TOPIC 2 Part 2 Machine Instructions and Programs
TOPIC 2 Part 2 Machine Instructions and Programs
7. When using Branching, the usual sequencing of the PC is altered. A new instruction is
loaded which is called as ______
a) Branch target
b) Loop target
c) Forward target
d) Jump instruction
View Answer
Answer: a
Explanation: None.
Recommendation
1. Can you perform an addition on three operands simultaneously in ALN using Add
instruction?
a) Yes
b) Not possible using Add, we’ve to use AddSetCC
c) Not permitted
d) None of the mentioned
View Answer
Answer: c
Explanation: You cannot perform an addition on three operands simultaneously
because the third operand is where the result is stored.
6. The assembler stores all the names and their corresponding values in ______
a) Special purpose Register
b) Symbol Table
c) Value map Set
d) None of the mentioned
View Answer
Answer: b
Explanation: The table where the assembler stores the variable names along with their
corresponding memory locations and values.
7. The utility program used to bring the object code into memory for execution is ______
a) Loader
b) Fetcher
c) Extractor
d) Linker
View Answer
Answer: a
Explanation: The program is used to load the program into memory.
Recommendation
2. To overcome the problems of the assembler in dealing with branching code we use
_____
a) Interpreter
b) Debugger
c) Op-Assembler
d) Two-pass assembler
View Answer
Answer: d
Explanation: This creates entries into the symbol table first and then creates the object
code.
3. Instructions which won’t appear in the object program are called as _____
a) Redundant instructions
b) Exceptions
c) Comments
d) Assembler Directives
View Answer
Answer: d
Explanation: The directives help the program in getting compiled and hence won’t be
there in the object code.
4. The assembler directive EQU, when used in the instruction: Sum EQU 200 does
________
a) Finds the first occurrence of Sum and assigns value 200 to it
b) Replaces every occurrence of Sum with 200
c) Re-assigns the address of Sum by adding 200 to its original address
d) Assigns 200 bytes of memory starting the location of Sum
View Answer
Answer: b
Explanation: This basically is used to replace the variable with a constant value.
6. The directive used to perform initialization before the execution of the code is ______
a) Reserve
b) Store
c) Dataword
d) EQU
View Answer
Answer: c
Explanation: None.
7. _____ directive is used to specify and assign the memory required for the block of
code.
a) Allocate
b) Assign
c) Set
d) Reserve
View Answer
Answer: d
Explanation: This instruction is used to allocate a block of memory and to store the
object code of the program there.
8. _____ directive specifies the end of execution of a program.
a) End
b) Return
c) Stop
d) Terminate
View Answer
Answer: b
Explanation: This instruction directive is used to terminate the program execution.
III. This set of Computer Organization and Architecture Multiple Choice Questions &
Answers (MCQs) focuses on “Subroutines and Nesting”.
3. The order in which the return addresses are generated and used is _________
a) LIFO
b) FIFO
c) Random
d) Highest priority
View Answer
Answer: a
Explanation: That is the routine called first is returned first.
5. The appropriate return addresses are obtained with the help of ____ in case of
nested routines.
a) MAR
b) MDR
c) Buffers
d) Stack-pointers
View Answer
Answer: d
Explanation: The pointers are used to point to the location on the stack where the
address is stored.
6. When parameters are being passed on to the subroutines they are stored in ________
a) Registers
b) Memory locations
c) Processor stacks
d) All of the mentioned
View Answer
Answer: d
Explanation: In the case of, parameter passing the data can be stored on any of the
storage space.
Recommendation
2. The wrong statement/s regarding interrupts and subroutines among the following
is/are ______
i) The sub-routine and interrupts have a return statement
ii) Both of them alter the content of the PC
iii) Both are software oriented
iv) Both can be initiated by the user
a) i, ii and iv
b) ii and iii
c) iv
d) iii and iv
View Answer
Answer: d
Explanation: None.
Recommedation
IV. This set of Computer Organization Questions and Answers for Entrance exams
focuses on “Parameter Passing and Stack Frame”.
2. If the subroutine exceeds the private space allocated to it then the values are pushed
onto _________
a) Stack
b) System heap
c) Reserve Space
d) Stack frame
View Answer
Answer: a
Explanation: If the allocated work space is exceeded then the data is pushed onto the
system stack.
6. _____ the most suitable data structure used to store the return addresses in the case
of nested subroutines.
a) Heap
b) Stack
c) Queue
d) List
View Answer
Answer: b
Explanation: None.
10. The sub-routine service procedure is similar to that of the interrupt service routine
in ________
a) Method of context switch
b) Returning
c) Process execution
d) Method of context switch & Process execution
View Answer
Answer: d
Explanation: The Subroutine service procedure is the same as the interrupt service
routine in all aspects, except the fact that interrupt might not be related to the process
being executed.