following is not a part of a
pa
consists of numerals from 0 to 9 and 4 special
characters. It supports only 14 symbols.
digitizer?
a) Digitizing tablet
b) Cursor
3. A printer that prints one line at a time and c) Stick
has a predefined set of characters is called d) Stylus
jin
_______
a) Laser Answer: c
b) Drum Explanation: A digitizer consists of a
c) Inkjet digitizing tablet, a stylus in the form of a
d) Impact cross-hair cursor. A digitizer is used in the
.re
areas of GIS.
Answer: b
Explanation: The drum printers print one line 7. Which is the device used for converting
at a time. They have a cylindrical drum with maps, pictures and drawings into digital form
characters embossed on its surface in the for storage in computers?
w
a) Flatbed
b) Laser Answer: a
c) Drum Explanation: A digitizer serves the purpose
w
om
d) RAID classification
CHALLENGES
Answer: c
Explanation: Enhanced reliability is achieved 1. Execution of several activities at the same
by using techniques like mirroring and time.
stripping in case of disk arrays. Stripping is a) processing
the division of a large file into smaller parts b) parallel processing
.c
and then storing them on different disks. c) serial processing
d) multitasking
9. Which of the following Printers have a
speed in the range of 40-300 characters per
ul
Answer: b
second? Explanation: Execution of several activities
a) Inkjet at the same time is referred to as parallel
b) Laser pa processing. Like, Two multiplications at the
c) Dot matrix same time on 2 different processes.
d) Drum
2. Parallel processing has single execution
Answer: a flow.
Explanation: The inkjet printers are non- a) True
impact printers. Hence, they cannot produce b) False
jin
multiple copies of a document in a single
printing. Can be both monochrome and color. Answer: b
Explanation: The statement is false.
10. Which of the following is a temporary Sequential programming specifically has
output?
.re
Answer: b c) Threads
Explanation: There are only two types of d) Concurrency
outputs: hard copy and soft copy. Soft copy
output is temporary and vanishes after use. Answer: d
w
Hard copy output is permanent in nature and Explanation: Concurrency is the term used
can be kept in paper files, etc. for the same. When several things are
accessed simultaneously, the job is said to be
w
concurrent.
Answer: b Answer: c
Explanation: Parallelism leads naturally to Explanation: The measure of the “effort”
Concurrency. For example, Several processes needed to maintain efficiency while adding
om
trying to print a file on a single printer. processors is called as scalabilty.
5. A parallelism based on increasing 9. The rate at which the problem size need to
processor word size. be increased to maintain efficiency.
a) Increasing a) Isoeffciency
b) Count based b) Efficiency
c) Bit based c) Scalabilty
.c
d) Bit level d) Effectiveness
Answer: d Answer: a
Explanation: Bit level parallelism is based on Explanation: Isoefficiency is the rate at
ul
increasing processor word size. It focuses on which the problem size need to be increased
hardware capabilities for structuring. to maintain efficiency.
Answer: a
maintain efficiency while adding processors. Explanation: Concurrency is often used in
a) Maintainablity place of multithreading. Multitasking allows
b) Efficiency multiple threads to run at a time.
om
Explanation: The statement is false. overridden (It is similar to main method of
Multitasking allows single processor to run sequential program).
several concurrent threads.
7. An interface that is implemented while
3. A single sequential flow of control within a using threads.
program is ________ a) java.lang.Run
a) Process b) java.lang.Runnable
.c
b) Task c) java.lang.Thread
c) Thread d) java.lang.Threads
d) Structure
Answer: b
ul
Answer: c Explanation: java.lang.Runnable is correct.
Explanation: A thread is a sequential flow of Any thread class implements runnable.
control within a program. Single-threaded
program can handle one task at any time. 8. A thread becomes non runnable when?
pa
4. Both client and server release _________
a) Its stop method is invoked
b) Its sleep method is invoked
connection after a page has been transferred. c) Its finish method is invoked
a) IP d) Its init method is invoked
b) TCP
jin
c) Hyperlink Answer: b
d) Network Explanation: A thread becomes Not
Runnable when one of these events occurs:
Answer: b • Its sleep method is invoked.
Explanation: The answer is TCP. TCP stands • The thread calls the wait method to wait for
.re
b) java.language.Thread a) yield()
c) java.lang.Threads b) set()
d) java.Thread c) release()
d) start()
w
Answer: a
Explanation: java.lang.Thread is the class Answer: a
that is extended if any user wants to extend Explanation: We can use the yield() method
w
om
Explanation: The answer is join(). We can kernel thread
use the join() method to force one thread to c) there is only one kernel thread
wait for another thread to finish. d) none of the mentioned
Answer: a
TOPIC 5.3 MULTICORE AND Explanation: None.
SHARED MEMORY
.c
MULTIPROCESSORS 5. The One to One model allows
___________
1. The model in which one kernel thread is a) increased concurrency
b) decreased concurrency
ul
mapped to many user-level threads is called
___________ c) increased or decreased concurrency
a) Many to One model d) concurrency equivalent to other models
b) One to Many model
Answer: a
c) Many to Many model
d) One to One model
pa Explanation: None.
om
c) When there is a single processor buffer of a graphics system is known as
d) None of the mentioned a) Resolution
b) Depth
Answer: a c) Resalution
Explanation: None. d) Only a
.c
concurrency cannot be gained because Explanation: Number of pixels determines
___________ the resolution .
a) the kernel can schedule only one thread at
a time 3. In graphical system, the array of pixels in
ul
b) there are too many threads to handle the picture are stored in
c) it is hard to map threads with each other a) Memory
d) none of the mentioned b) Frame buffer
c) Processor
Answer: a
Explanation: None.
pa d) All of the mentioned
Answer: a
10. In the Many to Many models when a Explanation: Frame buffer is mainly used to
thread performs a blocking system call store pixels.
jin
___________
a) other threads are strictly prohibited from 4. Heat supplied to the cathode by directing a
running current through a coil of wire is called
b) other threads are allowed to run a) Electron gun
c) other threads only from other processes are b) Electron beam
.re
Answer: b Answer: c
Explanation: None. Explanation: In CRT the filament is
w
UNITS referred as
a) Picture
b) Resolution
1. Which devices provides positional
w
c) Persistence
information to the graphics system ?
d) Neither b nor c
a) Input devices
b) Output devices Answer: b
c) Pointing devices Explanation: none.
d) Both a and c
6.________ stores the picture information as 10. Which display devices allows us to walk
a charge distribution behind the phosphor- around an object and view it from different
coated screen. sides.
a) Cathode ray tube a) Direct view storage tubes
b) Direct-view storage tube b) Three-dimensional devices
c) Flat panel displays c) Flat panel display devices
om
d) 3D viewing device d) Plasma panel display devices
Answer: b Answer: b
Explanation: Instead of refreshing, DVST Explanation: 3D display devices allows user
stores the picture information behind the to view the object from different sides.
screen.
11. In LCD, the refresh rate of the screen is
.c
7. The devices which converts the electrical a) 60 frames/sec
energy into light is called b) 80 frames/sec
a) Liquid-crystal displays c) 30 frames/sec
b) Non-emitters d) 100 frames/sec
ul
c) Plasma panels
d) Emitters Answer: a
Explanation: LCD screen is refreshed at 60
Answer: d frames per second.
pa
Explanation: Emissive displays are devices
that convert electrical energy into light. 12. Random-scan system mainly designed for
a) Realistic shaded screen
8. In which system, the Shadow mask b) Fog effect
methods are commonly used c) Line-drawing applications
jin
a) Raster-scan system d) Only b
b) Random-scan system
c) Only b Answer: c
d) Both a and b Explanation: Random-scan system mainly
designed for Line-drawing applications.
.re
Answer: a
Explanation: Raster-scan system uses 13. The primary output device in a graphics
shadow-mask method because they produce system is_________
wide range of colors. a) Scanner
b) Video monitor
w
Answer: c Answer: d
Explanation: Bit map frame buffer is always Explanation: A distributed system is a
1 bit per pixel. computer system spread out over a
om
geographic area.
15. Aspect ratio means
a) Number of pixels 4. The software which governs the group of
b) Ratio of vertical points to horizontal points computers is __________
c) Ratio of horizontal points to vertical points a) Driver Rd45
d) Both b and c b) Interface UI
c) Clustering middleware
.c
Answer: d d) Distributor
Explanation: none.
Answer: c
Explanation: The software helps to project a
ul
TOPIC 5.5 CLUSTERS AND single system image to the user.
WAREHOUSE SCALE
COMPUTERS 5. The simplest form of a cluster is
__________ approach.
pa
1. The set of loosely connected computers are
called as __________
a) Beowolf
b) Sequoia
a) LAN c) Stone
b) WAN d) None of the mentioned
c) Workstation
jin
Answer: a
d) Cluster
Explanation: None.
Answer: d
6. The cluster formation in which the work is
Explanation: In a computer cluster all the
divided equally among the systems is ______
.re
b) Rj-45
Answer: a
c) STP
Explanation: This approach the work gets
d) Coaxial cable
divided among the systems equally.
w
Answer: b
7. In the client server model of the cluster
Explanation: The computers are connected to
_________ approach is used.
each other using a LAN connector cable.
a) Load configuration
w
Answer: d Answer: b
Explanation: By using this approach the Explanation: It is referred to as a physical
performance of the cluster can be enhanced. LAN topology. LAN stands for Local Area
Network.
8. The beowolf structure follows the
__________ approach of a relationship 2. Bus is a type of topology.
om
between the systems. a) True
a) Master-slave b) False
b) Asynchronous
c) Synchronous Answer: a
d) Isochronous Explanation: The statement is true. Bus
topology is an arrangement where all nodes
Answer: a are interconnected using a single-cable.
.c
Explanation: None.
3. _____ LAN topology describes the
9. The most common modes of possible connections between pairs of
communication in clusters are ______ networked end-points that can communicate.
ul
a) Message queues a) Complex
b) Message passing interface b) Physical
c) PVm c) Logical
d) Both Message passing interface and PVm d) Incremental
Answer: d
pa Answer: c
Explanation: None. Explanation: A logical LAN topology
describes the possible connections. LAN
10. The method followed in case of node stands for Local Area Network.
jin
failure, wherein the node gets disabled is
_________ 4. A term that refers to the way in which the
a) STONITH nodes of a network are linked together.
b) Fibre channel a) network
c) Fencing b) topology
.re
topologies.
1. A topology that is responsible for a) Complex
describing the geometric arrangement of b) Hybrid
w
om
a) Clients small number of sites. It has the least-cost
b) Servers solution for WANs that contain a small
c) Nodes number of internetworked locations.
d) CPUs
9. A serially connected system of all the hubs
Answer: c of networks.
Explanation: They are referred to as the a) Bus
.c
nodes. There are several topologies designed b) Ring
for arrangements of these nodes like bus, star, c) Daisy chains
etc. d) Star
ul
7. A topology that involves Tokens. Answer: c
a) Star Explanation: The correct option is Daisy
b) Ring chain. This simple approach uses ports on
c) Bus existing hubs for interconnecting the hubs.
d) Daisy Chaining
pa 10. A piece of information which is sent
Answer: b along with the data to the source computer.
Explanation: Ring topology involves sending a) data
and receiving of data with the help of tokens. b) module
jin
Ring started out as a simple peer-to-peer c) token
LAN topology. d) element