True False False False True True
True False False False True True
supercomputers costing tens of millions of dollars that can rightly claim the name “computer”. |True
The textbook for this course is about the structure and function of computers. |True
Interfaces between the computer and peripherals is an example of an organizational attribute. |True
Historically the distinction between architecture and organization has not been an important one. |
False
A particular architecture may span many years and encompass a number of different computer
models, its organization changing with changing technology.|True
Changes in technology not only influence organization but also result in the introduction of more
powerful and more complex architectures. |True
The hierarchical nature of complex systems is essential to both their design and their description. |
True
Both the structure and functioning of a computer are, in essence, simple. |True
A computer must be able to process, store, move, and control data. |True
When data are moved over longer distances, to or from a remote device, the process is known as
data transport. |False
Computer _________ refers to those attributes that have a direct impact on the logical execution of
a program. |architecture
It is a(n) _________ design issue whether a computer will have a multiply instruction. |architectural
It is a(n) _________ issue whether the multiply instruction will be implemented by a special multiply
unit or by a mechanism that makes repeated use of the add unit of the system. |organizational
The __________ moves data between the computer and its external environment. |I/O
A _________ is a mechanism that provides for communication among CPU, main memory, and I/O. |
system interconnection
The world's first general-purpose electronic digital computer was designed and constructed at The
Ohio State University. |False
The major drawback of the EDVAC was that it had to be programmed manually by setting switches
and plugging and unplugging cables. |False
Backward compatible means that the programs written for the older machines can be executed on
the new machine.|True
Computers are classified into generations based on the fundamental hardware technology
employed. |True
A wafer is made of silicon and is broken up into chips which consists of many gates and/or memory
cells plus a number of input and output attachment points.|True
Intel's 4004 was the first chip to contain all of the components of a CPU on a single chip.|True
Designers wrestle with the challenge of balancing processor performance with that of main memory
and other computer components.|True
The Intel x86 evolved from RISC design principles and is used in embedded systems.|False
A common measure of performance for a processor is the rate at which instructions are executed,
expressed as billions of instructions per seconds (BIPS).|False
The _________ was the world's first general-purpose electronic digital computer.|ENIAC
The Electronic Numerical Integrator and Computer project was a response to U.S. needs during
_________.|World War II
The __________ interprets the instructions in memory and causes them to be executed.|control
unit
The memory of the IAS consists of 1000 storage locations called __________.|words
The __________ contains the 8-bit opcode instruction being executed.|instruction register
During the _________ the opcode of the next instruction is loaded into the IR and the address
portion is loaded into the MAR.|fetch cycle
The use of multiple processors on the same chip is referred to as __________ and provides the
potential to increase performance without increasing the clock rate.|multicore
With the __________, Intel introduced the use of superscalar techniques that allow multiple
instructions to execute in parallel. |Pentium
The __________ measures the ability of a computer to complete a single task.|speed metric
ARM processors are designed to meet the needs of _________.|all of the above
Program execution consists of repeating the process of instruction fetch and instruction execution.|
True
Computer systems contain a number of different buses that provide pathways between components
at various levels of the computer system hierarchy.|True
In general, the more devices attached to the bus, the greater the bus length and hence the greater
the propagation delay.|True
It is not possible to connect I/O controllers directly onto the system bus.|False
The method of using the same lines for multiple purposes is known as time multiplexing.|True
Timing refers to the way in which events are coordinated on the bus.|True
With asynchronous timing the occurrence of events on the bus is determined by a clock.|False
Because all devices on a synchronous bus are tied to a fixed clock rate, the system cannot take
advantage of advances in device performance.|True
The unit of transfer at the link layer is a phit and the unit transfer at the physical layer is a flit.|False
A key requirement for PCIe is high capacity to support the needs of higher data rate I/O devices such
as Gigabit Ethernet.|True
Virtually all contemporary computer designs are based on concepts developed by __________ at the
Institute for Advanced Studies, Princeton.|John von Neumann
The processing required for a single instruction is called a(n) __________ cycle.|instruction
A(n) _________ is generated by a failure such as power failure or memory parity error.|hardware
failure interrupt
A(n) _________ is generated by some condition that occurs as a result of an instruction execution.|
program interrupt
A bus that connects major computer components (processor, memory, I/O) is called a __________.|
system bus
The __________ are used to designate the source or destination of the data on the data bus.|
address lines
The data lines provide a path for moving data among system modules and are collectively called the
_________.|data bus
A __________ is the high-level set of rules for exchanging packets of data between devices.|protocol
Each data path consists of a pair of wires (referred to as a __________) that transmits data one bit at
a time.|lane
The _________ receives read and write requests from the software above the TL and creates request
packets for transmission to a destination via the link layer.|transaction layer
No single technology is optimal in satisfying the memory requirements for a computer system.|True
A typical computer system is equipped with a hierarchy of memory subsystems, some internal to the
system and some external.|True
Both sequential access and direct access involve a shared read-write mechanism.|True
In a volatile memory, information decays naturally or is lost when electrical power is switched off.|
True
To achieve greatest performance the memory must be able to keep up with the processor.|True
Secondary memory is used to store program and data files and is usually visible to the programmer
only in terms of individual bytes or words.|False
It has become possible to have a cache on the same chip as the processor.|True
All of the Pentium processors include two on-chip L1 caches, one for data and one for instructions.|
True
Cache design for HPC is the same as that for other hardware platforms and applications.|False
For internal memory, the __________ is equal to the number of electrical lines into and out of the
memory module.|unit of transfer
“Memory is organized into records and access must be made in a specific linear sequence” is a
description of __________.|sequential access
individual blocks or records have a unique address based on physical location with __________.|
direct access
For random-access memory, __________ is the time from the instant that an address is presented to
the memory to the instant that data have been stored or made available
for use.|access time
The ________ consists of the access time plus any additional time required before a second access
can commence.|memory cycle time
A portion of main memory used as a buffer to hold data temporarily that is to be read out to disk is
referred to as a _________.|disk cache
A line includes a _________ that identifies which particular block is currently being stored.|tag
__________ is the simplest mapping technique and maps each block of main memory into only one
possible cache line.|Direct mapping
When using the __________ technique all write operations made to main memory are made to the
cache as well.|write through
The key advantage of the __________ design is that it eliminates contention for the cache between
the instruction fetch/decode unit and the execution unit.|split cache
The Pentium 4 _________ component executes micro-operations, fetching the required data from
the L1 data cache and temporarily storing results in registers.|execution unit
In reference to access time to a two-level memory, a _________ occurs if an accessed word is not
found in the faster memory.|miss
The two traditional forms of RAM used in computers are DRAM and SRAM.|True
A static RAM will hold its data as long as power is supplied to it.|True
Nonvolatile means that power must be continuously supplied to the memory to preserve the bit
values.|False
The advantage of RAM is that the data or program is permanently in main memory and need never
be loaded from a secondary storage device.|False
An error-correcting code enhances the reliability of the memory at the cost of added complexity.|
True
DRAM is much costlier than SRAM.|False
RDRAM is limited by the fact that it can only send data to the processor once per bus clock cycle.|
False
The SRAM on the CDRAM cannot be used as a buffer to support the serial access of a block of data.|
False
In a _________, binary values are stored using traditional flip-flop logic-gate configurations.|SRAM
A __________ contains a permanent pattern of data that cannot be changed, is nonvolatile, and
cannot have new data written into it.|ROM
With _________ the microchip is organized so that a section of memory cells are erased in a single
action.|flash memory
__________ can be caused by harsh environmental abuse, manufacturing defects, and wear.|Hard
errors
The _________ exchanges data with the processor synchronized to an external clock signal and
running at the full speed of the processor/memory bus without imposing wait states.|SDRAM
________ can send data to the processor twice per clock cycle.|DDR-DRAM
__________ increases the data transfer rate by increasing the operational frequency of the RAM
chip and by increasing the prefetch buffer from 2 bits to 4 bits per chip.|DDR2
Theoretically, a DDR module can transfer data at a clock rate in the range of __________ MHz.|200
to 600
The ________ enables the RAM chip to preposition bits to be placed on the data bus as rapidly as
possible.|buffer
Magnetic disks are the foundation of external memory on virtually all computer systems.|True
During a read or write operation, the head rotates while the platter beneath it stays stationary.|
False
The width of a track is double that of the head.|False
There are typically hundreds of sectors per track and they may be either fixed or variable lengths.|
True
A bit near the center of a rotating disk travels past a fixed point slower than a bit on the outside.|
True
The disadvantage of using CAV is that individual blocks of data can only be directly addressed by
track and sector.|False
The head must generate or sense an electromagnetic field of sufficient magnitude to write and read
properly.|True
The transfer time to or from the disk does not depend on the rotation speed of the disk.|False
RAID is a set of physical disk drives viewed by the operating system as a single logical drive.|True
RAID level 0 is not a true member of the RAID family because it does not include redundancy to
improve performance.|True
Because data are striped in very small strips, RAID 3 cannot achieve very high data transfer rates.|
False
The SSDs now on the market use a type of semiconductor memory referred to as flash memory.|
True
Greater ability to withstand shock and damage, improvement in the uniformity of the magnet film
surface to increase disk reliability, and a significant reduction in overall
surface defects to help reduce read-write errors, are all benefits of ___________.|the glass
substrate
In most contemporary systems fixed-length sectors are used, with _________ bytes being the nearly
universal sector size.|512
Scanning information at the same rate by rotating the disk at a fixed speed is known as the
_________.|constant angular velocity
The disadvantage of _________ is that the amount of data that can be stored on the long outer
tracks is only the same as what can be stored on the short inner tracks.|CAV
A __________ disk is permanently mounted in the disk drive, such as the hard disk in a personal
computer.|nonremovable
When the magnetizable coating is applied to both sides of the platter the disk is then referred to as
_________.|double sided
The set of all the tracks in the same relative position on the platter is referred to as a _________.|
cylinder
The sum of the seek time and the rotational delay equals the _________, which is the time it takes
to get into position to read or write.|access time
RAID level ________ has the highest disk overhead of all RAID types.|1
A _________ is a high-definition video disk that can store 25 Gbytes on a single layer on a single
side.|Blu-ray DVD
________ is when the disk rotates more slowly for accesses near the outer edge than for those near
the center.|Constant linear velocity (CLV)
An I/O module must recognize one unique address for each peripheral it controls.|True
I/O channels are commonly seen on microcomputers, whereas I/O controllers are used on
mainframes.|False
It is the responsibility of the processor to periodically check the status of the I/O module until it finds
that the operation is complete.|True
With isolated I/O there is a single address space for memory locations and I/O devices.|False
A disadvantage of memory-mapped I/O is that valuable memory address space is used up.|True
With a daisy chain the processor just picks the interrupt line with the highest priority.|False
The rotating interrupt mode allows the processor to inhibit interrupts from certain devices.|False
Because the 82C55A is programmable via the control register, it can be used to control a variety of
simple peripheral devices.|True
When large volumes of data are to be moved, a more efficient technique is direct memory access
(DMA).|True
An I/O channel has the ability to execute I/O instructions, which gives it complete control over I/O
operations.|True
A multipoint external interface provides a dedicated line between the I/O module and the external
device.|False
A Thunderbolt compatible peripheral interface is no more complex than that of a simple USB
device.|False
The _________ contains logic for performing a communication function between the peripheral and
the bus.|I/O module
The I/O function includes a _________ requirement to coordinate the flow of traffic between
internal resources and external devices.|control and timing
An I/O module that takes on most of the detailed processing burden, presenting a high-level
interface to the processor, is usually referred to as an _________.|I/O channel
An I/O module that is quite primitive and requires detailed control is usually referred to as an
_________.|I/O controller
The _________ command causes the I/O module to take an item of data from the data bus and
subsequently transmit that data item to the peripheral.|write
The ________ command is used to activate a peripheral and tell it what to do.|control
________ is when the DMA module must force the processor to suspend operation temporarily.|
Cycle stealing
________ is a digital display interface standard now widely adopted for computer monitors, laptop
displays, and other graphics and video interfaces .|DisplayPort
The ________ layer is the key to the operation of Thunderbolt and what makes it attractive as a
high-speed peripheral I/O technology.|common transport
The Thunderbolt protocol _________ layer is responsible for link maintenance including hot-plug
detection and data encoding to provide highly efficient data transfer.|physical
The ________ contains I/O protocols that are mapped on to the transport layer.|application
A ________ is used to connect storage systems, routers, and other peripheral devices to an
InfiniBand switch.|target channel adapter
The OS must determine how much processor time is to be devoted to the execution of a particular
user program.|True
With a batch operating system the user does not have direct access to the processor.|True
Privileged instructions are certain instructions that are designated special and can be executed only
by the monitor.|True
With demand paging it is necessary to load an entire process into main memory.|False
ARM provides a versatile virtual memory system architecture that can be tailored to the needs of the
embedded system designer.|True
Managers are users of domains that must observe the access permissions of the individual sections
and/or pages that make up that domain.|False
The __________ is a program that controls the execution of application programs and acts as an
interface between applications and the computer hardware.|operating system
Facilities and services provided by the OS that assist the programmer in creating programs are in the
form of _________ programs that are not actually part of the OS but are accessible through the OS.|
utility
The _________ defines the repertoire of machine language instructions that a computer can follow.|
ISA
The _________ defines the system call interface to the operating system and the hardware
resources and services available in a system through the user instruction set architecture.|ABI
The ________ gives a program access to the hardware resources and services available in a system
through the user instruction set architecture supplemented with high-level language library calls.|
API
A _________ system works only one program at a time.|uniprogramming
The _________ scheduler determines which programs are admitted to the system for processing.|
long-term
________ is when the processor spends most of its time swapping pages rather than executing
instructions.|Thrashing
Virtual memory schemes make use of a special cache called a ________ for page table entries.|TLB
With _________ the virtual address is the same as the physical address.|unsegmented unpaged
memory
The OS maintains a __________ for each process that shows the frame location for each page of the
process.|page table
Negative powers of 10 are used to represent the positions of the numbers for decimal fractions.|
True
A number with both an integer and fractional part has digits raised to both positive and negative
powers of 10.|True
In any number, the rightmost digit is referred to as the most significant digit.|False
The decimal system is a special case of a positional number system with radix 10 and with digits in
the range 0 through 9.|True
Although convenient for computers, the binary system is exceedingly cumbersome for human
beings.|True
Because of the inherent binary nature of digital computer components, all forms of data within
computers are represented by various binary codes.|True
One drawback of sign-magnitude representation is that there are two representations of 0.|True
Both sign-magnitude representation and twos complement representation use the most significant
bit as a sign bit.|True
Compared with addition and subtraction, multiplication is a complex operation, whether performed
in hardware of software.|True
For each 1 on the multiplier, an add and a shift operation are required; but for each 0 only a shift is
required.|True
Addition and subtraction can be performed on numbers in twos complement notation by treating
them as unsigned integers.|True
Booth’s algorithm performs more additions and subtractions than a straightforward algorithm.|False
With a fixed-point notation it is possible to represent a range of positive and negative integers
centered on or near 0.|True
For base 2 representation, a normal number is one in which the most significant bit of the significand
is zero.|False
The numbers represented in floating-point notation are not spaced evenly along the number line, as
are fixed-point numbers.|True
Overflow is a less serious problem because the result can generally be satisfactorily approximated by
0.|False
One of the trade-offs of floating-point math is that many calculations produce results that are not
exact and have to be rounded to the nearest value that the notation can represent.|True
The most common scheme in implementing the integer portion of the ALU is:|twos complement
representation
__________ representation is almost universally used as the processor representation for integers.|
Twos compliment
Moving the sign bit to the new leftmost position and filling in with copies of the sign bit is called
_________.|sign extension
In ________ representation the rule for forming the negation of an integer is to invert the sign bit.|
sign-magnitude
________ is when the result may be larger than can be held in the word size being used.|Overflow
__________ involves the generation of partial products, one for each digit in the multiplier, which
are then summed to produce the final product.|Multiplication
Although considered obsolete, the term _________ is sometimes used instead of significand.|
mantissa
Negative numbers less than –(2 – 2-23) x 2 128 are called _________.|negative overflow
Positive numbers greater than (2 – 2-23) x 2-128 are called _________.|positive overflow
_________ formats extend a supported basic format by providing additional bits in the exponent
and in the significand.|Extended precision
_________ are included in IEEE 754 to handle cases of exponent underflow.|Subnormal numbers
__________ is when a positive exponent exceeds the maximum possible exponent value.|Exponent
overflow
__________ means that the number is too small to be represented and it may be reported as 0.|
Exponent underflow
The operation of the digital computer is based on the storage and processing of binary data.|True
Claude Shannon, a research assistant in the Electrical Engineering Department at M.I.T., proposed
the basic principles of Boolean algebra.|False
In the absence of parentheses, the AND operation takes precedence over the OR operation.|True
The delay by the propagation time of signals through the gate is known as the gate delay.|True
A Boolean function can be realized in the sum of products (SOP) form but not in the product of sums
(POS) form.|False
“Don’t care” conditions are when certain combinations of values of variables never occur, and
therefore the corresponding output never occurs.|True
The value to be loaded into the program counter can come from a binary counter, the instruction
register, or the output of the ALU.|True
Combinational circuits are often referred to as “memoryless” circuits because their output depends
only on their current input and no history of prior inputs is retained.|True
Events in the digital computer are synchronized to a clock pulse so that changes occur only when a
clock pulse occurs.|True
A register is a digital circuit used within the CPU to store one or more bits of data.|True
The operand ________ yields true if and only if both of its operands are true.|AND
The operation _________ yields true if either or both of its operands are true.|OR
For more than four variables an alternative approach is a tabular technique referred to as the
_________ method.|Quine-McCluskey
________ are used in digital circuits to control signal and data routing.|Multiplexers
The ________ exists in one of two states and, in the absence of input, remains in that state.|flip-flop
The ________ flip-flop has two inputs and all possible combinations of input values are valid.|J-K
CPUs make use of _________ counters, in which all of the flip-flops of the counter change at the
same time.|synchronous
The _________ table provides the value of the next output when the inputs and the present output
are known, which is exactly the information needed to design the counter or any sequential circuit.|
excitation
A _________ is a PLD featuring a general structure that allows very high logic capacity and offers
more narrow logic resources and a higher ration of flip-flops to logic resources than do CPLDs.|FPGA
One boundary where the computer designer and the computer programmer can view the same
machine is the machine instruction set.|True
The operation to be performed is specified by a binary code known as the operation code.|True
The address of the next instruction to be fetched must be a real address, not a virtual address.|False
A high-level language expresses operations in a basic form involving the movement of data to or
from registers.|False
One of the traditional ways of describing processor architecture is in terms of the number of
addresses contained in each instruction.|True
Most machines provide the basic arithmetic operations of add, subtract, multiply, and divide.|True
The most fundamental type of machine instruction is the _________ instruction.|data transfer
The entire set of parameters, including return address, which is stored for a procedure invocation is
referred to as a _________.|stack frame
Which ARM operation category includes logical instructions (AND, OR, XOR), add and subtract
instructions, and test and compare instructions?|data-processing instructions
In the ARM architecture only _________ instructions access memory locations.|load and store
The value of the mode field determines which addressing mode is to be used.|True
In a system without virtual memory, the effective address is a virtual address or a register.|False
The disadvantage of immediate addressing is that the size of the number is restricted to the size of
the address field.|True
With direct addressing, the length of the address field is usually less than the word length, thus
limiting the address range.|True
Register addressing is similar to direct addressing with the only difference being that the address
field refers to a register rather than a main memory address.|True
Register indirect addressing uses the same number of memory references as indirect addressing.|
False
Three of the most common uses of stack addressing are relative addressing, base-register
addressing, and indexing.|False
The method of calculating the EA is the same for both base-register addressing and indexing.|True
The base with index and displacement mode sums the contents of the base register, the index
register, and a displacement to form the effective address.|True
The memory transfer rate has not kept up with increases in processor speed.|True
For addresses that reference memory the range of addresses that can be referenced is not related to
the number of address bits.|False
The principal price to pay for variable-length instructions is an increase in the complexity of the
processor.|True
One advantage of linking the addressing mode to the operand rather than the opcode is that any
addressing mode can be used with any opcode.|True
The advantage of __________ is that no memory reference other than the instruction fetch is
required to obtain the operand.|immediate addressing
The principal advantage of ___________ addressing is that it is a very simple form of addressing.|
direct
__________ has the advantage of large address space, however it has the disadvantage of multiple
memory references.|Indirect addressing
The advantages of _________ addressing are that only a small address field is needed in the
instruction and no time-consuming memory references are required.|register
For _________, the address field references a main memory address and the referenced register
contains a positive displacement from that address.|indexing
Which of the following interrelated factors go into determining the use of the addressing bits?|all of
the above
The _________ was designed to provide a powerful and flexible instruction set within the
constraints of a 16-bit minicomputer.|PDP-11
The __________ byte consists of three fields: the Scale field, the Index field and the Base field.|SIB
All instructions in the ARM architecture are __________ bits long and follow a regular format.|32
__________ is a design principle employed in designing the PDP-10 instruction set.|All of the above
The processor needs to store instructions and data temporarily while an instruction is being
executed.|True
The control unit (CU) does the actual computation or processing of data.|False
Within the processor there is a set of registers that function as a level of memory above main
memory and cache in the hierarchy.|True
The allocation of control information between registers and memory are not considered to be a key
design issue.|False
Instruction pipelining is a powerful technique for enhancing performance but requires careful design
to achieve optimum results with reasonable complexity.|True
The cycle time of an instruction pipeline is the time needed to advance a set of instructions one
stage through the pipeline.|True
A control hazard occurs when two or more instructions that are already in the pipeline need the
same resource.|False
One of the major problems in designing an instruction pipeline is assuring a steady flow of
instructions to the initial stages of the pipeline.|True
The predict-never-taken approach is the most popular of all the branch prediction methods.|True
While the processor is in user mode the program being executed is unable to access protected
system resources or to change mode, other than by causing an exception to occur.|True
The exception modes have full access to system resources and can change modes freely.|True
The ________ controls the movement of data and instructions into and out of the processor.|
control unit
________ registers may be used only to hold data and cannot be employed in the calculation of an
operand address.|Data
__________ are bits set by the processor hardware as the result of operations.|Condition codes
The _________ contains the address of an instruction to be fetched.|program counter
The _________ contains a word of data to be written to memory or the word most recently read.|
MBR
The ________ determines the opcode and the operand specifiers.|decode instruction
A ________ hazard occurs when there is a conflict in the access of an operand location.|data
A _________ is a small, very-high-speed memory maintained by the instruction fetch stage of the
pipeline and containing the n most recently fetched instructions in sequence.|loop buffer
The _________ is a small cache memory associated with the instruction fetch stage of the pipeline.|
branch history table
The _________ stage includes ALU operations, cache access, and register update.|execute
Microprogramming eases the task of designing and implementing the control unit and provides
support for the family concept.|True
Pipelining is a means of introducing parallelism into the essentially sequential nature of a machine-
instruction program.|True
It is common for programs, both system and application, to continue to exhibit new bugs after years
of operation.|True
Procedure calls and returns are not important aspects of HLL programs.|False
The register file is on the same chip as the ALU and control unit.|True
The register file employs much shorter addresses than addresses for cache and memory.|True
To handle any possible pattern of calls and returns the number of register windows would have to
be unbounded.|True
When using graph coloring, nodes that share the same color cannot be assigned to the same
register.|False
With simple, one cycle instructions, there is little or no need for microcode.|True
Almost all RISC instructions use simple register addressing.|True
RISC processors are more responsive to interrupts because interrupts are checked between rather
elementary operations.|True
The Patterson study examined the dynamic behavior of _________ programs, independent of the
underlying architecture.|HLL
_________ instructions are used to position quantities in registers temporarily for computational
operations.|Load-and-store
Which stage is required for load and store operations?|all of the above
A ________ instruction can be used to account for data and branch delays.|NOOP
The instruction location immediately following the delayed branch is referred to as the ________.|
delay slot
A tactic similar to the delayed branch is the _________, which can be used on LOAD instructions.|
delayed load
The MIPS R4000 uses ________ bits for all internal and external data paths and for addresses,
registers, and the ALU.|64
All MIPS R series processor instructions are encoded in a single ________ word format.|32-bit
A _________ architecture is one that makes use of more, and more fine-grained pipeline stages.|
superpipelined
The R4000 can have as many as _______ instructions in the pipeline at the same time.|8
The R4000 pipeline stage where the instruction result is written back to the register file is the
__________ stage.|write back
The superscalar approach has now become the standard method for implementing high-
performance microprocessors.|True
In a traditional scalar organization there is a single pipelined functional unit for integer operations
and one for floating-point operations.|True
In the scalar organization there are multiple functional units, each of which is implemented as a
pipeline and provides a degree of parallelism by virtue of its pipelined structure.|False
The superscalar approach depends on the ability to execute multiple instructions in parallel.|True
True data dependency is also called flow dependency or read after write (RAW) dependency.|True
Machine parallelism exists when instructions in a sequence are independent and thus can be
executed in parallel by overlapping.|False
The simplest instruction issue policy is to issue instructions in the exact order that would be achieved
by sequential execution (in-order issue) and to write results in that same order (in-order
completion).|True
In-order completion requires more complex instruction issue logic than out-of-order completion.|
False
The reorder buffer is temporary storage for results completed out of order that are then committed
to the register file in program order.|True
In effect, the Pentium 4 architecture implements a CISC instruction set architecture on a RISC
microarchitecture.|True
The schedulers are responsible for retrieving micro-ops from the micro-op queues and dispatching
these for execution.|True
ARM architecture has yet to implement superscalar techniques in the instruction pipeline.|False
The Cortex-A8 targets a wide variety of mobile and consumer applications including mobile phones,
set-top boxes, gaming consoles and automotives navigation/entertainment systems.|True
The superscalar approach can be used on __________ architecture.|both RISC and CISC
The essence of the ________ approach is the ability to execute instructions independently and
concurrently in different pipelines.|superscalar
Which of the following is a fundamental limitation to parallelism with which the system must cope?|
all of the above
The situation where the second instruction needs data produced by the first instruction to execute is
referred to as __________.|true data dependency
The instructions following a branch have a _________ on the branch and cannot be executed until
the branch is executed.|procedural dependency
________ refers to the process of initiating instruction execution in the processor’s functional
units.|Instruction issue
Instead of the first instruction producing a value that the second instruction uses, with ___________
the second instruction destroys a value that the first instruction uses.|antidependency
________ indicates whether this micro-op is scheduled for execution, has been dispatched for
execution, or has completed execution and is ready for retirement.|State
__________ exists when instructions in a sequence are independent and thus can be executed in
parallel by overlapping.|Instruction-level parallelism
_________ is determined by the number of instructions that can be fetched and executed at the
same time and by the speed and sophistication of the mechanisms that the processor uses to find
independent instructions.|Machine parallelism
________ is used in scalar RISC processors to improve the performance of instructions that require
multiple cycles.|Out-of-order completion
Which of the following is a hardware technique that can be used in a superscalar processor to
enhance performance?|all of the above
The ________ introduced a full-blown superscalar design with out-of-order execution.|Pentium Pro
Utilizing a branch target buffer (BTB), the _________ uses a dynamic branch prediction strategy
based on the history of recent executions of branch instructions.|Pentium 4
Symmetric multiprocessors (SMPs) are one of the earliest, and still the most common, example of
parallel organization.|True
The term SMP refers to a computer hardware architecture and also to the operating system
behavior that reflects that architecture.|True
An attractive feature of an SMP is that the existence of multiple processors is transparent to the
user.|True
An SMP operating system manages processor and other computer resources so that the user
perceives a single operating system controlling system resources.|True
Software cache coherence schemes attempt to avoid the need for additional hardware circuitry and
logic by relying on the compiler and operating system to deal with the problem.|True
With a write-update protocol there can be multiple readers but only one writer at a time.|False
An L1 cache that does not connect directly to the bus cannot engage in a snoopy protocol.|True
The most important measure of performance for a processor is the rate at which it executes
instructions.|True
With multithreading the instruction stream is divided into several smaller streams, known as
threads, such that the threads can be executed in parallel.|True
The function of switching applications and data resources over from a failed system to an alternative
system in the cluster is referred to as failback.|False
Both clusters and symmetric multiprocessors provide a configuration with multiple processors to
support high-demand applications.|True
The objective with NUMA is to maintain a transparent system wide memory while permitting
multiple multiprocessor nodes, each with its own bus or other internal interconnect system.|True
The key to the design of a supercomputer or array processor is to recognize that the main task is to
perform arithmetic operations on arrays or vectors of floating-point numbers.|True
A taxonomy first introduced by _______ is still the most common way of categorizing systems with
parallel processing capability.|Flynn
A _________ problem arises when multiple copies of the same data can exist in different caches
simultaneously, and if processors are allowed to update their own copies freely, an inconsistent view
of memory can result.|cache coherence
A ________ is a dispatchable unit of work within a process that includes a processor context and its
own data area for a stack.|thread
Replicating the entire processor on a single chip with each processor handling separate threads is
_________.|chip multiprocessing
With no multithreading, _________ is the simple pipeline found in traditional RISC and CISC
machines.|single-threaded scalar
_________ causes results issuing from one functional unit to be fed immediately into another
functional unit and so on.|Chaining
The ________ contains control fields, such as the vector count, that determine how many elements
in the vector registers are to be processed.|vector-status register
An operation that switches the processor from one process to another by saving all the process
control data, register, and other information for the first and replacing them with the process
information for the second is:|process switch
With ________ instructions are simultaneously issued from multiple threads to the execution units
of a superscalar processor.|SMT
The organizational changes in processor design have primarily been focused on increasing
instruction-level parallelism so that more work could be done in each clock cycle.|True
With superscalar organization increased performance can be achieved by increasing the number of
parallel pipelines.|True
The increasingly difficult engineering challenge related to processor logic is one of the reasons that
an increasing fraction of the processor chip is devote to the simpler memory logic.|True
The demand on power requirements has not grown as chip density and clock frequency have risen.|
False
As chip transistor density has increased, the percentage of chip area devoted to memory has
decreased.|False
The potential performance benefits of a multicore organization depend on the ability to effectively
exploit the parallel resources available to the application.|true
Database management systems and database applications are one area in which multicore systems
can be used effectively.|True
Even if an individual application does not scale to take advantage of a large number of threads, it is
still possible to gain from multicore architecture by running multiple instances of the application in
parallel.|True
With hybrid threading each major module is single threaded and the principal coordination involves
synchronizing all the threads with a timeline thread.|False
The ARM11 MPCore is an example of the L1 cache being divided into instruction and data caches.|
True
An advantage of using a shared L2 cache on the chip is that data shared by multiple cores is not
replicated at the shared cache level.|True
A potential advantage to having only dedicate L2 caches on the chip is that each core enjoys more
rapid access to its private L2 cache.|True
The thermal management unit monitors digital sensors for high-accuracy die temperature
measurements.|True
The Advanced Programmable Interrupt controller (APIC) monitors thermal conditions and CPU
activity and adjusts voltage levels and power consumption appropriately.|False
With _______, register banks are replicated so that multiple threads can share the use of pipeline
resources.|SMT
_________ is where individual instructions are executed through a pipeline of stages so that while
one instruction is executing in one stage of the pipeline, another
instruction is executing in another stage of the pipeline.|Pipelining
_________ is when multiple pipelines are constructed by replicating execution resources, enabling
parallel execution of instructions in parallel pipelines so long as hazards are avoided.|Superscalar
One way to control power density is to use more of the chip area for ________.|cache memory
_______ applications that can benefit directly from multicore resources include application servers
such as Sun’s Java Application Server, BEA’s Weblogic, IBM’s
A loop that iterates over an array of data can be split up into a number of smaller parallel loops in
individual threads that can be scheduled in parallel when using ________ threading.|fine-grained
The _________ is an example of splitting off a separate, shared L3 cache, with dedicated L1 and L2
caches for each core processor.|Intel Core i7
The ________ connects to the external bus, known as the Front Side Bus, which connects to main
memory, I/O controllers, and other processor chips.|bus interface
The Intel Core i7-990X, introduced in 2008, implements ______ x86 SMT processors, each with a
dedicated L2 cache, and with a shared L3 cache.|4
The ________ feature enables moving dirty data from one CPU to another without writing to L2 and
reading the data back in from external memory.|migratory lines
The ________ is responsible for maintaining coherency among L1 data caches.|snoop control unit
(SCU)
One technique for implementing a control unit is referred to as hardwired implementation, in which
the control unit is a combinatorial circuit.|True
Knowing the machine instruction set does not play a part in knowing the functions that the
processor must perform.|False
The sequence of instruction cycles are always the same as the written sequence of instructions that
make up the program.|False
The execution of a program consists of the sequential execution of instructions.|True
The “read word from memory” and “increment PC” actions cannot be used simultaneously because
they will interfere with each other.|False
Each micro-operation of the fetch cycle involves the movement of data into or out of a register.|
True
At the completion of the execute cycle a test is made to determine whether any enabled interrupts
have occurred, and if they have, the interrupt cycle occurs.|True
Each phase of the instruction cycle can be decomposed into a sequence of elementary micro-
operations.|True
For the control unit to perform its function it must have inputs that allow it to determine the state of
the system and outputs that allow it to control the behavior of the system.|True
The control unit is the engine that runs the entire computer.|True
The use of common data paths simplifies the interconnection layout and the control of the
processor.|True
The number of machine cycles for an instruction depends on the number of times the processor
must communicate with internal devices.|False
The _________ cycle occurs at the beginning of each instruction cycle and causes an instruction to
be fetched from memory.|fetch
The _______ designates the state of the processor in terms of which portion of the cycle it is in.|ICC
The ________ portion of the control unit issues a repetitive sequence of pulses.|clock
The ________ pulse signals the start of each machine cycle from the control unit and alerts external
circuits.|ALE
Microprogramming became a popular technique for implementing the control unit of CISC
processors.|True
To implement a control unit as an interconnection of basic logic elements is a very simple task.|False
Reading a microinstruction from the control memory is the same as executing that
microinstruction.|True
The advantage of horizontal microinstructions is that they are more compact than vertical
microinstructions, at the expense of a small additional amount of logic and time delay.|False
The principal advantage of the use of microprogramming to implement a control unit is that it
simplifies the design of the control unit.|True
The principal disadvantage of a microprogrammed unit is that it will be somewhat slower than a
hardwired unit of comparable technology.|True
The degree of packing relates to the degree of identification between a given control task and
specific microinstruction bits.|True
The PDP-11 is the first member of the LSI-11 family that was offered as a single board processor.|
False
The TI 8800 Software Development Board is a microprogrammable 32-bit computer card that fits
into an IBM PC-compatible host computer.|True
The term microprogram was first coined by __________ in the early 1950s.|M.V. Wilkes
The _________ contains the address of the next microinstruction to be read.|control address
register
When a microinstruction is read from the control memory it is transferred to a _________.|control
buffer register
The terms _________ microprogramming are used to suggest the degree of closeness to the
underlying control signals and hardware layout.|hard/soft
With _________ encoding one field is used to determine the interpretation of another field.|indirect
The _________ allows multiple levels of nested calls or interrupts and it can be used to support
branching and looping.|stack
The _________ is a 32-bit ALU with 64 registers that can be configured to operate as four 8-bit ALUs,
two 16-bit ALUs, or a single 32-bit ALU.|8832
A _________ is a combinatorial circuit that generates an address based on the microinstruction, the
machine instruction, the microinstruction program counter, and an interrupt register.|translation
array