CS - Computer Organization Architecture
CS - Computer Organization Architecture
Information contained in this book has been obtained by authors, from sources believes to be reliable. However,
neither Nodia nor its authors guarantee the accuracy or completeness of any information herein, and Nodia nor its
authors shall be responsible for any error, omissions, or damages arising out of use of this information. This book
is published with the understanding that Nodia and its authors are supplying information but are not attempting
to render engineering or other professional services.
YEAR 2001
in
(A) INTER (B) RESET IN
.
(C) HOLD (D) READY
co
Q. 3 Suppose a processor does not have any stack pointer register. Which of the
.
following statements is true ?
a
(A) It cannot have subroutine call instruction
d i
(B) It can have subroutine call instruction, but no nested subroutine calls.
o
(C) Nested subroutine calls are possible, but interrupts are not.
n
(D) All sequences of subroutine calls and also interrupts are possible
.
w
Q. 4 A processor needs software interrupt to
(A) Test the interrupt system of the processor.
w
(B) Implement co-routines.
w
(C) Obtain system services which need execution of privileged instructions.
(D) Return from subroutine.
Q. 5
©
A CPU has two modes-privileged and non-privileged. In order to change the
mode from privileged to non-privileged.
(A) A hardware interrupt is needed.
(B) A software interrupt is needed.
(C) A privileged instruction (which does not generate an interrupt) is needed.
(D) A non-privileged instruction (Which does not generate an interrupt) is
needed.
Q. 6 The process of assigning load addresses to the various parts of the program and
adjusting the code and date in the program to reflect the assigned addresses is
called
(A) Assembly (B) Parsing
(C) Relocation (D) Symbol resolution
Q. 8 Which is the most appropriate match for the items in the first column with the
items in the second column
(X.) Indirect Addressing (I.) Array implementation
(Y.) Indexed Addressing (II.) Writing re-locatable code
(Z.) Base Register Addressing (III.) Passing array as parameter
(A) (X, III) (Y, I) (Z, II) (B) (X, II) (Y, III) (Z, I)
(C) (X, III) (Y, II) (Z, I) (D) (X, I) (Y, III) (Z, II)
Q. 9 Consider the following data path of a simple non-pilelined CPU. The registers
A, B, A1 , A2 , MDR the bus and the ALU are 8-bit wide. SP and MAR are 16-
bit registers. The MUX is of size 8 # (2: 1) and the DEMUX is of size 8 # (1: 2)
. Each memory operation takes 2 CPU clock cycles and uses MAR (Memory
in
Address Register) and MDR (Memory Date Register). SP can be decremented
.
locally.
. co
i a
o d
.n
w
w
The CPU instruction “push r”, where = A or B, has the specification
M [SP] !r
w SP ! SP - 1
©
How many CPU clock cycles are needed to execute the “push r” instruction ?
(A) 2 (B) 3
(C) 4 (D) 5
YEAR 2002
Q. 11 A device employing INTR line for device interrupt puts the CALL instruction on
the data bus while
(A) INTA is active (B) HOLD is active
(C) READY is active (D) None of the above
Q. 13 In serial data transmission, every byte of data is padded with a ‘0’ in the beginning
and one or two ‘1’s at the end of byte because
(A) Receiver is to be synchronized for byte reception
(B) Receiver recovers lost ‘0’s and ‘1’ from these padded bits
(C) Padded bits are useful in parity computation.
(D) None of the above
Q. 15 In the C language
(A) At most one activation record exists between the current activation record
and the activation record for the main.
(B) The number of activation records between the current activation record and
in
the activation record for the main depends on the actual function calling
.
sequence.
co
(C) The visibility of global variables depends on the actual function calling
.
sequence.
a
(D) Recursion requires the activation record for the recursive function to be
i
saved on a different stack before the recursive fraction can be called.
d
n o
.
Q. 16 In the absolute the addressing mode
(A) The operand is inside the instruction
w
(B) The address of the operand is inside the instruction
w
(C) The register containing the address of the operand is specified inside the
w
instruction
(D) The location of the operand is implicit
Q. 17
©
The performance of a pipelined processor suffers if
(A) The pipelined stages have different delays
(B) Consecutive instructions are dependent on each other
(C) The pipeline stages share hardware resources
(D) All the above
Q. 18 Horizontal microprogramming
(A) Does not require use of signal decoders
(B) Results in larger sized microinstructions than vertical microprogramming
(C) Uses one bit for each control signal
(D) All of the above
GATE SOLVED PAPER - CS COMPUTERORGANIZATION&ARCHITECTURE
Q. 19 For a pipelined CPU with a single ALU, consider the following situations
1. The j + 1 - st instruction uses the result of j - th instruction as an operand
2. The execution of a conditional jump instruction
3. The j - th and j + 1 - st instructions require the ALU at the same time
Which of the above can cause a hazard?
(A) 1 and 2 only (B) 2 and 3 only
(C) 3 only (D) All the three
Q. 20 Consider an array multiplier for multiplying two n bit numbers. If each gate in
the circuit has a unit delay, the total delay of the multiplier is
(A) Q (1) (B) Q (log n)
(C) Q (n) (D) Q (n2)
YEAR 2003
. in TWO MARKS
co
Q. 21 Consider the ALU shown below
a .
d i
o
.n
w
w
If the operands are in 2’s complement representation, which of the following
w
operations can be performed by suitably setting the control lines K and C0 only
©
(+ and - denote addition and subtraction respectively)?
(A) A + B, and A - B, but not A + 1 (B) A + B, and A + 1, but notA - B
(C) A + B, but not A - B, or A + 1 (D) A + B, and A - B, and A + 1
; and a0 respectively.
JCY ;jump to Y if carry flag is set
JMP Z ; jump to Z
Y: ADD B, # 1 ; B!B+1
JMP Z ; jump to Z
X:
Q. 22 If the initial value of register A is A0 , the value of register B after the program
execution will be
(A) the number of 0 bits in A0 (B) the number of 1 bits in A0
(C) A0 (D) 8
Q. 23 Which of the following instructions when inserted at location X will ensure that
the value of register A after program execution is the same as its initial value?
(A) RRC A,# 1
(B) NOP ; no operation
(C) LRC A, # 1 ; left rotate A through carry flag by one bit
in
(D) ADD A, # 1
.
co
YEAR 2004 ONE MARK
Q. 24
a .
Which of the following addressing modes are suitable for program relocation at
run time?
1. Absolute addressing
d i
2. Based addressing
n o
.
3. Relative addressing
4. Indirect addressing
(A) 1 and 4
w (B) 1 and 2
w
(C) 2 and 3 (D) 1,2 and 4
w
Q. 25
©
YEAR 2004 TWO MARKS
Q. 26 Consider that the memory is byte addressable with size 32 bits, and the program
has been loaded starting from memory location 1000 (decimal). If an interrupt
occurs while the CPU has been halted after executing the HALT instruction, the
return address (in decimal) saved in the stack will be
in
(A) 1007 (B) 1020
(C) 1024
.
(D) 1028
co
Let the clock cycles required for various operations be as follows:
.
Q. 27
Register to/from memory transfer: 3 clock cycles
ADD with both operands in register:
i a 1 clock cycle
d
Instruction fetch and decode: 2 clock cycles per word
o
The total number of clock cycles required to execute the program is
.n
(A) 29 (B) 24
(C) 23 (D) 20
Q. 28
w
Consider a small two-way set-associative cache memory, consisting of four blocks.
w
For choosing the block to be replaced, use the least recently used (LRU) scheme.
w
The number of cache misses for the following sequence of block addresses is 8,
12,0, 12,8
©
(A) 2 (B) 3
(C) 4 (D) 5
How many bits are there in the X and Y fields, and what is the size of the control
memory in number of words?
(A) 10, 3, 1024 (B) 8, 5, 256
(C) 5, 8, 2048 (D) 10, 3, 512
GATE SOLVED PAPER - CS COMPUTERORGANIZATION&ARCHITECTURE
Q. 31 A 4-stage pipeline has the stage delays as 150, 120, 160 and 140 nanoseconds
respectively. Registers that are used between the stages have a delay of 5
nanoseconds each. Assuming constant clocking rate, the total time taken to
process 1000 data items on this pipeline will be
(A) 120.4 microseconds (B) 160.5 microseconds
(C) 165.5 microseconds (D) 590.0 microseconds
in
Q. 32 Which one of the following is true for a CPU having a single interrupt request line
.
and a single interrupt grant line?
(A) Neither vectored interrupt nor multiple interrupting devices are possible
co
(B) Vectored interrupts are not possible but multiple interrupting devices are
.
possible
i a
(C) vectored interrupts and multiple interrupting devices are both possible
d
(D) vectored interrupt is possible but multiple interrupting devices are not
o
possible
. n
w
Q. 33 Normally user programs are prevented from handing I/O directly by I/O
instructions in them. For CPUs having explicit I/O instructions, such
w
I/O protection is ensured by having the I/O instructions privileged. In
w
a CPU with memory mapped I/O, there is no explicit I/O instruction.
Which one of the following is true for a CPU with memory mapped I/O?
©
(A) I/O protection is ensured by operating system routine(s)
(B) I/O protection is ensured by a hardware trap
(C) I/O protection is ensured during system configuration
(D) I/O protection is not possible
in
Q. 37 Match List-I with List-II and select the correct answer using the codes given
.
below the lists:
co
List-I List-II
.
A. A [1] = B [j]; 1. Indirect addressing
B. while [* A ++];
i a
2. Indexed addressing
d
C. int temp=*x ; 3. Auto increment
o
Codes:
.n
A B C
(A) 3 2 1
w
(B) 1 3 2
(C) 2 3 1
(D) 1 2
w 3
Q. 38
w
Consider a direct mapped cache of size 32 KB with block size 32 bytes. The CPU
©
generates 32 bit addresses. The number of bits needed for cache indexing and the
number of tag bits are respectively
(A) 10,17 (B) 10,22
(C) 15,17 (D) 5,17
time between the device interface register and CPU or memory is negligible.
What is the minimum performance gain of operating the device under interrupt
mode over operating it under program controlled mode?
(A) 15 (B) 25
(C) 35 (D) 45
. in
co
Common Data For Q. 42 & 43
.
Consider the following data path of a CPU
i a
o d
. n
w
w
w
©
The, ALU, the bus and all the registers in the data path are of identical size. All
operations including incrementation of the PC and the GPRs are to be carried
out in the ALU. Two clock cycle are needed for memory read operation-the first
one for loading data from the memory but into the MDR.
Q. 42 The instruction “add R0, R1” has the register transfer in terpretation
R0 <= R0 + R1. The minimum number of clock cycles needed for execution cycle
of this instruction is
(A) 2 (B) 3
(C) 4 (D) 5
Q. 45 A CPU has a cache with block size 64 bytes. The main memory has k banks, each
bank being c bytes wide. Consecutive c-bute chunks are mapped on consecutive
banks with warp-around. All the k banks can be accessed in parallel, but two
accesses to the same bank must be serialized. A cache block access may involve
multiple iterations of parallel bank accesses depending on the amount of data
obtained by accessing all the k banks in parallel. Each iteration requires decoding
the bank numbers to be accessed in parallel and this takes k/2 ns . The latency of
in
one bank access is 80 ns . If c = 2 and k =24, then latency of retrieving a cache
.
block starting at address zero from main memory is
co
(A) 92 ns (B) 104 ns
.
(C) 172 ns (D) 184 ns
i a
d
Q. 46 A CPU has five-stages pipeline and runs at 1GHz frequency. Instruction fetch
o
happens in the first stage of the pipeline. A conditional branch instruction
.n
computes the target address and evaluates the condition in the third stage of the
pipeline. The processor stops fetching new instructions following a conditional
w
branch until the branch outcome is known. A program executes 109 instructions
out of which 20% are conditional branches. If each instruction takes one cycle to
w
complete on average, then total execution time of the program is
w
(A) 1.0 second (B) 1.2 seconds
(C) 1.4 seconds (D) 11.6 seconds
Q. 47
©
Consider a new instruction named branch-on-bit-set (mnemonic bbs). The
instruction “bbs reg, pos, labbel” jumps to label if bit in position pos of register
operand reg is one. a register is 32 bits wide and the bits are numbered 0 to 31,
bit in position 0 being the least significant. Consider the following emulation of
this instruction on a processor that does not have bbs implemented.
temp!reg and mask
Branch to label if temp is non-zero
The variable temp is a temporary register. For correct emulation the variable
mask must be generated by
(A) mask ! 0x1 << pos (B) musk ! 0x ffffffff >> pos
(C) mask ! pos (D) msdk ! 0xf
Q. 48 The value of h1 is
(A) 2.4ns (B) 2.3ns
(C) 1.8ns (D) 1.7ns
Q. 49 The value of h2 is
(A) 2.4ns (B) 2.3ns
(C) 1.8ns (D) 1.7ns
in
{
.
for (j=0;j<512;j++)
co
{
.
x+=A[i][j];
a
}
i
}
d
P2 : for (i=0;i<512;i++) {
o
for (j=0;j<512;j++) {
n
{x+=A[j][i];}
.
}
w
}
P1 and P2 are executed independently with the same initial state, namely, the
w
array A is not in the cache and i, j, x are in registers. Let the number of cache
w
misses experienced by P1 be M1 and that for P2 be M2 .
The value of M1 is
©
Q. 50
(A) 0 (B) 2048
(C) 16384 (D) 262144
Q. 52 Consider a 4-way set associative cache consisting of 120 lines with a line size of
64 words. The CPU generates a 20-bit address of a word in main memory. The
number of bits in the TAG, LINE and WORD fields are respectively
(A) 9,6,5 (B) 7,7,6
(C) 7,5,8 (D) 9,5,6
GATE SOLVED PAPER - CS COMPUTERORGANIZATION&ARCHITECTURE
Q. 53 Consider a disk pack with 16 surfaces, 128 tracks per surface and 256 sectors per
track. 512 bytes of data are stored in a bit serial manner in a sector. The capacity
of the disk pack and the number of bits required to specify a particular sector in
the disk are respectively
(A) 256 Mbytes, 19 bits (B) 256 Mbyte, 28 bits
(C) 512 Mbytes, 20 bits (D) 64 Gbyte, 28 bits
in
WB: Write Bank
.
The IF, ID and WB stages take one clock cycle each to complete the operation.
co
The number of clock cycles for the EX stage depends on the instruction. The
ADD and SUB instructions need 1 clock cycle and the MUL instruction need
.
3 clock cycles in the EX stage. Operand forwarding is used in the pipelined
i a
processor. What is the number of clock cycles taken to complete the following
d
sequence of instructions?
MUL R4,
.n
R3, R2 R4!R3*R2
SUB R6,
w R5, R4 R6!R5-R4
(A) 7
w (B) 8
(C) 10
w (D) 14
©
Common Data For Q. 55, 56 & 57
Consider the following program segment. Here R1, R2 and R3 are the general
purpose registers.
Instruction Operation Instruction size
(no. of words)
MOV R1,(3000) R1!M[3000] 2
LOOP:
MOV R2,R1 R2!M[R3] 1
ADD R2,R1 R2!R1+R2 1
MOV (R3),R2 M(R3]!R2 1
INC R3 R3!R3+1 1
DEC R1 R1!R1-1 1
BNZ LOOP Branch on not zero 2
HALT Stop
Assume that the content of memory location 3000 is 10 and the content of the
register R3 is 2000. The content of each of the memory locations from 2000
to 2010 is 100. The program is loaded from the memory location 100. All the
numbers are in decided.
GATE SOLVED PAPER - CS COMPUTERORGANIZATION&ARCHITECTURE
Q. 55 Assume that the memory is word addressable. The number of memory references
for accessing the data in executing the program completely is
(A) 10 (B) 11
(C) 20 (D) 21
Q. 56 Assume that the memory is word addressable. After the execution of this program,
the content of memory location 2010 is
(A) 100 (B) 101
(C) 102 (D) 110
Q. 57 Assume that the memory is byte addressable and the word size is 32 bits. If an
interrupt occurs during the execution of the instruction “INC R3”, what return
address will be pushed on to the stack?
(A) 1005 (B) 1020
(C) 1024 (D) 1040
in
Consider a machine with a byte addressable main memory of 216 bytes. Assume
.
that a direct mapped data cache consisting of 32 lines of 64 bytes each is used in
co
the system. A 50 # 50 two-dimensional array of bytes is stored in the main memory
.
stating from memory location 1100H.Assume that the data cache is initially
a
empty. The complete array is accessed twice. Assume that the contents of the
i
data cache do not change in between the two accesses.
d
o
Q. 58 How many data cache misses will occur in total?
n
(A) 48 (B) 50
(C) 56
. (D) 59
Q. 59
w
Which of the following lines of the data cache will be replaced by new blocks in
w
accessing the array
w
(A) line 4 to line 11 (B) line 4 to line 12
(C) line 0 to line 7 (D) line 0 to line 8
©
YEAR 2008 TWO MARKS
Q. 60 For a magnetic disk with concentric circular track, the latency is not linearly
proportional to the seek distance due to
(A) non-uniform distribution of requests
(B) arm starting and stopping inertia
(C) higher capacity of tracks on the periphery of the platter
(D) use of unfair arm scheduling policies.
Q. 61 Which of the following is/are true of the auto increment addressing mode?
1. It is useful in creating self relocating code
2. If it is included in an Instruction Set Architecture, then an additional ALU is
required for effective address calculation
3. The amount of increment depends on the size of the data item accessed.
(A) 1 only (B) 2 only
(C) 3 only (D) 2 and 3 only
GATE SOLVED PAPER - CS COMPUTERORGANIZATION&ARCHITECTURE
Q. 62 Which of the following must be true for the RFE (Return from Expectation)
instruction on a general purpose processor.
1. It must be a trap instruction
2. It must be a privileged instruction
3. An exception can not be allowed to occur during execution of an RFE instruction.
(A) 1 only (B) 2 only
(C) 1 and 2 only (D) 1, 2 and 3 only
Q. 63 For inclusion to hold between two cache level L1 and L2 in a multilevel cache
hierarchy, which of the following are necessary?
1. L1 must be a write-through cache
2. L2 must be write-through cache
3. The associativity of L2 must be greater that of L1
4. The L2 cache must be at least as large as the L1 cache
in
(A) 4 only (B) 1 and 2 only
.
(C) 1, 2 and 4 only (D) 1, 2, 3 and 4
co
Q. 64 Which of the following are NOT true in a pipe lined processor?
.
1. Bypassing can handle alll Raw hazards.
i a
2. Register renaming can eliminate all register carried WAR hazards.
d
3. Control hazard penalties can be eliminated by dynamic branch prediction.
(A) 1 and 2 only (B) 1 and 3 only
o
.n
(C) 2 and 3 only (D) 1,2 and 3
Q. 65 The use of multiple register windows with overlap causes a reduction in the
w
number of memory accesses for
w
1. Function locals and parameters
2. Register saves and restores
w
3. Instruction fetches
©
(A) 1 only (B) 2 only
(C) 3 only (D) 1,2 and 3
Q. 66 In an instruction execution pipeline, the earliest that the data TLB (Translation
Look aside Buffer) can be accessed is
(A) before effective address calculation has started
(B) during effective address calculation
(C) after effective address calculation has completed
(D) after data cache lookup has completed
The size of double 8 bytes. Array APR is in memory stating at the beginning of
virtual page 0 # FF000 and stored in row major order. The cache is initially
empty and no pre-fetching is done. The only data memory references made by the
program are those to array APR.
Q. 67 The total size of the tags in the cache directory is
(A) 32 kbits (B) 34 kbits
(C) 64 kbits (D) 68 kbits
Q. 68 Which of the following array elements has the same cache index as APR [0][0]?
(A) APR[0][4] (B) APR[4][0]
(C) APR[0][5] (D) APR[5][0]
. in
co
Common Data For Q. 70 & 71
.
Delayed branching can help in the handling of control hazardous
i a
Q. 70 For all delayed conditional branch instruction, irrespective of weather the condition
d
evato true or false, A
o
(A) the instruction following the conditional branch instruction in memory is
executed
. n
(B) the first instruction in the fall through path is executed
w
(C) the first instruction in the taken path is executed
w
(D) the branch takes longer to execute that any other instruction
w
Q. 71 The following code is to run on a pipe lined processor with one branch delay slot
11: ADD R2 ! R7+R8
©
12: SUB R4 ! R5- R6
13: ADD R1 ! R2+ R3
14: STORE Memory [R4] ! R1
BRANCH to Label if R1==0
Which of the instruction 11,12,13 or 14 can legitimately occupy the delay slot
without any other program modification?
(A) 11 (B) 12
(C) 13 (D) 14
Q. 72 How many 32K#1 RAM chips are needed to provide a memory capacity of
356-bytes ?
(A) 8 (B) 32
(C) 64 (D) 128
GATE SOLVED PAPER - CS COMPUTERORGANIZATION&ARCHITECTURE
Q. 74 Consider a 4 stage pipeline processor. The number of cycles needed by the four
instructions 11, 12, 13, 14 in stages S1, S2, S3, S4 is shown below:
S1 S2 S3 S4
in
I1 2 1 1 1
.
I2 2 3 2 2
co
I3 2 1 1 3
.
I4 1 2 2 2
i a
What is the number of cycles needed to execute the following loop?
d
for (i = 1 to 2){I1; I2; I3; I4;}
o
(A) 16 (B) 23
.n
(C) 28 (D) 30
w
Q. 75 Consider a 4 way set associative cache (initially empty) with total 16 cache
blocks. The main memory consists of 256 blocks and the request for memory
w
blocks is in the following order :
w
0, 255, 1, 4, 3, 8, 133, 159, 216, 129, 63, 8, 48, 32, 73, 92, 155
Which one of the following memory block will NOT be in the cache if LRU
©
replacement policy is used ?
(A) 3 (B) 8
(C) 129 (D) 216
Q. 79 A-5 stage pipelined processor has Instruction Fetch. (IF), Instruction Decode
(ID), Operand Fetch (OF), Perform Operation (PO) and Write Operand (WO)
stages. The IF, ID, OF and WO stages take 1 clock cycle each for any instruction.
The PO stage takes 1 clock cycle for ADD and SUB instruction. The PO stage
takes 1 stake clock cycle for ADD and SUB instructions 3 clock cycles for
MUL instruction, and 6 clock cycles for DIV instruction respectively. Operand
in
forwarding is used in the pipeline. What is the number of clock cycles needed to
.
execute the following sequence of instructions ?
co
Instruction Meaning of instruction
I 0 : MUL R2, R 0, R1 R2 ! R 0)R1
I1 : DIV R5, R 3, R 4
a .R5 ! R 3 /R 4
i
I2 : ADD R2, R5, R2 R2 ! R5 + R2
od
I 3 : SUB R5, R2, R6 R5 ! R2 - R6
(A) 13 (B) 15
.n
(C) 17 (D) 19
w
Q. 80 The program below uses six temporary variables a, b, c, d, e, f
w
a=1 b = 10 c = 20
d = a+b e = c+d f = c+e
w
b = c+e e = b+f d = 5+e
©
Assuming that all operations take their operands from register, what is the
minimum number of registers needed to execute this program without spilling ?
(A) 2 (B) 3
(C) 4 (D) 6
Q. 81 When there is a miss in L1 cache and a hit in L2 cache, a block is transferred form
L2 cache to L1 cache. What is the time taken for this transfer ?
(A) 2 nanoseconds (B) 20 nanoseconds
(C) 22 nanoseconds (D) 88 nanoseconds
Q. 82 When there is a miss in both L1 cache and L2 cache, first a block is transferred
from memory to L2 cache, and then a block is transferred from L2 cache to L1
cache. What is the total time taken for these transfers ?
(A) 222 nanoseconds (B) 888 nanoseconds
(C) 902 nanoseconds (D) 968 nanoseconds
in
YEAR 2011 ONE MARK
.
co
Q. 83 Consider a hypothetical processor with a instruction of type LWR1, 20(R2),
which during execution reads a 32-bit word from memory and stores it in a 32-
.
bit register R1. The effective address of the memory location is obtained by the
a
addition of a constant 20 and the contents of register R2. Which of the following
in memory?
d i
best reflects the addressing mode implemented by this instruction for the operand
w
(C) Register Indirect Scaled Addressing
(D) Base Indexed Addressing
w
YEAR 2011
w TWO MARKS
Q. 84
©
On a non-pipelined sequential processor, a program segment, which is a part of
the interrupt service routine, is given to transfer 500 bytes from an I/O device to
memory.
Initialize the address register
Initialize the count to 500 LOOP:Load a byte from device
Store in memory at address given by address register
Increment the address register
Decrement the court
If count! = 0 go to LOOP
Assume that each statement in this program is equivalent to a machine instruction
which takes one clock cycle to execute if it is a non-load/store instruction. The
load-store instructions take two clock cycles to execute.
The designer of the system also has an alternate approach of using the DMA
controller to implement the same transfer. The DMA controller requires 20 clock
cycles for initialization and other overhead. Each DMA transfer cycle takes two
clock cycles to transfer one byte of data from interrupt driven program based
input-output?
(A) 3.4 (B) 4.4
(C) 5.1 (D) 6.7
GATE SOLVED PAPER - CS COMPUTERORGANIZATION&ARCHITECTURE
in
(A) 2 (B) 9
(C) 5
.
(D) 3
co
Q. 86 Consider an instruction pipeline with four stages (S1, S2, S3 and S4) each with
.
combinational circuit only. The pipeline registers are required between each stage
a
i
and at the end of the last stage. Delays for the stages and for the pipeline registers
d
are as given in the figure.
n o
.
w
w
w
©
What is the approximate speed up of the pipeline in steady state under ideal
conditions when compared to the corresponding non-pipeline implementation?
(A) 4.0 (B) 2.5
(C) 1.1 (D) 3.0
Q. 88 The decimal value 0.5 in IEEE single precision floating point representation has
(A) fraction bits of 000 ... 000 and exponent value of 0
(B) fraction bits of 000 ... 000 and exponent value of –1
(C) fraction bits of 100 ... 000 and exponent value of 0
(D) no exact representation
in
(B) for efficient access to function parameters and local variables
.
(C) to handle certain kinds of hazards
co
(D) as part of address translation
a.
YEAR 2012 TWO MARKS
d i
o
Statement For Linked Q. 91 and 92 :
.n
A computer has a 256 Kbyte, 4-way set associative, write back data cache with block
size of 32 Bytes. The processor sends 32 bit addresses to the cache controller. Each
w
cache tag directory entry contains, in addition to address tag, 2 valid bits, 1 modified
w
bit and 2 replacement bit.
w
Q. 91 The number of bits in the tag field of an address is
(A) 11 (B) 14
Q. 92
©
(C) 16
**********
GATE SOLVED PAPER - CS COMPUTERORGANIZATION&ARCHITECTURE
ANSWER KEY
Computer Organization & Architecture
1 2 3 4 5 6 7 8 9 10
(A) (D) (A) (C) (B) (C) (D) (A) (B) (C)
11 12 13 14 15 16 17 18 19 20
(A) (D) (A) (C) (A) (D) (D) (C) (D) (C)
21 22 23 24 25 26 27 28 29 30
(D) (A) (A) (C) (A) (C) (B) (C) (A) (D)
31 32 33 34 35 36 37 38 39 40
(C) (B) (A) (B) (C) (D) (C) (A) (B) (B)
41 42 43 44 45 46 47 48 49 50
(B) (B) (B) (C) (D) (C) (A) (A) (B) (A)
51 52 53 54 55 56 57 58 59 60
(B) (B) (A) (B) (D) (A) (A) (C) (A) (C)
in
61 62 63 64 65 66 67 68 69 70
.
(C) (D) (A) (D) (C) (B) (B) (B) (C) (B)
co
71 72 73 74 75 76 77 78 79 80
a.
(B) (C) (C) (B) (D) (C) (C) (D) (C) (B)
81 82 83 84 85 86 87 88 89 90
di
(D) (D) (D) (A) (D) (B) (D) (C) (D) (C)
o
91 92
. n
(C) (A)
w
w
w
©