Advance Computer Architecture
Advance Computer Architecture
7. _______ Model is more suitable for special purpose computations. a. SIMD b. MISD c. MIMD d. Both a and b 8. Hazards in pipelines can make it necessary to _________ the pipeline. a. Stall b. Stake c. Storm d. None of the above 9. When a machine is pipelined, the _________ execution of instructions requires pipelining of functional unit. a. Overloaded b. Over ridded c. Overlapped d. Over crowded 10. The ratio which stays constant as performance and cost is increased by equal factors is called asa. Performance Ratio b. Cost Ratio c. Cost-Performance Ratio d. All of the above 11. The cost-performance ratio is a good indicator of _________ quality for small changes. a. Relative b. Absolute c. Absolute relative d. All of the above 12. The processors in a multiprocessor system communication with each other through _________.
we teach !
14. Explicit vector instructions were introduced with the appearance of _____________. a. Processors b. Micro processor c. Intel processors d. Vector processors 15. An SIMD computer exploits ___________ parallelisma. Spatial b. Temporal c. Both a & b d. None of the above 16. Associate memory can be used to build __________ associative processors. a. SISD b. SIMD c. MISD d. MIMD 17. ___________ architecture supports the pipelined flow of vectors operands directly from the memory to pipelines and then back to memory. a. Memory to memory b. Register to memory c. Memory to register d. Register to register 18. ___________ Architecture uses vector registers to interface between the memory and functional lines. a. Memory to memory
we teach !
34. Programs and data reside in the __________, which usually consists of interleaved memory modules. a. Hard disk b. Main memory c. Cache d. ROM 35. ________ are fast registers for holding the intermediate results. a. Latches b. J.K c. RS d. Master slave 36. The instruction queue is ________ storage areaa. FIFO b. LIFO c. FILO d. All of the above
we teach !
37. ___________ may contain multiple functional pipelines for arithmetic logic functions. a. Instruction queue b. Instruction unit c. Execution unit d. All of the above 38. ____________ Hazard in pipelines is caused by resource conflicts. a. Structural b. Data c. Control d. None of the above 39. __________ hazards arises when an instruction depends on the results of a previous instruction in a way that is exposed by the overlapping of instructions in the pipeline. a. Structural b. Data c. Control d. None of the above [2 marks each] 40. _________ hazards arise from the pipelining of branches and other instructions the change the PC. a. Structural b. Data c. Control d. None o the above 41 Computer has gone through two major stages of development ___________ & ______________. a) Mechanical & Electrical b) Pipelining & Distributed c) Electrical & Concurrency d) Pipelining & Mechanical 42 The study of Computer architecture involves both _-- organization and _________ requirements. a) Hardware & Software b) Register & Addressing Modes c) Assembly & operation codes d) Software & CPU
45 The study of architecture covers both __________ and __________________. a) Evolutional, Revolution b) IBM System, Revolution c) Instruction-set architecture, Machine implementation organizations d) Evolutional, IBM System 46 ________________ Architecture supports the pipelined flow of vector operands directly from the memory to Pipelines and then back to the memory. ________________ Architecture uses vector registers to interface between the memory and functional Pipelines. a) Memory to-register, Register to Register b) Memory to-Memory, Register to Register c) Memory to-Pipelines, Register to Memory d) Memory to-register, Register to Pipelines 47 ______________ offers an economical way to realize temporal parallelism in ___________ computers. a) Pipelining, Super b) Pipelining, Digital c) IBM System, Super d) Evolutional, Digital 48 True/False 1. Pipelining is an implementation technique where multiple instructions are overlapped in execution. 2. A Pipeline is a complier line. a) Only 1 b) Only 2 c) Both 1 & 2
we teach !
we teach !
10
11
we teach !
12
73. 1. ___________ contains an ordered set of n elements, where n is called the _________ of the vector 2. A __________ instruction will shorten a vector under the control of a masking vector. 3. A ____________ instruction combines two vectors under the control of a masking vector. a. vector operand, length, 2- compress, 3- merge b. Boolean operand, vector, 2- compress, 3- merge c. vector operand, vector, 2- compress, 3- merge d. vector compress, length, 2- Boolean , 3- merge 74. 1.__________ are repeatedly invoked many times, each of which can be sub divided into sub processes. 2. __________ are fed through the pipeline segments and require as few buffers and local controls as possible. 3. ___________ executed by distinct pipelines should be able to share expensive resources, in the system a. Identical processes, 2- successive operands, 3- operations b. successive operands, 2- Identical processes,3- operations c. Vector, 2-Identical processes, 3- successive operands d. Boolean vector, 2- successive operands, 3- Identical Processes 75. Which statement is correct : 1. The address increment between the elements must be specified. 2. A Masking vector may be used to mask off some of the elements without changing the contents of the original vectors 3. Microcode control is used to set up the required resources. 4. Memory-to Memory architecture, in which source operands, intermediate and final results are retrieved directly from the main memory a. 1, 2 & 4 only b. 1,2, 3 & 4 c. 1, 2 & 3 only d. Except 1 All 76. ________ is a standard technique for removing false date dependencies. __________ & ______ dependencies, among register data. a) Register naming, WAR, WAW b) WAR, WAW, shelving c) Register naming, shelving, WAW d) None of these
13