SlideShare a Scribd company logo
1 of 11
UNIT-4
PIPELINE PROCESSING AND MEMORY ORGANISATION
1.The pipelining process is also called as ______
a) Superscalar operation
b) Assembly line operation
c) Von Neumann cycle
d) Processor
Answer:b
2.The fetch and execution cycles are interleaved with the help of ________
a) Modification in processor architecture
b) Clock
c) Special unit
d) Control unit
Answer:b
3.Each stage in pipelining should be completed within ___________ cycle.
a) 1
b) 2
c) 3
d) 4
Answer:a
4.To increase the speed of memory access in pipelining, we make use of _______
a) Special memory locations
b) Special purpose registers
c) Cache
d) Buffers
Answer:c
5.The situation wherein the data of operands are not available is called ______
a) Data hazard
b) Stock
c) Deadlock
d) Structural hazard
Answer:a
6. A collection of lines that connects several devices is called ..............
a) bus
b) peripheral connection wires
c) Both a and b
d) internal wires
Answer:a
7. PC Program Counter is also called ...................
a) instruction pointer
b) memory pointer
c) data counter
d) file pointer
Answer:a
8. When a subroutine is called, the address of the instruction following the CALL instructions
stored in/on the
a) stack pointer
b) accumulator
c) program counter
d) Stack
Answer: d
9. From where interrupts are generated?
a) Central processing unit
b) Memory chips
c) Registers
d) I/O devices
Answer: d
10. Systems that do not have parallel processing capabilities are
a) SISD
b) SIMD
c) MIMD
d) MISD
Answer: a
11. How many address lines are needed to address each memory location in a 2048X 4 memory
chip?
a) 10
b) 11
c) 8
d) 12
Answer: b
12. Parallel processing may occur
a) in the instruction stream
b) in the data stream
c) instruction and data stream
d) fetch and decode
Answer:c
13. Characteristic of RISC (Reduced Instruction Set Computer) instruction set is
a) three instructions per cycle
b) two instructions per cycle
c) one instruction per cycle
d) four instruction per cycle
Answer:c
14. In daisy-chaining priority method, all the devices that can request an interrupt are connected
in
a) parallel
b) serial
c) random
d) balanced
Answer: b
15.In the memory hierarchy,the fastest memory is
a) SRAM
b) Cache
c) Registers
d) DRAM
Answer:c
16.Cache memory is implemented using
a) Dynamic RAM
b) Static RAM
c) PROM
d) EROM
Answer:b
17.Given a 256*4 RAM chips,howmany chips are required to provide a memory capacity of
1KB of RAM?
a) 1
b) 8
c) 4
d) 6
Answer:a
18. The standard SRAM chips are costly as _________
a) They use highly advanced micro-electronic devices
b) They house 6 transistor per chip
c) They require specially designed PCB’s
d) 4 chips
Answer:b
19. The next level of memory hierarchy after the L2 cache is _______
a) Secondary storage
b) TLB
c) Main memory
d) Register
Answer:d
20. The last on the hierarchy scale of memory devices is ______
a) Main memory
b) Secondary memory
c) TLB
d) Flash drives
Answer:b
21. The effectiveness of the cache memory is based on the property of ________
a) Locality of reference
b) Memory localisation
c) Memory size
d) None of the mentioned
Answer:a
22. The correspondence between the main memory blocks and those in the cache is given by
_________
a) Hash function
b) Mapping function
c) Locale function
d) Assign function
Answer:b
23.Memory unit accessed by content is called
a.Read only memory
b.Programmable memory
c.Virtual Memory
d.Associative memory
Answer:d
24. Because of virtual memory, the memory can be shared among ____________
a) processes
b) threads
c) instructions
d) segments
Answer:a
25. Effective access time is directly proportional to ____________
a) page-fault rate
b) hit ratio
c) memory access time
d) execution time
Answer:a
26. The algorithm to remove and place new contents into the cache is called _______
a) FIFO algorithm
b) Renewal algorithm
c) Updation
d) Replacement algorithm
Answer:d
27. The memory unit that communicates directly within the CPU, Auxillary memory and
Cache memory, is called
a) Auxiliary Memory
b) Main Memory
c) Registers
d)Virtual Memory
Answer:b
28. A certain processor uses a fully associative cache of size 16KB.The cache block size is
16bytes. Assume that the main memory is byte addressable and uses a 32-bit address. How many
bits are required for the Tag and the Index fields respectively in the addresses generated by the
processor?
a) 24bits and 0 bits
b) 28bits and 4 bits
c) 24bits and 4 bits
d) 28bits and 0 bits
Answer:d
29. A cache memory unit with capacity of N words and block size of B words is to be designed.
If it is designed as a direct mapped cache, the length of the TAG field is 10 bits. If the cache unit
is now designed as a 16-way set-associative cache, the length of the TAG field is ______ bits.
a) 14.0 to 14.0
b) 15.0 to 15.0
c) 14.0 to 16.0
d) 16.0 to 14.0
Answer:a
30. In designing a computer’s cache system, the cache block (or cache line) size is an important
parameter. Which one of the following statements is correct in this context?
a) A smaller block size implies better spatial locality
b)A smaller block size implies a smaller cache tag and hence lower cache tag overhead
c) A smaller block size implies a larger cache tag and hence lower cache hit time
d) A smaller block size incurs a lower cache miss penalty
Answer:d
31. A RAM chip has a capacity of 1024 words of 8 bits each (1K × 8). The number of 2 × 4
decoders with enable line needed to construct a 16K × 16 RAM from 1K × 8 RAM is
a) 4
b) 5
c) 6
d) 7
Answer:b
32. Register renaming is done in pipelined processors
a) as an alternative to register allocation at compile time
b) for efficient access to function parameters and local variables
c) to handle certain kinds of hazards
d) as part of address translation
Answer:c
33. A computer has a 256 KByte, 4-way set associative, write back data cache with block size of
32 Bytes. The processor sends 32 bit addresses to the cache controller. Each cache tag directory
entry contains, in addition to address tag, 2 valid bits, 1 modified bit and 1 replacement bit.The
size of the cache tag directory is
a) 160K bits
b) 136K bits
c) 40K bits
d) 32K bits
Answer:a
34. For a magnetic disk with concentric circular tracks, the seek latency is not linearly
proportional to the seek distance due to
a) non-uniform distribution of requests
b) arm starting and stopping inertia
c) higher capacity of tracks on the periphery of the platter
d) use of unfair arm scheduling policies
Answer:b
35. In an instruction execution pipeline, the earliest that the data TLB (Translation Lookaside
Buffer) can be accessed is
a) Before effective address calculation has started
b) During effective address calculation
c) After effective address calculation has completed
d) After data cache lookup has completed
Answer:b
36. Consider a pipelined processor with the following four stages:
IF:InstructionFetch
ID:InstructionDecodeandOperandFetch
EX:Execute
WB: Write Back
The IF, ID and WB stages take one clock cycle each to complete the operation. The number of
clock cycles for the EX stage depends on the instruction. The ADD and SUB instructions need 1
clock cycle and the MUL instruction needs 3 clock cycles in the EX stage. Operand forwarding
is used in the pipelined processor. What is the number of clock cycles taken to complete the
following sequence of instructions?
ADD R2, R1, R0R2 ←← R1 + R0
MUL R4, R3, R2 R4 ←← R3 * R2
SUB R6, R5, R4 R6 ←← R5 - R4
a)7
b)8
c)10
d)14
Answer:b
37. If a unit completes its task before the allotted time period, then _______
a)It’ll perform some other task in the remaining time
b)Its time gets reallocated to a different task
c)It’ll remain idle for the remaining time
d) None of the mentioned
Answer:c
38. The situation wherein the data of operands are not available is called ______
a) Data hazard
b) Stock
c) Deadlock
d) Structural hazard
Answer:a
39. The computer architecture aimed at reducing the time of execution of instructions is
________
a) CISC
b) RISC
c) ISA
d) ANNA
Answer:b
40. The time lost due to the branch instruction is often referred to as ____________
a) Latency
b) Delay
c) Branch penalty
d) Branch lost
Answer:c
Coa

More Related Content

What's hot

An evaluation of LLVM compiler for SVE with fairly complicated loops
An evaluation of LLVM compiler for SVE with fairly complicated loopsAn evaluation of LLVM compiler for SVE with fairly complicated loops
An evaluation of LLVM compiler for SVE with fairly complicated loopsLinaro
 
A Kernel of Truth: Intrusion Detection and Attestation with eBPF
A Kernel of Truth: Intrusion Detection and Attestation with eBPFA Kernel of Truth: Intrusion Detection and Attestation with eBPF
A Kernel of Truth: Intrusion Detection and Attestation with eBPFoholiab
 
An Efficient High Speed Design of 16-Bit Sparse-Tree RSFQ Adder
An Efficient High Speed Design of 16-Bit Sparse-Tree RSFQ AdderAn Efficient High Speed Design of 16-Bit Sparse-Tree RSFQ Adder
An Efficient High Speed Design of 16-Bit Sparse-Tree RSFQ AdderIJERA Editor
 
High-Performance Physics Solver Design for Next Generation Consoles
High-Performance Physics Solver Design for Next Generation ConsolesHigh-Performance Physics Solver Design for Next Generation Consoles
High-Performance Physics Solver Design for Next Generation ConsolesSlide_N
 
Memory Barriers in the Linux Kernel
Memory Barriers in the Linux KernelMemory Barriers in the Linux Kernel
Memory Barriers in the Linux KernelDavidlohr Bueso
 
High-Speed and Low-Latency ECC Processor Implementation Over GF(2m) on FPGA
High-Speed and Low-Latency ECC Processor Implementation Over GF(2m) on FPGAHigh-Speed and Low-Latency ECC Processor Implementation Over GF(2m) on FPGA
High-Speed and Low-Latency ECC Processor Implementation Over GF(2m) on FPGAJAYAPRAKASH JPINFOTECH
 
Code GPU with CUDA - Memory Subsystem
Code GPU with CUDA - Memory SubsystemCode GPU with CUDA - Memory Subsystem
Code GPU with CUDA - Memory SubsystemMarina Kolpakova
 
Pragmatic Optimization in Modern Programming - Demystifying the Compiler
Pragmatic Optimization in Modern Programming - Demystifying the CompilerPragmatic Optimization in Modern Programming - Demystifying the Compiler
Pragmatic Optimization in Modern Programming - Demystifying the CompilerMarina Kolpakova
 
Code GPU with CUDA - Optimizing memory and control flow
Code GPU with CUDA - Optimizing memory and control flowCode GPU with CUDA - Optimizing memory and control flow
Code GPU with CUDA - Optimizing memory and control flowMarina Kolpakova
 
Xdp and ebpf_maps
Xdp and ebpf_mapsXdp and ebpf_maps
Xdp and ebpf_mapslcplcp1
 
07 processor basics
07 processor basics07 processor basics
07 processor basicsMurali M
 
eBPF Perf Tools 2019
eBPF Perf Tools 2019eBPF Perf Tools 2019
eBPF Perf Tools 2019Brendan Gregg
 
05322201 Microprocessors And Microcontrollers Set1
05322201 Microprocessors And Microcontrollers Set105322201 Microprocessors And Microcontrollers Set1
05322201 Microprocessors And Microcontrollers Set1guestd436758
 
Compilation of COSMO for GPU using LLVM
Compilation of COSMO for GPU using LLVMCompilation of COSMO for GPU using LLVM
Compilation of COSMO for GPU using LLVMLinaro
 

What's hot (16)

Mcqs
McqsMcqs
Mcqs
 
An evaluation of LLVM compiler for SVE with fairly complicated loops
An evaluation of LLVM compiler for SVE with fairly complicated loopsAn evaluation of LLVM compiler for SVE with fairly complicated loops
An evaluation of LLVM compiler for SVE with fairly complicated loops
 
A Kernel of Truth: Intrusion Detection and Attestation with eBPF
A Kernel of Truth: Intrusion Detection and Attestation with eBPFA Kernel of Truth: Intrusion Detection and Attestation with eBPF
A Kernel of Truth: Intrusion Detection and Attestation with eBPF
 
An Efficient High Speed Design of 16-Bit Sparse-Tree RSFQ Adder
An Efficient High Speed Design of 16-Bit Sparse-Tree RSFQ AdderAn Efficient High Speed Design of 16-Bit Sparse-Tree RSFQ Adder
An Efficient High Speed Design of 16-Bit Sparse-Tree RSFQ Adder
 
High-Performance Physics Solver Design for Next Generation Consoles
High-Performance Physics Solver Design for Next Generation ConsolesHigh-Performance Physics Solver Design for Next Generation Consoles
High-Performance Physics Solver Design for Next Generation Consoles
 
Memory Barriers in the Linux Kernel
Memory Barriers in the Linux KernelMemory Barriers in the Linux Kernel
Memory Barriers in the Linux Kernel
 
High-Speed and Low-Latency ECC Processor Implementation Over GF(2m) on FPGA
High-Speed and Low-Latency ECC Processor Implementation Over GF(2m) on FPGAHigh-Speed and Low-Latency ECC Processor Implementation Over GF(2m) on FPGA
High-Speed and Low-Latency ECC Processor Implementation Over GF(2m) on FPGA
 
Code GPU with CUDA - Memory Subsystem
Code GPU with CUDA - Memory SubsystemCode GPU with CUDA - Memory Subsystem
Code GPU with CUDA - Memory Subsystem
 
Operating system quiz
Operating system quizOperating system quiz
Operating system quiz
 
Pragmatic Optimization in Modern Programming - Demystifying the Compiler
Pragmatic Optimization in Modern Programming - Demystifying the CompilerPragmatic Optimization in Modern Programming - Demystifying the Compiler
Pragmatic Optimization in Modern Programming - Demystifying the Compiler
 
Code GPU with CUDA - Optimizing memory and control flow
Code GPU with CUDA - Optimizing memory and control flowCode GPU with CUDA - Optimizing memory and control flow
Code GPU with CUDA - Optimizing memory and control flow
 
Xdp and ebpf_maps
Xdp and ebpf_mapsXdp and ebpf_maps
Xdp and ebpf_maps
 
07 processor basics
07 processor basics07 processor basics
07 processor basics
 
eBPF Perf Tools 2019
eBPF Perf Tools 2019eBPF Perf Tools 2019
eBPF Perf Tools 2019
 
05322201 Microprocessors And Microcontrollers Set1
05322201 Microprocessors And Microcontrollers Set105322201 Microprocessors And Microcontrollers Set1
05322201 Microprocessors And Microcontrollers Set1
 
Compilation of COSMO for GPU using LLVM
Compilation of COSMO for GPU using LLVMCompilation of COSMO for GPU using LLVM
Compilation of COSMO for GPU using LLVM
 

Similar to Coa

Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
Computer System Architecture Lecture Note 8.1 primary Memory
Computer System Architecture Lecture Note 8.1 primary MemoryComputer System Architecture Lecture Note 8.1 primary Memory
Computer System Architecture Lecture Note 8.1 primary MemoryBudditha Hettige
 
Digital Electronics & Computer Oraganisation
Digital Electronics & Computer OraganisationDigital Electronics & Computer Oraganisation
Digital Electronics & Computer Oraganisationamitymbaassignment
 
Understanding the virtual memory - Ixia Connect #2
Understanding the virtual memory - Ixia Connect #2Understanding the virtual memory - Ixia Connect #2
Understanding the virtual memory - Ixia Connect #2IxiaRomania
 
Chp3 designing bus system, memory & io copy
Chp3 designing bus system, memory & io   copyChp3 designing bus system, memory & io   copy
Chp3 designing bus system, memory & io copymkazree
 
Lec6 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Instruction...
Lec6 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Instruction...Lec6 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Instruction...
Lec6 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Instruction...Hsien-Hsin Sean Lee, Ph.D.
 
5_2018_08_07!07_51_31_AM.pdf
5_2018_08_07!07_51_31_AM.pdf5_2018_08_07!07_51_31_AM.pdf
5_2018_08_07!07_51_31_AM.pdfBizuayehuDesalegn
 

Similar to Coa (20)

final_2014.pdf
final_2014.pdffinal_2014.pdf
final_2014.pdf
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
Risc vs cisc
Risc vs ciscRisc vs cisc
Risc vs cisc
 
Computer System Architecture Lecture Note 8.1 primary Memory
Computer System Architecture Lecture Note 8.1 primary MemoryComputer System Architecture Lecture Note 8.1 primary Memory
Computer System Architecture Lecture Note 8.1 primary Memory
 
Computer architecture PART 1
Computer architecture  PART 1Computer architecture  PART 1
Computer architecture PART 1
 
Digital Electronics & Computer Oraganisation
Digital Electronics & Computer OraganisationDigital Electronics & Computer Oraganisation
Digital Electronics & Computer Oraganisation
 
Understanding the virtual memory - Ixia Connect #2
Understanding the virtual memory - Ixia Connect #2Understanding the virtual memory - Ixia Connect #2
Understanding the virtual memory - Ixia Connect #2
 
Chp3 designing bus system, memory & io copy
Chp3 designing bus system, memory & io   copyChp3 designing bus system, memory & io   copy
Chp3 designing bus system, memory & io copy
 
Mips 64
Mips 64Mips 64
Mips 64
 
1083 wang
1083 wang1083 wang
1083 wang
 
Cache recap
Cache recapCache recap
Cache recap
 
Cache recap
Cache recapCache recap
Cache recap
 
Cache recap
Cache recapCache recap
Cache recap
 
Cache recap
Cache recapCache recap
Cache recap
 
Cache recap
Cache recapCache recap
Cache recap
 
Cache recap
Cache recapCache recap
Cache recap
 
Cache recap
Cache recapCache recap
Cache recap
 
Lec6 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Instruction...
Lec6 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Instruction...Lec6 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Instruction...
Lec6 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Instruction...
 
Computer architecture PART 2
Computer architecture  PART  2Computer architecture  PART  2
Computer architecture PART 2
 
5_2018_08_07!07_51_31_AM.pdf
5_2018_08_07!07_51_31_AM.pdf5_2018_08_07!07_51_31_AM.pdf
5_2018_08_07!07_51_31_AM.pdf
 

More from TPLatchoumi (9)

Unit 3
Unit 3Unit 3
Unit 3
 
Unit 2
Unit 2Unit 2
Unit 2
 
Unit iii
Unit iiiUnit iii
Unit iii
 
Unit i
Unit iUnit i
Unit i
 
Unit ii
Unit iiUnit ii
Unit ii
 
Unit 1
Unit 1Unit 1
Unit 1
 
Unit v
Unit vUnit v
Unit v
 
Unit iv
Unit ivUnit iv
Unit iv
 
17 cs002
17 cs00217 cs002
17 cs002
 

Recently uploaded

Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 

Recently uploaded (20)

DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 

Coa

  • 1. UNIT-4 PIPELINE PROCESSING AND MEMORY ORGANISATION 1.The pipelining process is also called as ______ a) Superscalar operation b) Assembly line operation c) Von Neumann cycle d) Processor Answer:b 2.The fetch and execution cycles are interleaved with the help of ________ a) Modification in processor architecture b) Clock c) Special unit d) Control unit Answer:b 3.Each stage in pipelining should be completed within ___________ cycle. a) 1 b) 2 c) 3 d) 4 Answer:a 4.To increase the speed of memory access in pipelining, we make use of _______ a) Special memory locations b) Special purpose registers c) Cache d) Buffers Answer:c 5.The situation wherein the data of operands are not available is called ______ a) Data hazard b) Stock c) Deadlock d) Structural hazard Answer:a 6. A collection of lines that connects several devices is called ..............
  • 2. a) bus b) peripheral connection wires c) Both a and b d) internal wires Answer:a 7. PC Program Counter is also called ................... a) instruction pointer b) memory pointer c) data counter d) file pointer Answer:a 8. When a subroutine is called, the address of the instruction following the CALL instructions stored in/on the a) stack pointer b) accumulator c) program counter d) Stack Answer: d 9. From where interrupts are generated? a) Central processing unit b) Memory chips c) Registers d) I/O devices Answer: d 10. Systems that do not have parallel processing capabilities are a) SISD b) SIMD c) MIMD d) MISD Answer: a
  • 3. 11. How many address lines are needed to address each memory location in a 2048X 4 memory chip? a) 10 b) 11 c) 8 d) 12 Answer: b 12. Parallel processing may occur a) in the instruction stream b) in the data stream c) instruction and data stream d) fetch and decode Answer:c 13. Characteristic of RISC (Reduced Instruction Set Computer) instruction set is a) three instructions per cycle b) two instructions per cycle c) one instruction per cycle d) four instruction per cycle Answer:c 14. In daisy-chaining priority method, all the devices that can request an interrupt are connected in a) parallel b) serial c) random d) balanced Answer: b 15.In the memory hierarchy,the fastest memory is a) SRAM b) Cache c) Registers d) DRAM
  • 4. Answer:c 16.Cache memory is implemented using a) Dynamic RAM b) Static RAM c) PROM d) EROM Answer:b 17.Given a 256*4 RAM chips,howmany chips are required to provide a memory capacity of 1KB of RAM? a) 1 b) 8 c) 4 d) 6 Answer:a 18. The standard SRAM chips are costly as _________ a) They use highly advanced micro-electronic devices b) They house 6 transistor per chip c) They require specially designed PCB’s d) 4 chips Answer:b 19. The next level of memory hierarchy after the L2 cache is _______ a) Secondary storage b) TLB c) Main memory d) Register Answer:d 20. The last on the hierarchy scale of memory devices is ______ a) Main memory b) Secondary memory
  • 5. c) TLB d) Flash drives Answer:b 21. The effectiveness of the cache memory is based on the property of ________ a) Locality of reference b) Memory localisation c) Memory size d) None of the mentioned Answer:a 22. The correspondence between the main memory blocks and those in the cache is given by _________ a) Hash function b) Mapping function c) Locale function d) Assign function Answer:b 23.Memory unit accessed by content is called a.Read only memory b.Programmable memory c.Virtual Memory d.Associative memory Answer:d 24. Because of virtual memory, the memory can be shared among ____________ a) processes b) threads c) instructions d) segments Answer:a 25. Effective access time is directly proportional to ____________ a) page-fault rate
  • 6. b) hit ratio c) memory access time d) execution time Answer:a 26. The algorithm to remove and place new contents into the cache is called _______ a) FIFO algorithm b) Renewal algorithm c) Updation d) Replacement algorithm Answer:d 27. The memory unit that communicates directly within the CPU, Auxillary memory and Cache memory, is called a) Auxiliary Memory b) Main Memory c) Registers d)Virtual Memory Answer:b 28. A certain processor uses a fully associative cache of size 16KB.The cache block size is 16bytes. Assume that the main memory is byte addressable and uses a 32-bit address. How many bits are required for the Tag and the Index fields respectively in the addresses generated by the processor? a) 24bits and 0 bits b) 28bits and 4 bits c) 24bits and 4 bits d) 28bits and 0 bits Answer:d 29. A cache memory unit with capacity of N words and block size of B words is to be designed. If it is designed as a direct mapped cache, the length of the TAG field is 10 bits. If the cache unit is now designed as a 16-way set-associative cache, the length of the TAG field is ______ bits.
  • 7. a) 14.0 to 14.0 b) 15.0 to 15.0 c) 14.0 to 16.0 d) 16.0 to 14.0 Answer:a 30. In designing a computer’s cache system, the cache block (or cache line) size is an important parameter. Which one of the following statements is correct in this context? a) A smaller block size implies better spatial locality b)A smaller block size implies a smaller cache tag and hence lower cache tag overhead c) A smaller block size implies a larger cache tag and hence lower cache hit time d) A smaller block size incurs a lower cache miss penalty Answer:d 31. A RAM chip has a capacity of 1024 words of 8 bits each (1K × 8). The number of 2 × 4 decoders with enable line needed to construct a 16K × 16 RAM from 1K × 8 RAM is a) 4 b) 5 c) 6 d) 7 Answer:b 32. Register renaming is done in pipelined processors a) as an alternative to register allocation at compile time b) for efficient access to function parameters and local variables c) to handle certain kinds of hazards
  • 8. d) as part of address translation Answer:c 33. A computer has a 256 KByte, 4-way set associative, write back data cache with block size of 32 Bytes. The processor sends 32 bit addresses to the cache controller. Each cache tag directory entry contains, in addition to address tag, 2 valid bits, 1 modified bit and 1 replacement bit.The size of the cache tag directory is a) 160K bits b) 136K bits c) 40K bits d) 32K bits Answer:a 34. For a magnetic disk with concentric circular tracks, the seek latency is not linearly proportional to the seek distance due to a) non-uniform distribution of requests b) arm starting and stopping inertia c) higher capacity of tracks on the periphery of the platter d) use of unfair arm scheduling policies Answer:b 35. In an instruction execution pipeline, the earliest that the data TLB (Translation Lookaside Buffer) can be accessed is a) Before effective address calculation has started b) During effective address calculation c) After effective address calculation has completed d) After data cache lookup has completed
  • 9. Answer:b 36. Consider a pipelined processor with the following four stages: IF:InstructionFetch ID:InstructionDecodeandOperandFetch EX:Execute WB: Write Back The IF, ID and WB stages take one clock cycle each to complete the operation. The number of clock cycles for the EX stage depends on the instruction. The ADD and SUB instructions need 1 clock cycle and the MUL instruction needs 3 clock cycles in the EX stage. Operand forwarding is used in the pipelined processor. What is the number of clock cycles taken to complete the following sequence of instructions? ADD R2, R1, R0R2 ←← R1 + R0 MUL R4, R3, R2 R4 ←← R3 * R2 SUB R6, R5, R4 R6 ←← R5 - R4 a)7 b)8 c)10 d)14 Answer:b 37. If a unit completes its task before the allotted time period, then _______ a)It’ll perform some other task in the remaining time b)Its time gets reallocated to a different task c)It’ll remain idle for the remaining time d) None of the mentioned Answer:c 38. The situation wherein the data of operands are not available is called ______ a) Data hazard b) Stock c) Deadlock d) Structural hazard
  • 10. Answer:a 39. The computer architecture aimed at reducing the time of execution of instructions is ________ a) CISC b) RISC c) ISA d) ANNA Answer:b 40. The time lost due to the branch instruction is often referred to as ____________ a) Latency b) Delay c) Branch penalty d) Branch lost Answer:c