Computer Organization Functional Units of A Computer
Computer Organization Functional Units of A Computer
a) BCD
b) Decimal
c) Hexadecimal
d) Octal
View Answer
Answer: a
Explanation: The data usually used by computers have to be stored and represented in a particular format
for ease of use.
a) ASCII
b) EBCDIC
c) ANCI
d) USCII
View Answer
Answer: b
Explanation: The data to be stored in the computers have to be encoded in a particular way so as to
provide secure processing of the data.
a) Assembly language
c) High-level language
d) Natural language
View Answer
Answer: c
Explanation: The program written and before being compiled or assembled is called as a source program.
a) RAM
b) Hard-disk
c) Floppy disk
d) Cd disk
View Answer
Answer: a
Explanation: Memory devices are usually made of semiconductors for faster manipulation of the contents.
a) Cache
b) Heaps
c) Accumulators
d) Stacks
View Answer
Answer: a
a) Accumulators
b) Registers
c) Heap
d) Stack
View Answer
Answer: a
Explanation: The ALU is the computational center of the CPU. It performs all the mathematical and
logical operations. In order to perform better, it uses some internal memory spaces to store immediate
results.
a) Control signals
b) Timing signals
c) Transfer signals
d) Command Signals
View Answer
Answer: b
Explanation: This unit is used to control and coordinate between the various parts and components of the
CPU.
a) Input
b) Data
c) Information
d) Stored Values
Answer: b
Explanation: None.
View Answer
Answer: a
Explanation: The input devices use buffers to store the data received and when the buffer has some data it
sends it to the processor.
a) Single bus
b) Multiple bus
c) Star bus
d) Rambus
View Answer
Answer: a
Explanation: BUS is a bunch of wires which carry address, control signals and data. It is used to connect
various components of the computer.
11. The I/O interface required to connect the I/O device to the bus consists of ______
b) Control circuits
View Answer
Answer: c
Explanation: The I/O devices are connected to the CPU via BUS and to interact with the BUS they have
an interface.
12. To reduce the memory access time we generally make use of ______
a) Heaps
c) SDRAM’s
d) Cache’s
View Answer
Answer: d
Explanation: The time required to access a part of the memory for data retrieval.
advertisement
13. ______ is generally used to increase the apparent size of physical memory.
a) Secondary memory
b) Virtual memory
c) Hard-disk
d) Disks
View Answer
Answer: b
View Answer
Answer: b
Explanation: This is a system command enabled when a memory function is completed by a process.
15. The time delay between two successive initiation of memory operation _______
d) Instruction delay
View Answer
Answer: c
Explanation: The time is taken to finish one task and to start another.
a) IR
b) PC
c) Registers
View Answer
Answer: a
Explanation: The instruction after obtained from the PC, is decoded and operands are fetched and stored
in the IR.
View Answer
Answer: c
Explanation: None.
a) MAR
b) PC
c) IR
d) R0
View Answer
Answer: a
Explanation: MAR can interact with secondary storage in order to fetch data from it.
a) MDR
b) IR
d) MAR
View Answer
Answer: c
Explanation: For the execution of a process first the instruction is placed in the PC.
a) PC
b) MAR
c) IR
View Answer
Answer: b
Explanation: MAR is connected to the memory BUS in order to access the memory
View Answer
Answer: a
Explanation: None.
c) Memory bus
d) Rambus
View Answer
Answer: b
Explanation: The processor BUS is used to connect the various parts in order to provide a direct
connection to the CPU.
advertisement
a) Conditional codes
b) Multiplexer
c) Control unit
View Answer
Answer: b
Explanation: The multiplexer circuit is used to choose between the two as it can give different results
based on the input.
9. The registers, ALU and the interconnection between them are collectively called as _____
a) process route
b) information trail
c) information path
d) data path
View Answer
Explanation: The Operational and processing part of the CPU are collectively called as a data path.
a) D flip flop
b) JK flip flop
c) RS flip flop
View Answer
Answer: a
Explanation: None.
View Answer
Answer: c
Explanation: By using a single BUS structure we can minimize the amount of hardware (wire) required
and thereby reducing the cost.
2. ______ are used to overcome the difference in data transfer speeds of various devices.
c) Multiple Buses
d) Buffer registers
View Answer
Answer: d
Explanation: By using Buffer registers, the processor sends the data to the I/O device at the processor
speed and the data gets stored in the buffer. After that the data gets sent to or from the buffer to the
devices at the device speed.
a) PCI bus
b) SCSI bus
c) Controllers
d) Multiple bus
View Answer
Answer: a
Explanation: PCI BUS is used to connect other peripheral devices which require a direct connection with
the processor.
4. IBM developed a bus standard for their line of computers ‘PC AT’ called _____
a) IB bus
b) M-bus
c) ISA
View Answer
Answer: c
Explanation: None.
a) PCI bus
b) SCSI bus
c) Memory bus
d) Rambus
View Answer
Answer: b
Explanation: SCSI BUS is usually used to connect the video devices to the processor.
View Answer
Answer: a
Explanation: None.
a) PC
b) IR
c) Temp
d) Z
View Answer
Answer: d
advertisement
8. In multiple Bus organisation, the registers are collectively placed and referred as ______
a) Set registers
b) Register file
c) Register Block
d) Map registers
View Answer
Answer: b
Explanation: None.
9. The main advantage of multiple bus organisation over a single bus is _____
c) Better Connectivity
View Answer
Answer: a
Explanation: None.
Answer: c
1. During the execution of the instructions, a copy of the instructions is placed in the ______
a) Register
b) RAM
c) System heap
d) Cache
View Answer
Answer: d
Explanation: None.
2. Two processors A and B have clock frequencies of 700 Mhz and 900 Mhz respectively. Suppose A can
execute an instruction with an average of 3 steps and B can execute with an average of 5 steps. For the
execution of the same instruction which processor is faster?
a) A
b) B
d) Insufficient information
View Answer
Answer: a
Explanation: The performance of a system can be found out using the Basic performance formula.
a) Super-scaling
b) Pipe-lining
c) Parallel Computation
View Answer
Answer: b
Explanation: Pipe-lining is the process of improving the performance of the system by processing
different instructions at the same time, with only one instruction performing one specific operation.
4. For a given FINITE number of instructions to be executed, which architecture of the processor provides
for a faster execution?
a) ISA
b) ANSA
c) Super-scalar
View Answer
Answer: c
Explanation: In super-scalar architecture, the instructions are set in groups and they’re decoded and
executed together reducing the amount of time required to process them.
View Answer
Explanation: The clock rate(frequency of the processor) is the hardware dependent quantity it is fixed for
a given processor.
b) Takes advantage of the type of processor and reduces its process time
View Answer
Answer: b
Explanation: An optimizing compiler is a compiler designed for the specific purpose of increasing the
operation speed of the processor by reducing the time taken to compile the program instructions.
c) Be versatile
View Answer
Answer: a
Explanation: None.
View Answer
Answer: c
a) Ultra SPARC 10
b) SUN SPARC
c) SUN II
View Answer
Answer: a
10. When Performing a looping operation, the instruction gets stored in the ______
a) Registers
b) Cache
c) System Heap
d) System stack
View Answer
Answer: b
Explanation: When a looping or branching operation is carried out the offset value is stored in the cache
along with the data.
11. The average number of steps taken to execute the set of instructions can be made to be less than one
by following _______
b) Pipe-lining
c) Super-scaling
d) Sequential
View Answer
Answer: c
Explanation: The number of steps required to execute a given set of instructions is sufficiently reduced by
using super-scaling. In this method, a set of instructions are grouped together and are processed.
12. If a processor clock is rated as 1250 million cycles per second, then its clock period is ________
d) 8 * 10-10 sec
View Answer
Answer: d
Explanation: None.
advertisement
13. If the instruction, Add R1, R2, R3 is executed in a system which is pipe-lined, then the value of S is
(Where S is a term of the Basic performance equation)
a) 3
b) ~2
c) ~1
d) 6
View Answer
View Answer
Answer: c
Explanation: CISC is a type of system architecture where complex instructions are grouped together and
executed to improve the system performance.
15. As of 2000, the reference system to find the SPEC rating are built with _____ Processor.
View Answer
Answer: b
Explanation: None.
View Answer
Answer: b
Explanation: The instruction is using immediate addressing mode hence the value is stored in the location
45 is added.
2. In the case of, Zero-address instruction method the operands are stored in _____
a) Registers
b) Accumulators
d) Cache
View Answer
Answer: c
Explanation: In this case, the operands are implicitly loaded onto the ALU.
3. Add #45, when this instruction is executed the following happen/s _______
a) The processor raises an error and requests for one more operand
b) The value stored in memory location 45 is retrieved and one more operand is requested
c) The value 45 gets added to the value on the stack and is pushed onto the stack
View Answer
Answer: b
Explanation: None.
View Answer
Answer: a
Explanation: In this addressing mode, the value of the register serves as another memory location and
hence we use pointers to get the data.
5. In the following indexed addressing mode instruction, MOV 5(R1),LOC the effective address is
______
a) EA = 5+R1
b) EA = R1
c) EA = [R1].
d) EA = 5+[R1].
View Answer
Answer: d
6. The addressing mode/s, which uses the PC instead of a general purpose register is ______
b) Relative
c) direct
View Answer
7. When we use auto increment or auto decrements, which of the following is/are true?
1) In both, the address is used to retrieve the operand and then the address gets altered
2) In auto increment, the operand is retrieved first and then the address altered
3) Both of them can be used on general purpose registers as well as memory locations
a) 1, 2, 3
b) 2
c) 1, 3
d) 2, 3
View Answer
Answer: d
Explanation: In the case of, auto increment the increment is done afterward and in auto decrement the
decrement is done first.
advertisement
8. The addressing mode, where you directly specify the operand value is _______
a) Immediate
b) Direct
c) Definite
d) Relative
View Answer
Answer: a
Explanation: None.
b) 5+(R1*R2)
c) 5+[R1]+[R2].
d) 5*([R1]+[R2])
View Answer
Answer: c
Explanation: The addressing mode used is base with offset and index.
10. _____ addressing mode is most suitable to change the normal sequence of execution of instructions.
a) Relative
b) Indirect
d) Immediate
View Answer
Answer: a
Explanation: The relative addressing mode is used for this since it directly updates the PC.
1. Which method/s of representation of numbers occupies a large amount of memory than others?
a) Sign-magnitude
b) 1’s complement
c) 2’s complement
View Answer
Answer: a
Explanation: It takes more memory as one bit used up to store the sign.
a) Sign-magnitude
b) 1’s complement
c) 2’S complement
View Answer
Answer: c
Explanation: The two’s complement form is more suitable to perform arithmetic operations as there is no
need to involve the sign of the number into consideration.
a) Sign-magnitude
b) 1’s complement
c) 2’s complement
View Answer
Answer: a
4. When we perform subtraction on -7 and 1 the answer in 2’s complement form is _________
a) 1010
b) 1110
d) 1000
View Answer
Answer: d
Explanation: First the 2’s complement is found and that is added to the number and the overflow is
ignored.
5. When we perform subtraction on -7 and -5 the answer in 2’s complement form is ________
a) 11110
b) 1110
c) 1010
d) 0010
View Answer
Answer: b
Explanation: First the 2’s complement is found and that is added to the number and the overflow is
ignored.
a) 0001
b) 1101
c) 0101
d) 1001
View Answer
Answer: c
Explanation: First the 2’s complement is found and that is added to the number and the overflow is
ignored.
7. The processor keeps track of the results of its operations using a flags called ________
c) Type flags
View Answer
Answer: a
Explanation: These flags are used to indicate if there is an overflow or carry or zero result occurrence.
a) Flag register
b) Status register
c) Test register
d) Log register
View Answer
Answer: b
Explanation: The status register stores the condition codes of the system.
View Answer
Answer: c
a) AddSetCC
b) AddCC
c) Add++
d) SumSetCC
View Answer
Answer: a
Explanation: By using this instruction the condition flags won’t be affected at all.
11. The most efficient method followed by computers to multiply two unsigned numbers is _______
a) Booth algorithm
c) Restoring algorithm
View Answer
Answer: b
Explanation: None.
12. For the addition of large integers, most of the systems make use of ______
a) Fast adders
b) Full adders
View Answer
Answer: c
advertisement
13. In a normal n-bit adder, to find out if an overflow as occurred we make use of ________
a) And gate
b) Nand gate
c) Nor gate
d) Xor gate
View Answer
Answer: d
Explanation: None.
14. In the implementation of a Multiplier circuit in the system we make use of _______
a) Counter
b) Flip flop
c) Shift register
View Answer
Answer: c
Explanation: The shift registers are used to store the multiplied answer.
a) 101
b) 11
c) 0
d) 1
Answer: d
Explanation: None.
a) Cell
b) Block
c) Instance
d) Unit
View Answer
Answer: a
2. The collection of the above mentioned entities where data is stored is called ______
a) Block
b) Set
c) Word
d) Byte
View Answer
Answer: c
a) 1024
b) 4096
c) 248
d) 16,777,216
View Answer
Answer: d
Explanation: The number of addressable locations in the system is called as address space.
4. If a system is 64 bit machine, then the length of each word will be _______
a) 4 bytes
b) 8 bytes
c) 16 bytes
d) 12 bytes
View Answer
Answer: b
Explanation: A 64 bit system means, that at a time 64 bit instruction can be executed.
a) Little Endian
b) Big Endian
c) Medium Endian
View Answer
Explanation: The method of address allocation to data to be stored is called as memory assignment.
6. When using the Big Endian assignment to store a number, the sign bit of the number is stored in _____
c) Can’t say
View Answer
Answer: a
Explanation: None.
7. To get the physical address from the logical address generated by CPU we use ____
a) MAR
b) MMU
c) Overlays
d) TLB
View Answer
Answer: b
Explanation: Memory Management Unit, is used to add the offset to the logical address generated by the
CPU to get the physical address.
advertisement
8. _____ method is used to map logical addresses of variable length onto physical memory.
a) Paging
b) Overlays
c) Segmentation
View Answer
Answer: c
Explanation: Segmentation is a process in which memory is divided into groups of variable length called
segments.
9. During the transfer of data between the processor and memory we use ______
a) Cache
b) TLB
c) Buffers
d) Registers
View Answer
Answer: d
Explanation: None.
10. Physical memory is divided into sets of finite size called as ______
a) Frames
b) Pages
c) Blocks
d) Vectors
View Answer
Answer: a
Explanation: None.
b) The Numerical value represented by the binary value is added to the value of R1
c) The addition doesn’t take place, whereas this is similar to a MOV instruction
View Answer
Answer: a
2. If we want to perform memory or arithmetic operations on data in Hexa-decimal mode then we use ___
symbol before the operand.
a) ~
b) !
c) $
d) *
View Answer
Answer: c
Explanation: None.
3. When generating physical addresses from a logical address the offset is stored in _____
b) Relocation register
c) Page table
d) Shift register
Answer: b
Explanation: In the MMU the relocation register stores the offset address.
4. The technique used to store programs larger than the memory is ______
a) Overlays
b) Extension registers
c) Buffers
View Answer
Answer: a
Explanation: In this, only a part of the program getting executed is stored on the memory and later
swapped in for the other part.
5. The unit which acts as an intermediate agent between memory and backing store to reduce process time
is _____
a) TLB’s
b) Registers
c) Page tables
d) Cache
View Answer
Answer: d
Explanation: The cache’s help in data transfers by storing most recently used memory pages.
View Answer
Answer: b
Explanation: The load instruction is basically used to load the contents of a memory location onto a
register.
7. Complete the following analogy:- Registers are to RAM’s as Cache’s are to _____
a) System stacks
b) Overlays
c) Page Table
d) TLB
View Answer
Answer: d
Explanation: None.
advertisement
a) Harddisk
b) ROM
c) RAM
View Answer
Answer: b
Explanation: The files which are required for the starting up of a system are stored on the ROM.
a) DMA controller
b) Arbitrator
View Answer
Answer: a
Explanation: This mode of transfer involves the transfer of a large block of data from the memory.
10. Which of the following technique/s used to effectively utilize main memory?
a) Address binding
b) Dynamic linking
c) Dynamic loading
View Answer
Answer: c
Explanation: In this method only when the routine is required is loaded and hence saves memory
View Answer
Answer:a
Explanation: This is the way of writing the assembly language code with the help of register notations.
a) AddSetCC Loc+R1
b) R1=Loc+R1
d) R1<-[Loc]+[R1].
View Answer
Answer:d
Explanation: None.
3. Can you perform addition on three operands simultaneously in ALN using Add instruction?
a) Yes
c) Not permitted
View Answer
Answer:c
Explanation: You cannot perform addition on three operands simultaneously because the third operand is
where the result is stored.
a) R3=R1+R2+R3
c) R3=[R1]+[R2].
d) R3<-[R1]+[R2].
View Answer
Answer:d
Explanation: In RTN the first operand is the destination and the second operand is the source.
a) 16 bit
b) 8 bits
c) 5 bits
d) 6 bits
View Answer
Answer:c
Explanation: The ID is the name tag given to each of the registers and used to identify them.
View Answer
Answer:b
Explanation: First, the instructions are fetched and decoded and then they’re executed and stored.
c) Completing the execution of the data and placing its storage address into MAR
View Answer
Answer:d
Explanation: The fetch ends with the instruction getting decoded and being placed in the IR and the PC
getting incremented.
advertisement
8. While using the iterative construct (Branching) in execution ____ instruction is used to check the
condition.
a) TestAndSet
b) Branch
c) TestCondn
View Answer
Answer:b
Explanation: Branch instruction is used to check the test condition and to perform the memory jump with
help of offset.
9. When using Branching, the usual sequencing of the PC is altered. A new instruction is loaded which is
called as ______
a) Branch target
b) Loop target
c) Forward target
View Answer
Answer:a
Explanation: None.
View Answer
Answer:c
Explanation: This condition flag is used to check if the arithmetic operation yields a zero output.
1. ____ converts the programs written in assembly language into machine instructions.
a) Machine compiler
b) Interpreter
c) Assembler
d) Converter
View Answer
Answer: c
a) OP-Code
b) Operators
c) Commands
View Answer
Answer: a
Explanation: This OP – codes tell the system what operation to perform on the operands.
a) ADD [5],[R1];
b) ADDI 5,R1;
c) ADDIME 5,[R1];
View Answer
Answer: b
Explanation: The ADDI instruction, means the addition is in immediate addressing mode.
4. Instructions which won’t appear in the object program are called as _____
a) Redundant instructions
b) Exceptions
c) Comments
d) Assembler Directives
View Answer
Explanation: The directives help the program in getting compiled and hence wont be there in the object
code.
5. The assembler directive EQU, when used in the instruction: Sum EQU 200 does ________
View Answer
Answer: b
Explanation: This basically is used to replace the variable with a constant value.
a) To indicate the starting position in memory, where the program block is to be stored
View Answer
Answer: a
7. The directive used to perform initialization before the execution of the code is ______
a) Reserve
b) Store
c) Dataword
d) EQU
View Answer
Explanation: None.
8. _____ directive is used to specify and assign the memory required for the block of code.
a) Allocate
b) Assign
c) Set
d) Reserve
View Answer
Answer: d
Explanation: This instruction is used to allocate a block of memory and to store the object code of the
program there.
a) End
b) Return
c) Stop
d) Terminate
View Answer
Answer: b
a) Stop
b) Return
c) OP
d) End
Answer: d
11. When dealing with the branching code the assembler ___________
c) Finds the Branch offset and replaces the Branch target with it
d) Replaces the target with the value specified by the DATAWORD directive
View Answer
Answer: c
Explanation: When the assembler comes across the branch code, it immediately finds the branch offset
and replaces it with it.
12. The assembler stores all the names and their corresponding values in ______
b) Symbol Table
View Answer
Answer: b
Explanation: The table where the assembler stores the variable names along with their corresponding
memory locations and values.
advertisement
b) Cache
c) RAM
d) Magnetic disk
View Answer
Answer: d
Explanation: After compiling the object code, the assembler stores it in the magnetic disk and waits for
further execution.
14. The utility program used to bring the object code into memory for execution is ______
a) Loader
b) Fetcher
c) Extractor
d) Linker
View Answer
Answer: a
Explanation: The program which is used to load the program into memory.
15. To overcome the problems of the assembler in dealing with branching code we use _____
a) Interpreter
b) Debugger
c) Op-Assembler
d) Two-pass assembler
View Answer
Answer: d
Explanation: This creates entries into the symbol table first and then creates the object code.
a) IR
b) PC
c) MAR
View Answer
Answer: b
Explanation: The return address from the subroutine is pointed to by the PC.
a) TLB
b) PC
c) MAR
d) Link registers
View Answer
Answer: d
Explanation: The registers store the return address of the routine and is pointed to by the PC.
b) Using a linking nest statement to put many subroutines under the same name
View Answer
Answer: c
Explanation: None.
4. The order in which the return addresses are generated and used is _________
a) LIFO
b) FIFO
c) Random
d) Highest priority
View Answer
Answer: a
a) System heap
c) Processor stack
d) Registers
View Answer
Answer: c
Explanation: In this case, there will be more number of return addresses it is stored on the processor stack.
6. The appropriate return addresses are obtained with the help of ____ in case of nested routines.
a) MAR
b) MDR
d) Stack-pointers
View Answer
Answer: d
Explanation: The pointers are used to point to the location on the stack where the address is stored.
7. When parameters are being passed on to the subroutines they are stored in ________
a) Registers
b) Memory locations
c) Processor stacks
View Answer
Answer: d
Explanation: In the case of, parameter passing the data can be stored on any of the storage space.
advertisement
b) Stacks
c) Memory locations
View Answer
Answer: a
Explanation: By using general purpose registers for the parameter passing we make the process more
efficient.
a) Registers
b) Stacks
c) Memory locations
View Answer
Answer: b
Explanation: The stacks are used as Logs for return addresses of the subroutines.
10. The wrong statement/s regarding interrupts and subroutines among the following is/are ______
a) i, ii and iv
b) ii and iii
c) iv
d) iii and iv
View Answer
Answer: d
Explanation: None.
a) System heap
b) Reserve
c) Stack frame
d) Allocation
View Answer
Answer: c
Explanation: This work space is where the intermediate values of the subroutines are stored.
2. If the subroutine exceeds the private space allocated to it then the values are pushed onto _________
a) Stack
b) System heap
c) Reserve Space
d) Stack frame
View Answer
Answer: a
Explanation: If the allocated work space is exceeded then the data is pushed onto the system stack.
3. ______ pointer is used to point to parameters passed or local parameters of the subroutine.
a) Stack pointer
b) Frame pointer
c) Parameter register
d) Log register
View Answer
Explanation: This pointer is used to track the current position of the stack being used.
4. The reserved memory or private space of the subroutine gets deallocated when _______
View Answer
Answer: c
Explanation: The work space allocated to a subroutine gets deallocated when the routine is completed.
View Answer
Answer: c
Explanation: When the call statement is executed, simultaneously space also gets allocated.
6. _____ the most suitable data structure used to store the return addresses in the case of nested
subroutines.
a) Heap
b) Stack
c) Queue
d) List
Answer: b
Explanation: None.
View Answer
Answer: a
Explanation: None.
advertisement
a) Main memory
b) System Heap
c) Processor Stack
View Answer
Answer: c
Explanation: The memory for the work space is allocated from the processor stack.
a) List
c) Queue
d) Stack
View Answer
Answer: c
Explanation: The Queue data structure is generally used for scheduling as it is two directional.
10. The sub-routine service procedure is similar to that of the interrupt service routine in ________
b) Returning
c) Process execution
View Answer
Answer: d
Explanation: The Subroutine service procedure is the same as the interrupt service routine in all aspects,
except the fact that interrupt might not be related to the process being executed.