Computer Architecture MCQS
Computer Architecture MCQS
a) set of categories and methods that specify the functioning, organisation, and
implementation of computer systems
b) set of principles and methods that specify the functioning, organisation, and
implementation of computer systems
c) set of functions and methods that specify the functioning, organisation, and
implementation of computer systems
d) None of the mentioned
Answer: b
2. What is computer organization?
a) structure and behaviour of a computer system as observed by the user
b) structure of a computer system as observed by the developer
c) structure and behaviour of a computer system as observed by the developer
d) All of the mentioned
Answer: a
3. Which of the following is a type of computer architecture?
a) Microarchitecture
b) Harvard Architecture
c) Von-Neumann Architecture
d) All of the mentioned
Answer: d
4. Which of the following is a type of architecture used in the computers
nowadays?
a) Microarchitecture
b) Harvard Architecture
c) Von-Neumann Architecture
d) System Design
Answer: c
5. Which of the following is the subcategories of computer architecture?
a) Microarchitecture
b) Instruction set architecture
c) Systems design
d) All of the mentioned
Answer: d
6. Which of the architecture is power efficient?
a) RISC
b) ISA
c) IANA
d) CISC
Answer: a
7. What does CSA stands for?
a) Computer Service Architecture
b) Computer Speed Addition
c) Carry Save Addition
d) None of the mentioned
Answer: b
8. If an exception is raised and the succeeding instructions are executed
completely, then the processor is said to have ______
a) Generation word
b) Exception handling
c) Imprecise exceptions
d) None of the mentioned
Answer: c
9. To reduce the memory access time we generally make use of ______
a) SDRAM’s
b) Heaps
c) Cache’s
d) Higher capacity RAM’s
Answer: c
10. The IA-32 system follows which of the following design?
a) CISC
b) SIMD
c) RISC
d) None of the mentioned
Answer: a
11. Which of the following architecture is suitable for a wide range of data types?
a) IA-32
b) ARM
c) ASUS firebird
d) 68000
Answer: a
12. In IA-32 architecture along with the general flags, which of the following
conditional flags are provided?
a) TF
b) IOPL
c) IF
d) All of the mentioned
Answer: d
13. The VLIW architecture follows _____ approach to achieve parallelism.
a) SISD
b) MIMD
c) MISD
d) SIMD
Answer: b
14. What does VLIW stands for?
a) Very Long Instruction Width
b) Very Large Instruction Word
c) Very Long Instruction Width
d) Very Long Instruction Word
Answer: b
15. In CISC architecture most of the complex instructions are stored in _____
a) CMOS
b) Register
c) Transistors
d) Diodes
Answer: c
16. Both the CISC and RISC architectures have been developed to reduce the
______
a) Time delay
b) Semantic gap
c) Cost
d) All of the mentioned
Answer: b
17. ________ are the different type/s of generating control signals.
a) Hardwired
b) Micro-instruction
c) Micro-programmed
d) Both Micro-programmed and Hardwired
Answer: d
18. If the instruction Add R1, R2, R3 is executed in a system which is pipelined,
then the value of S is (Where S is term of the Basic performance equation).
a) 2
b) ~1
c) ~7
d) 2
Answer: b
19. The small extremely fast, RAM’s all called as ________
a) Heaps
b) Accumulators
c) Stacks
d) Cache
Answer: d
20. For a given FINITE number of instructions to be executed, which architecture
of the processor provides for a faster execution?
a) ANSA
b) Super-scalar
c) ISA
d) All of the mentioned
Answer: b
26. The chip can be disabled or cut off from an external connection using ______
a) ACPT
b) RESET
c) LOCK
d) Chip select
Answer: d
27. The controller multiplexes the addresses after getting the _____ signal.
a) INTR
b) ACK
c) RESET
d) Request
Answer: d
28. The data is transferred over the RAMBUS as _______
a) Blocks
b) Swing voltages
c) Bits
d) Packets
Answer: b
29. The memory devices which are similar to EEPROM but differ in the cost
effectiveness is ______
a) CMOS
b) Memory sticks
c) Blue-ray devices
d) Flash memory
Answer: d
30. The flash memory modules designed to replace the functioning of a hard disk is
______
a) RIMM
b) FIMM
c) Flash drives
d) DIMM
Answer: c
36. While using the direct mapping technique, in a 16 bit system the higher order 5
bits are used for ________
a) Id
b) Word
c) Tag
d) Block
Answer: c
37. The bit used to indicate whether the block was recently used or not is _______
a) Reference bit
b) Dirty bit
c) Control bit
d) Idol bit
Answer: b
38. The number successful accesses to memory stated as a fraction is called as
_____
a) Access rate
b) Success rate
c) Hit rate
d) Miss rate
Answer: c