Computer Organization Subject-Wise
Question 1 |
The name of a source program in microcomputers | |
Set of micro instructions that define the individual operations in response to a machine-language instruction | |
A primitive form of macros used in assembly language programming | |
A very small segment of machine code |
Reference : https://www.ques10.com/p/11119/what-is-microprogramming-draw-and-explain-micro--1/
Question 2 |
12 | |
25 | |
38 | |
44 |
converting in to Binary D4FE2003 = 1101 0100 1111 1110 0010 0000 0000 0011
Total bits = 32
Number of vacant tracks i.e. with value 0 = 18
Number of occupied tracks i.e. with value 1 =14
Thus Percentage occupied tracks = 14/32 * 100 = 43.75% ≃ 44%
so, Nearest percentage is 44%
Question 3 |
The computer provides special instructions for manipulating I/O ports | |
I/O ports are placed at addresses on the bus and are accessed just like other memory locations | |
To perform I/O operations, it is sufficient to place the data in an address register and call channel to perform the operation | |
I/O can be performed only when memory management hardware is turned on |
- Memory-mapped I/O uses the same address space to address both memory and I/O devices.
- The memory and registers of the I/O devices are mapped to (associated with) address values.
- So when an address is accessed by the CPU, it may refer to a portion of physical RAM, or it can instead refer to
- memory of the I/O device. Thus, the CPU instructions used to access the memory can also be used for accessing devices.
- Each I/O device monitors the CPU's address bus and responds to any CPU access of an address assigned to that device, connecting the data bus to the desired device's hardware register.
- To accommodate the I/O devices, areas of the addresses used by the CPU must be reserved for I/O and must not be available for normal physical memory.
- The reservation may be permanent, or temporary (as achieved via bank switching). An example of the latter is found in the Commodore 64, which uses a form of memory mapping to cause RAM or I/O hardware to appear in the 0xD000-0xDFFF range.
Question 4 |
3m bits | |
3m + n bits | |
M + n bits | |
3m + n + 30 bits |
Therefore m+10 bits are required to represented the Whole memory
Similarly 2n operations can be represented by using n bits.
Now instruction form

So Instruction operator1,operator 2,operator 3. Will take 3m+30+n bits
Question 5 |
Snoopy bus protocol | |
Cache coherence protocol | |
Directory based protocol | |
None of the above |

Question 6 |
And written by CPU | |
And written by peripheral | |
By peripheral and written by CPU | |
By CPU and written by the peripheral |
Here, the peripheral refers to the output devices. The output devices may be a monitor, or pen drive or a disc.
Every peripheral device is controlled by writing and reading its registers
Question 7 |
Virtual memory | |
Interrupts | |
Main memory | |
Cache memory |
In other words, Locality of Reference refers to the tendency of the computer program to access instructions whose addresses are near one another.
locality of reference. There are two ways with which data or instruction is fetched from main memory and get stored in cache memory. These two ways are the following:
Temporal Locality :
Temporal locality means current data or instruction that is being fetched may be needed soon.
In Temporal Locality The Least Recently Algorithm is Used (LRU)
Clustering in time: items referenced in the immediate past have a high probability of being re-referenced in the immediate future
Spatial Locality:
Spatial locality means instruction or data near to the current memory location that is being fetched, may be needed soon in the near future.
Clustering in space: items located physically near an item referenced in the immediate past have a high probability of being re-referenced in the immediate future
Refer : https://www.cs.usask.ca/faculty/bunt/presentations/Locality.ppt
Question 8 |
109 | |
216 | |
300 | |
219 |
Reference: https://en.wikipedia.org/wiki/Serial_port#Speed.
"2400 baud" means that the serial port is capable of transferring a maximum of 2400 bits per second."
So, transmission rate here = 2400 bps
For asynchronous communication we require start and stop bits,
Total bit per character = 8 bit data + 2 stop bit +1 start bit = 11 bits
no of characters = 2400/11 = 218.18
for transmitted characters we take floor i.e,. 218
For synchronous communication, we don't need start and stop bits.
Number of 8 bit characters that can be transmitted per second = 2400/8 = 300
Question 9 |
MSB of data in the lowest memory address of data unit | |
LSB of data in the lowest memory address of data unit | |
MSB of data in the highest memory address of data unit | |
LSB of data in the highest memory address of data uni |
- A big-endian system stores the most significant byte of a word at the smallest memory address and the least significant byte at the largest.
- A little-endian system, in contrast, stores the least-significant byte at the smallest address.
Reference : https://en.wikipedia.org/wiki/Endianness#:~:text=A%20big%2Dendian%20system%20stores,sized%20groups%20of%20binary%20bits.
Question 10 |
X: Indirect Addressing 1. Loop Y: Immediate Addressing 2. Pointers Z: Auto Decrement Addressing 3. Constantsis
X − 3, Y − 2, Z −1 | |
X − 2, Y − 3, Z −1 | |
X − 3, Y −1, Z − 2 | |
X − 2, Y −1, Z − 3 |
Y: Immediate Addressing - Constants
Z: Auto Decrement Addressing - Loop
Indirect addressing mode the instruction does not have the address of the data to be operated on, but the instruction points where the address is stored(it is indirectly specifying the address of memory location where the data is stored or to be stored)
immediate addressing mode the data is to be used is immediately given in instruction itself;so it deals with constant data.
Autodecrement addressing mode, Before determining the effective address, the value in the base register is decremented by the size of the data item which is to be accessed.
Within a loop, this addressing mode can be used to step backwards through all the elements of an array or vector.
Question 11 |
RST 5.5 | |
RST 7.5 | |
TRAP | |
Both (a) and (b) |
Maskable Interrupts are those which can be disabled or ignored by the microprocessor. These interrupts are either edge-triggered or level-triggered, so they can be disabled. INTR, RST 7.5, RST 6.5, RST 5.5 are maskable interrupts in 8085 microprocessor.
Non-Maskable Interrupts are those which cannot be disabled or ignored by microprocessor. TRAP is a non-maskable interrupt. It consists of both level as well as edge triggering and is used in critical power failure conditions.
Question 12 |
60 | |
30 | |
150 | |
70 |
Hit ratio of cache = 0.8
Cache Access Time = 30 ns
Memory Access Time = 150 ns
CPU Access Time = Cache Hit * Cache Access Time + (1 – Cache Hit)(Cache Access Time+ Memory Access Time)
CPU Access Time= 0.8 * 30 + 0.2 * (30 + 150) = 60 ns
Note : Effective Memory Access Time and Average Access Time both are same
Question 13 |
Dedicated Parity | |
Double Parity | |
Hamming code Parity | |
Distributed Parity |
This level uses a concept called, distributed parity, to protect against a disk failure. If you lose any disk in a raid level 5 configuration, the surviving disks can continue to operate because of the parity. In raid 5 the the parity is distributed across all disks in the raid group.
Reference : https://www.what-is-my-computer.com/raid-5.html
Question 14 |
4, 34, 10, 7, 19, 73, 2, 15, 6, 20
Assuming the head is currently at cylinder 50, what is the time taken to satisfy all requests if it takes 1 ms to move from one cylinder to adjacent one and shortest seek time first algorithm is used.
95 msec | |
119 msec | |
233 msec | |
276 msec |
4, 34, 10, 7, 19, 73, 2, 15, 6, 20

Since shortest seek time first policy is used, head will first move to 34. This move will cause 16*1 ms. After 34, head will move to 20 which will cause 14*1 ms. And so on....
Head starts from cylinder 50, the order followed is : 34, 20, 19, 15, 10, 7, 6, 4, 2, 73
Total head movements incurred while servicing these requests
= (50 – 34) + (34 – 20) + (20 – 19) + (19 – 15) + (15 – 10) + (10 – 7) + (7 – 6) + (6 – 4) + (4 – 2) + (73 – 2)
= 16 + 14 + 1 + 4 + 5 + 3 + 1 + 2 + 2 + 71
= 119
Time taken for one head movement = 1 msec. So,
Time taken for 119 head movements = 119 x 1 msec = 119 msec
Question 15 |
One Megabyte | |
256 Kilobytes | |
1 K Megabytes | |
64 Kilobytes |
All internal registers, as well as internal and external data buses, are 16 bits wide, which firmly established the "16-bit microprocessor" identity of the 8086. A 20-bit external address bus provides a 1 MB physical address space (2^20 = 1,048,576).
Therefore 16 bit data lines and 20 address lines.
20 lines means 220 byte = 1 mega byte
Question 16 |
The pipeline stages have different delays | |
Consecutive instructions are dependent on each other | |
The pipeline stages share hardware resources | |
All of the above |
- Option(A) True
Total delay will be Max (All delays) + Register Delay. - Option(B) True
If data forwarding is not there then
Example:
SUB R9,R4,R5
ADD R6,R9,R4 //Register R9 result will be dependent on first instruction. - Option(C) True
ID and EX shares ID/EX register.
Question 17 |
Exploit the temporal locality of reference in a program | |
Exploit the spatial locality of reference in a program | |
Reduce the miss penalty | |
None of these |
Spatial locality refers to the use of data elements within relatively close storage locations.
To exploit the spatial locality, more than one word are put into cache block.
References: http://en.wikipedia.org/wiki/Locality_of_reference
The Principle of Locality of Reference justifies the use of cache Memory.
In other words, Locality of Reference refers to the tendency of the computer program to access instructions whose addresses are near one another.
locality of reference. There are two ways with which data or instruction is fetched from main memory and get stored in cache memory. These two ways are the following:
Temporal Locality :
Temporal locality means current data or instruction that is being fetched may be needed soon.
In Temporal Locality The Least Recently Algorithm is Used (LRU)
Clustering in time: items referenced in the immediate past have a high probability of being re-referenced in the immediate future
Spatial Locality:
Spatial locality means instruction or data near to the current memory location that is being fetched, may be needed soon in the near future.
Increasing the block size of the cache comes under this
Clustering in space: items located physically near an item referenced in the immediate past have a high probability of being re-referenced in the immediate future
Refer : https://www.cs.usask.ca/faculty/bunt/presentations/Locality.ppt
Question 18 |
Vectored interrupt | |
Maskable interrupt | |
Non-maskable interrupt | |
Designated interrupt |
I/O interruption that informs the portion of the machine that manages device-level I/O interrupts that such a demand for action has already been provided from a device as well as defines the machine that sent the application.
Reference : https://en.wikipedia.org/wiki/Vectored_Interrupt
Question 19 |
MVI A 30 H
ACI 30 H
XRA A
POP H
After the execution of the above program, the contents of the accumulator will
30 H | |
60 H | |
00 H | |
Contents of stack |
MVI : Move Immediate data to a register or memory location.
ACI : Add immediate to accumulator with carry.
XRA : The content of accumulator are exclusive OR with specified register or memory location
In 1st instruction execution then the value of Accumulator is
A = 30H = 0011 0000
In 2nd instruction execution then the value of Accumulator is
A = 30+30 = 60H = 0110 0000
In 3rd instruction execution then the value of Accumulator is
A = A⊕A = 0110 0000 ⊕ 0110 0000 = 0000 0000 = 00H
Execution of the last instruction has no effect on the contents of Accumulator. Thereby, the answer remains the same because
In 8085 microprocessor, POP H is interpreted as:
Content at the memory location pointed stack pointer is copied into register pair specified in instruction operand field i.e, HL pair in this case.
Question 20 |
Vector processor | |
Array processor | |
Von Neumann | |
All of the above |
Reference : https://www.sciencedirect.com/topics/computer-science/single-instruction-multiple-data
See Why : https://www.quora.com/What-computers-do-not-use-a-von-Neumann-architecture
What is SIMD : https://www.quora.com/What-is-SIMD
Question 21 |
Control register | |
Interface | |
Communication protocol | |
None of these |
Reference : https://en.wikipedia.org/wiki/Control_register
--Interface is a device which is used to connect a peripheral devices to bus.

--A communication protocol is a system of rules that allow two or more entities of a communications system to transmit information via any kind of variation of a physical quantity. The protocol defines the rules, syntax, semantics and synchronization of communication and possible error recovery methods. Protocols may be implemented by hardware, software, or a combination of both.
Reference : https://en.wikipedia.org/wiki/Communication_protocol#:~:text=A%20communication%20protocol%20is%20a,and%20possible%20error%20recovery%20methods.
Question 22 |
It is level triggered | |
It is negative edge triggered | |
It is +ve edge triggered | |
It is both +ve and -ve edges triggered |
Maskable Interrupts are those which can be disabled or ignored by the microprocessor. These interrupts are either edge-triggered or level-triggered, so they can be disabled. INTR, RST 7.5, RST 6.5, RST 5.5 are maskable interrupts in 8085 microprocessor.
Non-Maskable Interrupts are those which cannot be disabled or ignored by microprocessor. TRAP is a non-maskable interrupt. It consists of both level as well as edge triggering and is used in critical power failure conditions.
Question 23 |
Is a hardware memory device which denotes the location of the current instruction being executed. | |
Is a group of electrical circuit, that performs the intent of instructions fetched from memory | |
Contains the address of the memory location that is to be read from or stored into | |
Contains a copy of the designated memory location specified by the MAR after a “read” or the new contents of the memory prior to a “write” |
Reference : https://en.wikipedia.org/wiki/Memory_address_register
Question 24 |
I. It is useful in creating self-relocating code
II. If it is included in an Instruction Set Architecture, then an additional ALU is required for effective address calculation
III. The amount of increment depends on the size of the data item accessed
I only | |
II only | |
III only | |
II and III only |
- Self reallocating code required for Displacement Addressing Mode. Auto Increment is useful for Array implementation
- In Auto increment/decrement Addressing Mode , Register will be automatically incremented or decremented So, ALU is required. But additional ALU is not required.
- For incrementing the data, the auto-increment addressing mode is used which purely depends on the size of the data. In Auto increment mode automatically increments the contents of a register by a value that corresponds to the size of the accessed operand. Thus , the increment is 1 for byte-sized operands, 2 for 16-bit operands, and 4 for 32-bit operands. The size of the operand is usually specified as part of the operation code of an instruction.
Question 25 |
Absolute mode | |
Indirect mode | |
Immediate mode | |
Index mode |
Question 26 |
i. I1 requires 25 microseconds
ii. I2 requires 35 microseconds
iii. I3 requires 20 microseconds
I1 has the highest priority and I3 has the lowest. What is the possible range of time for I3 to be executed assuming that it may or may not occur simultaneously with other interrupts?
24.5 microseconds to 39.5 microseconds | |
24.5 microseconds to 93.5 microseconds | |
4.5 microseconds to 24.5 microseconds | |
29.5 microseconds 93.5 microseconds |
Time interval = Interrupt Response time + Execution time
Time interval= 4.5 + 20 = 24.5 microseconds
Case 2 : If I3 is executed simultaneously with other interrupts(Max Time required):
All instructions are present.
Time interval = Interrupt Response time + Execution time for I1, I2, I3
Time interval=I1+I2+I3 ={(4.5+25) +(4.5+35) +(4.5+20) } =93.5
So possible range of I3 24.5 microsecond to 93.5 microsecond .
Question 27 |
Bank switching | |
Indexed mapping | |
Two Way memory interleaving | |
Memory segmentation |
In interleaved memory, memory addresses are allocated to separate memory banks. In an interleaved system with two memory banks (assuming word-addressable memory), if some logical address belongs to bank 0, then the consecutive logical address would belong to bank 1, next logical would again belong to bank 0, and so on.
An interleaved memory is said to be n-way interleaved when there are n banks and memory location i resides in bank i mod n.
2-Way Interleaved
Two memory blocks are accessed at same time for writing and reading operations. So, organizing the memory into two banks would be termed as Two-way memory interleaving.
Question 28 |
10, 3, 1024 | |
8, 5, 256 | |
5, 8, 2048 | |
10, 3, 512 |
Which makes Y = 3.
Number of bits in control memory =26
Number of bits in control memory next address field=26-13-3 =10
10 bit addressing .we have 210=1024 memory size
So X,Y size=10,3
Question 29 |
400 | |
500 | |
600 | |
700 |
Size of instruction = 24/8 = 3 bytes.
Program Counter can shift 3 bytes at a time to jump to next instruction.
Thus, in the given options the valid counter will be the one which is the multiple of 3.only 600 is satisfied.
Question 30 |
256 Mbyte, 19 bits | |
256 Mbyte, 28 bit | |
512 Mbyte, 20 bits | |
64 Gbyte, 28 bits |
N.o of surfaces = 16
N.o of tracks per surface = 128
N.o of sectors per track = 256
N.o of bytes per sector = 512 bytes
Capacity of disk pack = (Total number of surfaces * Number of tracks per surface * Number of sectors per track * Number of bytes per sector)
= 16 * 128 * 256 * 512 bytes
= 228 bytes
= 28 * 220 bytes
= 256 MB
Total number of sectors = (Total number of surfaces * Number of tracks per surface * Number of sectors per track)
= 16 * 128 * 256 sectors
= 219 sectors
So, We require 19 bits to address the sector
Question 31 |
It enables reduced instruction size | |
It allows indexing of array element with same instruction | |
It enables easy relocation of data | |
It enables faster address calculation than absolute addressing |
- Relative addressing cannot be faster than absolute addressing as absolute address must be calculated from relative address.
- Absolute addresses are directly available in the Instruction address field itself so there is no need to calculate the Effective Address of operand
- Relative addressing mode we need to calculate the Effective Address by adding some relative value to the PC so it requires some calculation so it is slower than absolute addressing
Question 32 |
Halts for a predetermined time | |
Branches off to the interrupt service routine after completion of the current instruction | |
Branches off to the interrupt service routine immediately | |
Hands over control of address bus and data bus to the interrupting device |
- CPU continuously checks the status bit of interrupt at the completion of each current instruction running when there is a interrupt it service the interrupt using Interrupt Service Routine (ISR)
- An interrupt service routine (ISR) is a software routine that hardware invokes in response to an interrupt. ISR examines an interrupt and determines how to handle it executes the handling, and then returns a logical interrupt value. If no further handling is required the ISR notifies the kernel with a return value. An ISR must perform very quickly to avoid slowing down the operation of the device and the operation of all lower-priority ISRs.
Question 33 |
More registers and smaller instruction set | |
Larger instruction set | |
Less registers and smaller instruction set | |
More transistor elements |
CISC | RISC |
---|---|
Focus on software | Focus on hardware |
Uses only Hardwired control unit | Uses both hardwired and micro programmed control unit |
Transistors are used for more registers | Transistors are used for storing complex Instructions |
Fixed sized instructions | Variable sized instructions |
Can perform only Register to Register Arthmetic operations | Can perform REG to REG or REG to MEM or MEM to MEM |
Requires more number of registers | Requires less number of registers |
Code size is large | Code size is small |
A instruction execute in single clock cycle | Instruction take more than one clock cycle |
A instruction fit in one word | Instruction are larger than size of one word |
A large number of instructions are present in the architecture. | Very fewer instructions are present. The number of instructions are generally less than 100. |
Some instructions with long execution times. These include instructions that copy an entire block from one part of memory to another and others that copy multiple registers to and from memory. | No instruction with a long execution time due to very simple instruction set. Some early RISC machines did not even have an integer multiply instruction, requiring compilers to implement multiplication as a sequence of additions. |
Variable-length encodings of the instructions. Example: IA32 instruction size can range from 1 to 15 bytes. | Fixed-length encodings of the instructions are used. Example: In IA32, generally all instructions are encoded as 4 bytes. |
Multiple formats are supported for specifying operands. A memory operand specifier can have many different combinations of displacement, base and index registers. | Simple addressing formats are supported. Only base and displacement addressing is allowed. |
CISC supports array. | RISC does not supports array. |
Arithmetic and logical operations can be applied to both memory and register operands. | Arithmetic and logical operations only use register operands. Memory referencing is only allowed by load and store instructions, i.e. reading from memory into a register and writing from a register to memory respectively. |
Implementation programs are hidden from machine level programs. The ISA provides a clean abstraction between programs and how they get executed. | Implementation programs exposed to machine level programs. Few RISC machines do not allow specific instruction sequences. |
Condition codes are used. | No condition codes are used. |
The stack is being used for procedure arguments and return addresses. | Registers are being used for procedure arguments and return addresses. Memory references can be avoided by some procedures. |
Question 34 |
An ISR is invoked on completion of I/O in synchronous I/O but not in asynchronous I/O | |
In both synchronous and asynchronous I/O, an ISR (Interrupt Service Routine) is invoked after completion of the I/O | |
A process making a synchronous I/O call waits until I/O is complete, but a process making an asynchronous I/O call does not wait for completion of the I/O | |
In the case of synchronous I/O, the process waiting for the completion of I/O is woken up by the ISR that is invoked after the completion of I/O |
In asynchronous I/O, a process need not stay in the blocked state until the I/O is complete. It can place a request for I/O to the kernel, and resume with the execution. After the I/O operation is completed, a signal is directed to the process notifying the completion.
Question 35 |
IF: Instruction Fetch
ID: Instruction Decode and Operand Fetch
EX: Execute
WB: Write Back
The IF, ID and WB stages take one clock cycle each to complete the operation. The number of clock cycles for the EX stage depends on the instruction. The ADD and SUB instructions need 1 clock cycle and the MUL instruction needs 3 clock cycles in the EX stage. Operand forwarding is used in the pipelined processor. What is the number of clock cycles taken to complete the following sequence of instructions?
ADD R2, R1, R0 R2 ← R1 + R0
MUL R4, R3, R2 R4 ← R3 * R2
SUB R6, R5, R4 R6 ← R5 - R4
7 | |
8 | |
10 | |
14 |
IF ID EX WB
There will be operand forwarding between first and second instructions and 2nd and 3rd instructions

Total No. of cycles required =8
Question 36 |
3.2 | |
3.0 | |
2.2 | |
2.0 |
Frequency of the clock = 2.5 gigahertz
Cycle time = 1 / frequency
Cycle time= 1 / (2.5 gigahertz)
Cycle time= 1 / (2.5 x 109 hertz)
Cycle time= 0.4 ns
Non-pipeline execution time to process 1 instruction = Number of clock cycles taken to execute one instruction
1 Instruction Execution Time = 4 clock cycles
1 Instruction Execution Time = 4 x 0.4 ns
1 Instruction Execution Time = 1.6 ns
Cycle Time in Pipelined Processor :
Frequency of the clock = 2 gigahertz
Cycle time Cycle time= 1 / frequency
Cycle time= 1 / (2 gigahertz)
Cycle time= 1 / (2 x 109 hertz)
Cycle time= 0.5 ns
Pipeline Execution Time : Since there are no stalls in the pipeline, so ideally one instruction is executed per clock cycle. So,
Pipeline execution time
= 1 clock cycle
= 0.5 ns
Speed up = ( Non-pipeline execution time / Pipeline execution time )
= 1.6 ns / 0.5 ns
= 3.2
Question 37 |
256 Mbyte, 19 bits | |
256 Mbyte, 21 bits | |
512 Mbyte, 20 bits | |
64 GB, 28 bits |
N.o of surfaces = 16
N.o of tracks per surface = 128
N.o of sectors per track = 256
N.o of bytes per sector = 512 bytes
Capacity of disk pack = (Total number of surfaces * Number of tracks per surface * Number of sectors per track * Number of bytes per sector)
= 16 * 128 * 256 * 512 bytes
= 228 bytes
= 28 * 220 bytes
= 256 MB
Total number of sectors = (Total number of surfaces * Number of tracks per surface * Number of sectors per track)
= 16 * 128 * 256 sectors
= 219 sectors
So, We require 19 bits to address the sector
Question 38 |
As an alternative to register allocation at compile time | |
For efficient access to function parameters and local variables | |
To handle certain kinds of hazards | |
As part of address translation |
Refer this link for more information : https://en.wikipedia.org/wiki/Register_renaming
Question 39 |
SISD | |
SIMD | |
MIMD | |
MISD |
SISD is one of the four main classifications as defined in Flynn's taxonomy.
Reference : https://en.wikipedia.org/wiki/SISD#:~:text=This%20corresponds%20to%20the%20von,present%20in%20the%20computer%20architecture.
Question 40 |
Coroutines | |
Position-independent code | |
Shareable code | |
Interrupt Handlers |
- Relative mode addressing is most relevant to writing a position-independent code i.e. Program Relocation at run time
- To change the normal sequence of execution of instructions
- For branch type instructions since it directly updates the program counter
Question 41 |
13.0 | |
12.8 | |
12.6 | |
12.4 |
where,
H1 = Hit rate of level 1 cache = 0.8
T1 = Access time for level 1 cache = 1 ns
H2 = Hit rate of level 2 cache = 0.9
T2 = Access time for level 2 cache = 10 ns
Hm = Hit rate of Main Memory = 1
Tm = Access time for Main Memory = 500 ns
Average Access Time = ( 0.8 * 1 ) + ( 0.2 * 0.9 * 10 ) + ( 0.2 * 0.1 * 1 * 500) = 0.8 + 1.8 + 10
So, Average Access Time= 12.6 ns
Question 42 |
Register | |
Immediate | |
Register indirect | |
Register relative |
Let Register BX content is 202020 // Memory Location
Register AL content is 20
Effective Address EA =[BX] = 202020 // Content of Register BX
so AL contents 20 is moved to memory location 202020
This is an example of Register Indirect Addressing Mode
Question 43 |
INTR & INTA | |
RD & WR | |
S0 & S1 | |
HOLD & HLDA |
Basic DMA operation
- The direct memory access (DMA) I/O technique provides direct access to the memory while the microprocessor is temporarily disabled.
- A DMA controller temporarily borrows the address bus, data bus, and control bus from the microprocessor and transfers the data bytes directly between an I/O port and a series of memory locations.
- The DMA transfer is also used to do high-speed memory-to memory transfers.
- Two control signals are used to request and acknowledge a DMA transfer in the microprocessor-based system.
- The HOLD signal is a bus request signal which asks the microprocessor to release control of the buses after the current bus cycle.
- The HLDA signal is a bus grant signal which indicates that the microprocessor has indeed released control of its buses by placing the buses at their high-impedance states.
- The HOLD input has a higher priority than the INTR or NMI interrupt inputs.
Refer : http://www.unife.it/ing/lm.infoauto/sistemi-elaborazione/dispense/csf04_12.pdf
Question 44 |
2 | |
4 | |
8 | |
16 |
Second version: 20Mhz processor and 32-bit bus.
The second version is the best as compared to first version because second version has both high bandwidth as well as increased CPU speed
Increasing the bandwidth aids in achieving the maximum speed up.
max(20/5, 32/8) = 4
Hence we will take the maximum of these speedups which is 4.
Question 45 |
Parallel search | |
Sequential search | |
Binary search | |
Selection search |
- Associative memory is suitable for parallel searches and is used where search time needs to be minimized
- In K-way associativity we have k comparators which compares the tag bits of 'k' blocks in parallel.
Question 46 |
Cycle technique | |
Stealing technique | |
Cycle stealing technique | |
Cycle bypass technique |
1) Burst or block transfer DMA
2) Cycle steal or single byte transfer DMA.
3) Transparent or hidden DMA.
1) Burst or block transfer DMA
- It is the fastest DMA mode. In this two or more data bytes are transferred continuously.
- Processor is disconnected from system bus during DMA transfer. N number of machine cycles are adopted into the machine cycles of the processor where N is the number of bytes to be transferred.
- DMA sends HOLD signal to processor to request for system bus and waits for HLDA signal.
- After receiving HLDA signal, DMA gains control of system bus and transfers one byte. After transferring one byte, it increments memory address, decrements counter and transfers next byte.
- In this way, it transfer all data bytes between memory and I/O devices. After transferring all data bytes, the DMA controller disables HOLD signal & enters into slave mode.
- In this mode only one byte is transferred at a time. This is slower than burst DMA.
- DMA sends HOLD signal to processor and waits for HLDA signal on receiving HLDA signal, it gains control of system bus and executes only one DMA cycle.
- After transfer one byte, it disables HOLD signal and enters into slave mode.
- Processor gains control of system bus and executes next machine cycle. If count is not zero and data is available then the DMA controller sends HOLD signal to the processor and transfer next byte of data block.
- Processor executes some states during which is floats the address and data buses. During this process, processor is isolated from the system bus.
- DMA transfers data between memory and I/O devices during these states. This operation is transparent to the processor.
- This is slowest DMA transfer. In this mode, the instruction execution speed of processor is not reduced. But, the transparent DMA requires logic to detect the states when the processor is floating the buses
Question 47 |
Does not map | |
6 | |
11 | |
54 |
Total No of Block = 64
Block size = 16 B
Memory Block Number = Byte Address / Block size
= 1206/16 = 75
Given byte address 1206 is a part of 75th block in Main Memory.
Now we have to find a cache block number where it Map to memory block number.
Cache block number = (Memory block number) mod (number of blocks in cache)
= 75 mod 16
= 11
Question 48 |
1.83 | |
2 | |
3 | |
6 |
Speed Up= Time without Pipeline / Time with Pipeline
For non pipeline processor,
It takes, 12 cycles to complete 1 instruction
So, for n instructions it will take 12n cycle
Time required in a pipelined processor = (k + n - 1) tp
where, k = number of stages in pipeline unit.
n = number of instructions
tp = execution time unit(take maximum time in all stages i.e, 6 will the maximum in this case )
So, Speed Up = Time without Pipeline / Time with Pipeline
= 12n / (6 + n - 1)6
= 12n /(n + 5)6
= 12n /6n
= 2
Question 49 |
10E00 | |
1E000 | |
F000 | |
1000E |
Segment base (CS) = 0x1000
Offset (IP) = 0xE000
In 8086 the address bus is 20 bit, The address is generated by using segment base and offset.
it means Address = segment * 0x10 + Offset (Here segment is multiplied by 10h)
Address= segment*0x10+offset
Address=CS*0x10+IP =0x1000*0x10+0xe000
Thus Address =0x1E000
option(b) is the correct answer
Refer: https://books.google.co.in/books?id=t9
Question 50 |
A1: MOV AL, 00H INC AL JNZ A1
1 | |
255 | |
256 | |
Will not come out of the loop |
Question 51 |
5.27 | |
2.00 | |
4.16 | |
6.09 |
So I am Assume Cache is faster than memory by at least 10 times
However with the given information we can guarantee that speed up has to be strictly less than 5.
We first access Cache memory and Main memory is accessed only on a cache miss
Speed Gain = [ (Memory Access Time without Cache) / (Memory Access Time with Cache) ]
where
Tm = Memory Access Time
Tc = Cache Access Time
Speed Gain = (Tm) / (Tc + 0.20*Tm)
Speed Gain = [ (1) / ( (Tc/Tm) + 0.20 ) ]
Let (Tc/Tm) = x, 0 < x ≤ 0.1 ( Since cache (say last level cache) is faster than memory by at least 10 times (10 times because otherwise there is not much advantage of using a cache))
Speed Gain = [ (1) / ( (x) + 0.20 ) ]
3.33 ≤ Speed Gain < 5
Question 52 |
5 | |
6 | |
8 | |
9 |
Speedup factor = 6
Efficiency = 70% (0.7)
Efficiency Formula :
Efficiency = Speedup factor / Number of stages
0.7 = 6 / No. of stages
No. of stages = 8.56 = 9
Question 53 |
9.6 ms | |
4.8 ms | |
2.4 ms | |
1.2 ms |
Given DMA module transferring characters at = 9600 bps = 9600/8 Bps = 1200 Bytes per sec
Processor is fetching instructions at the rate = 1 MIPS (million instruction per second) = 106
So time will the processor be slowed down due to DMA activity = = 1200/106 = 12*1000/104 ms = 1.2 ms
Question 54 |
0 | |
1 | |
2 | |
3 |
Total Memory access time is 60 ns + 10ns = 70 ns
CPU frequency is 33 MHz means 1 clock time is 1 / (33*106) = .03030 * 10-6 sec = 30.30 ns
Number of wait states = No. of clocks to need = 70 ns / 30.30 ns = 2.31 ≈ 3
So no. of wait states 3.
Reference: https://en.wikipedia.org/wiki/Wait_state
Question 55 |
36, 69, 167, 76, 42, 51, 126, 12 and 199.
Assume the arm is located at the 100th track and moving towards track 199. If the sequence of disc access is 126, 167, 199, 12, 36, 42, 51, 69 and 76 then which disc access scheduling policy is used?
Elevator | |
Shortest seek-time first | |
C-SCAN | |
First Come First Served |

In above diagram starts from 100, 126,167, and after reaching 199, without servicing any request during return it will reach initially, then it start servicing requests on the way from 0 (12,36,42,51,69 and 76)
Question 56 |
CMOS is a Computer Chip on the motherboard, which is :
RAM | |
ROM | |
EPROM | |
Auxiliary storage |
Alternatively referred to as a RTC (real-time clock), NVRAM (non-volatile RAM) or CMOS RAM, CMOS is short for complementary metal-oxide semiconductor. CMOS is an onboard, battery powered semiconductor chip inside computers that stores information. This information ranges from the system time and date to system hardware settings for your computer.
Question 57 |
In RS flip-flop, the output of the flip-flop at time (t+1) is same as the output at time t, after the occurrence of a clock pulse if :
S=R=1 | |
S=0, R=1 | |
S=1, R=0 | |
S=R=0 |

Question 58 |
Match the terms in List-I with the options given in List-II :
List-I List-II (a) Decoder (i) 1 line to 2n lines (b) Multiplexer (ii) n lines to 2n lines (c) De multiplexer (iii) 2n lines to 1 line (iv) 2n lines to 2n-1 lines
(a)-(ii), (b)-(i), (c)-(iii) | |
(a)-(ii), (b)-(iii), (c)-(i) | |
(a)-(ii), (b)-(i), (c)-(iv) | |
(a)-(iv), (b)-(ii), (c)-(i) |
- Decoder = N inputs to 2N outputs
- Mux = Many to One i.e. 2N Inputs to 1 output
- De-Mux = One to Many i.e. 1 to 2N output
Question 59 |
The hexadecimal equivalent of the binary integer number 110101101 is :
D 2 4 | |
1 B D | |
1 A E | |
1 A D |
000110101101
Step 2: Group all the digits in sets of four starting from the LSB (far right). Add zeros to the left of the last digit if there aren't enough digits to make a set of four:
0001 1010 1101
Step 3: Use below information to convert into an hexadecimal digit:
0001 = 1, 1010 = A, 1101 = D
So, 1AD is is the hexadecimal equivalent to the decimal number 110101101.
Information
(0-9) no difference from 10 onwards
1010 – A
1011 – B
1100 – C
1101 – D
1110 – E
1111 – F
Question 60 |
Synchronous Counter | |
Ripple Counter | |
Combinational Circuit | |
Mod 2 Counter |
Asynchronous or ripple counters
2 bit ripple up counter: It contains two flip flops. A 2-bit ripple counter can count up to 4 states. It counts from 0 to 3.

2 bit ripple down counter: It contains two flip flops. A 2-bit ripple counter can count up to 4 states. It is known as down counter as it counts down from 3 to 0.

Question 61 |
List - I | List -II |
(a) Interrupts which can be delayed when a much highest priority interrupt has occurblue | (i) Normal |
(b) Unplanned interrupts which occur while executing a program | (ii) Synchronous |
(c) Source of interrupt is in phase with the system clock | (iii) Maskable |
(iv) Exception |
(a)-(ii), (b)-(i), (b)-(iv) | |
(a)-(ii), (b)-(iv), (b)-(iii) | |
(a)-(iii), (b)-(i), (b)-(ii) | |
(a)-(iii), (b)-(iv), (b)-(ii) |
→ Exception: unplanned interrupts while executing a program is called Exception. For example: while executing a program if we got a value which should be divided by zero is called a exception
→ Synchronous interrupt will happen every time an instruction executes (with a given program state)
Examples of Synchronous interrupt:
– Divide by zero
– System call
– Bad pointer dereference
Reference : https://www.cs.unc.edu/~porter/courses/comp530/f18
Reference : https://www.electronicshub.org/types-of-interrupts
Question 62 |
Associative mapping | |
Direct mapping | |
Set-Associative mapping | |
Segmented - page mapping |
- Direct Mapping
- Fully Associative Mapping
- K-way Set Associative Mapping
Question 63 |
LDA 8000H
MVI B, 30H
ADD B
STA 8001H
Read a number from input port and store it in memory | |
Read a number from input device with address 8000H and store it in memory at location 8001H | |
Read a number from memory at location 8000H and store it in memory location 8001H | |
Load A with data from input device with address 8000H and display it on the output device with address 8001H |
- I/O devices are identified by 16-bit addresses
- 8085 communicates with an I/O device as if it were one of the memory locations
- Memory related instructions are used
For e.g. LDA, STA
Loads A with data read from input device with 16-bit address 8000H
STA 8001H
Stores (Outputs) contents of A to output device with 16-bit address 8001H
Reading a number from input port (port address 8000H) and display it on ASCII display connected to output port (port address 8001H)
- LDA 8000H ; reads data value 03H (example)into ; Accumulator, A = 03H
- MVI B, 30H ; loads register B with 30H
- ADD B ; A = 33H, ASCII code for 3
- STA 8001H ; display 3 on ASCII display
Option(D) is Most Appropriate
Question 64 |
Cache | |
Registers | |
Accumulators | |
Stack |
- ALU is the computational center of the CPU. It performs all mathematical and logical operations.
- The accumulator is a register in which intermediate arithmetic and logic results are stored.
- Without a register like an accumulator, it would be necessary to write the result of each calculation (addition, multiplication, shift, etc.) to main memory, perhaps only to be read right back again for use in the next operation. Access to main memory is slower than access to a register like the accumulator
Question 65 |
10 | |
11 | |
8 | |
12 |
- 2048 locations
- 4 bits per location
So to address 2048 we need 11 bits (211=2048),
so 11 address lines.
Question 66 |
Multiple instruction multiple data | |
Multiple instruction memory data | |
Memory instruction multiple data | |
Multiple information memory data |
- Now a days ,All processors in a parallel computer can execute different instructions and operate on various data at the same time.
- In MIMD, each processor has a separate program and an instruction stream is generated from each program
- MIMD is a technique employed to achieve parallelism. Machines using MIMD have a number of processors that function asynchronously and independently. At any time, different processors may be executing different instructions on different pieces of data.
https://en.wikipedia.org/wiki/MIMD#:~:text=In%20computing%2C%20MIMD%20(multiple%20instruction,on%20different%20pieces%20of%20data.
Reference : https://www.javatpoint.com/mimd
Question 67 |
Stack pointer | |
Accumulator | |
Program Counter | |
Stack |
A set of Instructions which are used repeatedly in a program can be referred to as Subroutine. Only one copy of this Instruction is stored in the memory. When a Subroutine is required it can be called many times during the Execution of a Particular program. A call Subroutine Instruction calls the Subroutine. Care Should be taken while returning a Subroutine as Subroutine can be called from a different place from the memory.
The content of the PC must be Saved by the call Subroutine Instruction to make a correct return to the calling program.
Refer : https://www.quora.com/How-did-the-call-instruction-work-in-the-8085-microprocessor
Refer : https://www.geeksforgeeks.org/subroutine-subroutine-nestin.
Question 68 |
Error detection | |
Error Correction | |
Synchronization | |
Slowing down the communication |
- Start and Stop bits are used in asynchronous communication as a means of timing or synchronizing the data characters being transmitted.
- Start bit is used to signal the beginning of a frame.
- Stop bit is used to signal the end of a frame.
Question 69 |
Writing small programs effectively | |
Programming output/input routines | |
Programming the microprocessors | |
Programming the control steps of a computer |
Question 70 |
Data transfer | |
Process control | |
Logical | |
Program control |
Data Transfer
The data transfer instructions move data between registers or between memory and registers.
MOV , MVI,LDA,STA,LHLD,SHLD etc.
Logical
The Instructions under this group perform logical operation such as AND, OR, compare, rotate etc.
Examples are: ANA, XRA, ORA, CMP, RAL,STC etc.
Program control
instructions change or modify the flow of a program. The most basic kind of program control is the unconditional branch or unconditional jump. Branch is usually an indication of a short change relative to the current program counter. Jump is usually an indication of a change in program counter that is not directly related to the current program counter (such as a jump to an absolute memory location or a jump using a dynamic or static table), and is often free of distance limits from the current program counter.
LOOPNZ,RET,CALL,LOOPZ,IRET,JUMP,JUMPNZ etc.
Question 71 |
If cannot have subroutine call instruction | |
It can have subroutine call instruction, but no nested subroutine calls are possible, but no nested subroutine calls | |
Nested subroutine calls are possible, but interrupts are not | |
All sequences of subroutine calls and also interrupts are possible |
- A subroutine can be implemented by using CALL and RET instructions.
- CALL instruction when used decrements the stack pointer by two.
- RET instruction increments the stack pointer register by two.
- A processor with no stack pointer register cannot have a subroutine call instruction.
Question 72 |
Make the processor wait during a DMA operation | |
Make the processor wait during a power interrupt processing | |
Make the processor wait during a power shutdown | |
Interface slow peripherals to the processor |
- A wait state is a situation in which the computer processor experiences a delay, mainly when accessing external memory or a device that is slow in its response.
- program or processor is waiting for the completion of some event before resuming activity. A program or process in a wait state is inactive for the duration of the wait state
- Computer microprocessors generally run much faster than the computer's other subsystems
- When the processor needs to access external memory, it starts placing the address of the requested information on the address bus
- It then must wait for the answer, each of the cycles spent waiting is called a wait state
- Thus, wait states helps to interface slow peripherals to the memory
Question 73 |
62ms | |
60ms | |
50ms | |
47ms |
It is given that 30 rotations per second.
- 30 rotations = 1 sec
- 1 rotation = 1/30 sec
It means in 1 rotation, we can access 300 words
- 1 rotation = 300 words
- 1 word = 1/300 rotations
Rotational delay = Average taken to be the time to rotate by half = 1/2 x time for 1 rotation = 1/2 X 1/30 seconds = 1/60 s = 16.6667 ms
Avg access time= 30 ms(seek time)+ 1/60 sec (Rotational Delay)+ 1/9000 sec (transfer time)
Avg access time= 30 ms + 16.6667 ms + 0.1111 ms
Avg access time= 46.78 ms
Question 74 |
A Computer uses a memory unit with 256K word of 32 bits each. A binary instruction code is stored in one word of memory. The instruction has four parts: an indirect bit, an operation code and a register code part to specify one of 64 registers and an address part. How many bits are there in operation code, the register code part and the address part?
7, 7, 18 | |
18, 7, 7 | |
7, 6, 18 | |
6, 7, 18 |
Indirect | 1 bit |
Address | Given Address 256kB 28 (256kB) * 210 (1024 bytes/kB) = 218 == 18 bits |
Registers | Total 64 registers = 26 = 6 bits |
OP-code | 32 - 1 - 18 - 6 bits = 7 bits |
Question 75 |
Consider a system with 2 level cache. Access times of Level 1, Level 2 cache and main memory are 0.5 ns, 5 ns and 100 ns respectively. The hit rates of Level 1 and Level 2 caches are 0.7 and 0.8 respectively. What is the average access time of the system ignoring the search time within cache?
20.75 ns | |
7.55 ns | |
24.35 ns | |
35.20 ns |
H1 = Hit rate of level 1 cache = 0.7
T1 = Access time for level 1 cache = 0.5 ns
H2 = Hit rate of level 2 cache = 0.8
T2 = Access time for level 2 cache = 5 ns
Hm = Hit rate of Main Memory = 1
Tm = Access time for Main Memory = 100 ns
Average Access time =0.7*0.5 + 0.3 *(0.8)*(5)+ 0.3*(0.2)*(100)
So, Average Access time 7.55 ns
Question 76 |
- MOV AL, 153
- NEG AL
AL = 0110 0110; CF = 0; SF = 0 | |
AL = 0110 0111; CF = 0; SF = 1 | |
AL = 0110 0110; CF = 1; SF = 1 | |
AL = 0110 0111; CF = 1; SF = 0 |
- The NEG instruction negates a value by finding 2's complement of its single operand.
- This simply means multiply operand by -1.
- When a positive value is negated the result is negative.
- A negative value will become positive.
NEG AL // Now Accumulator have -153
153 = 1001 1001
its 2's compliment is 0110 0111
NEG(153) = -153( 1111 1111 0110 0111)
AL = 0110 0111 // -153
Status of Carry Flag (CF) = 0 // we don't have any carry
Sign Flag (SF) = 1 // -153 negative number
So, option(B) is the Correct Answer
Question 77 |
Consider the following statements :
- (i) Auto increment addressing mode is useful in creating self-relocating code.
(ii) If auto addressing mode is included in an instruction set architecture, then
an additional ALU is required for effective address calculation.
(iii) In auto increment addressing mode, the amount of increment depends on
the size of the data item accessed.
Which of the above statements is/are true ?
Choose the correct answer from the code given below :
Code :(iii) only | |
(ii) and (iii) only | |
(i) and (ii) only | |
(ii) only |
- Self reallocating code required for Displacement Addressing Mode. Auto Increment is useful for Array implementation
- In Auto increment/decrement Addressing Mode , Register will be automatically incremented or decremented So, ALU is required. But additional ALU is not required.
- For incrementing the data, the auto-increment addressing mode is used which purely depends on the size of the data. In Auto increment mode automatically increments the contents of a register by a value that corresponds to the size of the accessed operand. Thus , the increment is 1 for byte-sized operands, 2 for 16-bit operands, and 4 for 32-bit operands. The size of the operand is usually specified as part of the operation code of an instruction.
Question 78 |
2.5 milliseconds | |
5.0 milliseconds | |
7.5 milliseconds | |
4.0 milliseconds |
- 4000 revolutions = 1 minute
- 4000 revolutions = 60 seconds
Average Access Time is time to complete 1/2 revolution = 7.5 ms
Question 79 |
T1=T2 | |
T1>=T2 | |
T1 | |
T1 is T2 plus time taken for one instruction fetch cycle |
- Pipelining does not increase the execution time of a single instruction.
- Pipelining is one way of improving the overall processing performance of a processor.
- Pipelining increases the overall performance by splitting the execution to multiple pipeline stages so that the following instructions can use the finished stages of the previous instructions
- Pipelining architectural approach allows the simultaneous execution of several instructions
Let total stages in pipelined CPU = Total stages in non-pipelined CPU = K
Number of Instructions = N = 1
- Pipelined CPU = Total time (T1) = (K + (N – 1)) * T = KT
- Non-Pipelined CPU = Total time (T2) = KNT = KT
- Considering buffer delays in pipelined CPU= T1 >= T2
Question 80 |
Static memory | |
Dynamic memory | |
ROM | |
None of the option |
Question 81 |
Same as the access time | |
Longer than the access time | |
Shorter than the access time | |
Multiple of the access time |
- Access time is the amount of time it takes the processor to read data, instructions, and information from memory.
- It is the time that is measured in nanoseconds, the time between one Ram access of time when the next Random Access Memory RAM access starts
- Cycle time representing the minimum time interval between two successive accesses
Question 82 |
13 | |
14 | |
16 | |
17 |
- Size of each Ram chip = 8K x 4 bits = 23 x 210 x 22 = 215 bits
- This is bye addressable each address space represents one byte of storage space (215)/8 Byte =212 Bytes
- Number of chips required = 6 x 4 = 24 = 5 bits required to represent 24 chips
- So, Total number of bits required = 12 + 5 = 17 bits
Question 83 |
2 | |
4 | |
8 | |
16 |
size and group 16 pages in one set.
Number of pages in cache = 1MB/8KB = 128 pages
Number of set in cache=128/16=8 sets
Take any page of LAS, it will be mapped with cache on any one of these 8 sets (set association mapping).
For any two synonym to map with same set they should be colored with same color of that respective set.
So minimum we need 8 colors for this mapping.
Question 84 |
30 70 115 130 110 80 20 25.
How many times will the head change its direction for the disk scheduling policies SSTF(Shortest Seek Time First) and FCFS(First come first serve)?
2 and 3 | |
3 and 3 | |
3 and 4 | |
4 and 4 |
Direction changes at 120,110,130
Total 3 changes in SSTF
FCFS : (90) 120 30 70 115 130 110 80 20 25
Direction changes at 120,30,130,20
Total 4 changes in FCFS
Question 85 |
Operation code | |
Address | |
Locator | |
Flip flop |
Question 86 |
Program counter | |
IO status information | |
CPU registers | |
Translation lookaside buffer |
- During context switch between processes , the state of the first process must be saved so that, when the scheduler gets back to the execution of the first process, it can restore this state and continue. PC, stack and registers must be saved as otherwise program cannot resume.
- Translation lookaside buffer (TLB) is a CPU cache that memory management hardware uses to improve virtual address translation speed. They are just bonus for ensuring better performance. We don’t need to save TLB to ensure correct program resumption.
Question 87 |
Instruction register | |
Program counter | |
Accumulator | |
Instruction Decoder |
Accumulator is also defined as register A .
In other word Accumulator is a register in which intermediate arithmetic and logic results are stored
Question 88 |
32 bits | |
64 bits | |
128 bits | |
256 bits |
Question 89 |
(i) A naive pipeline implementation(NP) and
(ii) An efficient pipeline(EP) where the third stage is splitted into {12ns, 5ns and 8ns} respectively.
The speedup achieved by EP over NP in executing 100 independent instructions with no hazards is:
1.471 | |
1.517 | |
1.638 | |
1.567 |
For naive pipeline (NP):
Number of stages(k) = 5
Clock time (Tp) = max { (stage delay+buffer delay) } = {15 , 8, 25, 4, 8} + 5 = 30 nsec
Execution time (Enp) = ( k + n - 1 )*Tp = ( 5 + 100 - 1 )*30 = 3120 nsec
For efficient pipeline (EP):
Number of stages(k) = 7 ( delay with 25 nsec stage is divided into 12 nsec,5 nsec and 8 nsec )
Clock time (Tp) = max { (stage delay+buffer delay) } = {15 , 8, 12, 5, 8, 4, 8} + 5 = 20 nsec
Execution time (Eep) = ( k + n - 1 )*Tp = ( 7 + 100 - 1 )*20 = 2120 nsec
Speedup = (Enp) / (Eep) = 3120 / 2120 = 1.471
Question 90 |
Increases | |
Decreases | |
Remains the same | |
Either remains constant or decreases |
(Bits Per Inch) The measurement of the number of bits stored in one linear inch of a track (storage channel) on a disk or tape.
Question 91 |
Pointers | |
Arrays | |
Records | |
All of these |
- Pointers require indirect addressing mode.
- Arrays required indexing modes.
- An array and record access needs a pointer access. So, options (A), (B) and (C) cannot be implemented on such a processor
Question 92 |
8 | |
12 | |
13 | |
16 |
- 8192 locations
- 8 bits per location
So to address 8192 we need 13 bits (213=8192),
so 13 address lines.
Question 93 |
Index register | |
Memory address register | |
Program counter | |
Instruction register |
Question 94 |
Index register | |
Instruction register | |
Memory address register | |
Memory data register |
The memory address register is half of a minimal interface between a microprogram and computer storage; the other half is a memory data register.
In general, MAR is a parallel load register that contains the next memory address to be manipulated. For example, the next address to be read or written.
Reference : https://en.wikipedia.org/wiki/Memory_address_register
Question 95 |
Direct | |
Register | |
Register indirect | |
Immediate |
Point To Note : Generally 4 types of Instructions are there
PUSH A : Direct
PUSH B : Register
Add : Register Indirect
Pop.C : Immediate
Question 96 |
MOV AL, 153
NEG AL
The contents of the destination register AL (in 8-bit binary notation), the status of Carry Flag(CF) and Sign Flag(SF) after the execution of above instructions, are
AL = 0110 0110; CF = 0; SF =0 | |
AL = 0110 0111; CF = 0; SF =1 | |
AL = 0110 0110; CF = 1; SF =1 | |
AL = 0110 0111; CF = 1; SF =0 |
- The NEG instruction negates a value by finding 2's complement of its single operand.
- This simply means multiply operand by -1.
- When a positive value is negated the result is negative.
- A negative value will become positive.
NEG AL // Now Accumulator have -153
153 = 1001 1001
its 2's compliment is 0110 0111
NEG(153) = -153( 1111 1111 0110 0111)
AL = 0110 0111 // -153
Status of Carry Flag (CF) = 0 // we don't have any carry
Sign Flag (SF) = 1 // -153 negative number
So, option(B) is the Correct Answer
Question 97 |
(i) Auto increment addressing mode is useful in creating self-relocating code.
(ii) If auto addressing mode is included in an instruction set architecture, then an additional ALU is required for effective address calculation.
(iii) In auto increment addressing mode, the amount of increment depends on the size of the data item accessed.
Which of the above statements is/are true ?
(iii) only | |
(ii) and (iii) only | |
(i) and (ii) only | |
(ii) only |
- Self reallocating code required for Displacement Addressing Mode. Auto Increment is useful for Array implementation
- In Auto increment/decrement Addressing Mode , Register will be automatically incremented or decremented So, ALU is required. But additional ALU is not required.
- For incrementing the data, the auto-increment addressing mode is used which purely depends on the size of the data. In Auto increment mode automatically increments the contents of a register by a value that corresponds to the size of the accessed operand. Thus , the increment is 1 for byte-sized operands, 2 for 16-bit operands, and 4 for 32-bit operands. The size of the operand is usually specified as part of the operation code of an instruction.
Question 98 |
Determinant the speedup ration of the pipeline for 100 tasks. What is the maximum speedup that can be achieved?
4.90,5 | |
4.76,5 | |
3.90,5 | |
4.30,5 |
Time taken by non pipeline Tn to process a task = 50 ns
NON-Pipeline
Time period of 100 tasks = (Number of tasks) * (Time taken for process each task)
Time period of 100 tasks = n*Tn
Time period of 100 tasks = 100 x 50 = 5000 ns
With PipeLined
Number of segment pipeline "K" = 6
Time period of 1 clock cycle = 10 ns
Total time required = ( k + n - 1)tp
Total time required= ( 6 + 100 - 1)10
Total time required= 1050 ns
Speed up ratio " S" = 5000/1050
Speed up ratio " S"= 4.76
Question 99 |
Non reusable | |
Cache memory | |
Virtual memory | |
None of the above |
In other words, Locality of Reference refers to the tendency of the computer program to access instructions whose addresses are near one another.
locality of reference. There are two ways with which data or instruction is fetched from main memory and get stored in cache memory. These two ways are the following:
Temporal Locality :
Temporal locality means current data or instruction that is being fetched may be needed soon.
In Temporal Locality The Least Recently Algorithm is Used (LRU)
Clustering in time: items referenced in the immediate past have a high probability of being re-referenced in the immediate future
Spatial Locality:
Spatial locality means instruction or data near to the current memory location that is being fetched, may be needed soon in the near future.
Clustering in space: items located physically near an item referenced in the immediate past have a high probability of being re-referenced in the immediate future
Refer : https://www.cs.usask.ca/faculty/bunt/presentations/Locality.ppt
Question 100 |
Illegal or erroneous use of an instruction | |
A timing devices | |
External sources | |
I/O devices |
- Internal Interrupt :- Interrupt which arises from illegal or erroneous use of an instruction or data. Eg. :- Register overflow, stack overflow, Protection violation.
- External Interrupt :- Hardware error like power failure, memory parity error, I/O controller, Timer( internal processor timer is used in pre-emptive multi-tasking)
- Hardware Interrupt :- Interrupt generated by hardware. Eg. :- temperature sensor etc.
- Software Interrupt :- System calls intentionally written by programmer
- Asynchronous Interrupt :- If the interrupts are independent or not in phase to the system clock is called asynchronous interrupt.
- Periodic Interrupt :- If the interrupts occurred at fixed interval in timeline then that interrupts are called periodic interrupts.
- Synchronous Interrupt :- The interrupt which are dependent on the system clock. Eg. :- Timer service
- Nested Interrupt :- If an interrupt occurs while executing a program, and the processor is executing the interrupt, if one more interrupt occurs again, then it is called a nested interrupt.
Question 101 |
RAM | |
ROM | |
DISK | |
On-chip cache |
- Swap space is used when the amount of physical memory (RAM) is full. If the system needs more memory resources and the RAM is full, inactive pages in memory are moved to the swap space.
- While swap space can help machines with a small amount of RAM, it should not be considered a replacement for more RAM.
- Swap space is located on hard drives(Disk or any)
Question 102 |
Direct | |
Absolute | |
Indirect | |
Indexed |
- Direct Addressing Mode Effective address of operand is present in instruction itself.
- Single memory reference to access data.
- No additional calculations to find the effective address of the operand.
- Usually indicated by variable names
https://www.studytonight.com/computer-architecture/addressingmodes-instructioncycle#:~:text=Direct%20Addressing%20Mode&text=For%20Example%3A%20ADD%20R1%2C%204000,location%20where%20operand%20is%20present.
Question 103 |
Cold swapping | |
I/O instructions | |
Polling | |
Dealing |
A computer must have a way of detecting the arrival of any type of input. There are two ways that this can happen, known as polling and interrupts. Both of these techniques allow the processor to deal with events that can happen at any time and that are not related to the process it is currently running.
Polling I/O
Polling is the simplest way for an I/O device to communicate with the processor. The process of periodically checking status of the device to see if it is time for the next I/O operation, is called polling. The I/O device simply puts the information in a Status register, and the processor must come and get the information.
Most of the time, devices will not require attention and when one does it will have to wait until it is next interrogated by the polling program. This is an inefficient method and much of the processors time is wasted on unnecessary polls.
Compare this method to a teacher continually asking every student in a class, one after another, if they need help. Obviously the more efficient method would be for a student to inform the teacher whenever they require assistance.
Reference :
https://www.tutorialspoint.com/operating_system/os_io_hardware.htm#:~:text=The%20process%20of%20periodically%20checking,O%20operation%2C%20is%20called%20polling.
Question 104 |
ALU and Control Unit | |
ALU, Control Unit and Monitor | |
ALU, Control Unit and Hard disk | |
ALU, Control Unit and register |
Question 105 |
- Number of tracks = 500
- Number of sectors/track = 100
- Number of bytes /sector = 500
- Time taken by the head to move from one track to adjacent track = 1 ms
- Rotation speed = 600 rpm.
300.5 ms | |
255.5 ms | |
255 ms | |
300 ms |
Average seek time + the average rotational latency + the transfer time for 250 bytes
The Average seek time equals:
Given that :
time to move between successive tracks is 1 ms
time to move from track 1 to track 1: 0ms
time to move from track 1 to track 2: 1ms
time to move from track 1 to track 3: 2ms
..
..
time to move from track 1 to track 500 : 499m
Avg Seek time = ( ∑0+1+2+3+…+499)/500 = 249.5 ms
Avg Rotational Delay
- Rotation speed = 600 RPM.
- 600 rotations = 60 sec
- 1 rotation = 60/600 sec= 0.1 sec
Data Transfer Time:
In 1 Rotation we can read data on 1 complete track =
100×500 = 50,000 Bytes data is read in one complete rotation
1 complete rotation takes 0.1 s
0.1 → 50,000 bytes.
250 bytes →0.1×250 / 50,000 = 0.5 ms
Data Transfer Time = 0.5 ms
Avg. time to transfer = Avg. seek time + Avg. rotational delay + Data transfer time
Avg. time to transfer= 249.5+50+0.5
Avg. time to transfer= 300 ms
Question 106 |
300 | |
240 | |
250 | |
275 |
- Total number of bits per character while transmitting is (7+1)=8 bits
- No of character transmitted 2400/8=300 bps
- Total number of bits per character while transmitting is (7+1+1+1)=10 bits
- No of character transmitted 2400/10=240 bps
Question 107 |
4 | |
6 | |
8 | |
10 |
- Accumulator CPU is an example of One Address Instruction
- Load and store operations are performed to fetch the values of operands from registers or memory to accumulators and to store the value of accumulator to a memory location.
- Load A : ACC <-- M[M] //Load M value from memory to ACCUMULATOR
- Add N : ACC <-- ACC + M[N] //ADD N value to ACCUMULATOR and store Results in ACCUMULATOR
- Mul O : ACC <-- ACC x M[O] // Multiply O value to ACCUMULATOR and store Results in ACCUMULATOR
- Store T : M[T] <-- ACC // Now Store Results in Memory
- Load P : ACC <-- M[P] // Load P value from memory to ACCUMULATOR
- Mul Q : ACC <-- ACC x M[Q] // Multiply Q value to ACCUMULATOR and store Results in ACCUMULATOR
- Div T : ACC <-- M[T] / ACC // devide memory value(step4) with ACCUMULATOR and store Results in Acc
- Store X : M[X] <-- ACC // store Accumulator results in Memory
Question 108 |
Access time | |
Cycle time | |
Rotational time | |
Latency time |
- Cycle time is the minimum time delay between the initiations of two independent memory operations.
- The Time taken by the cpu to end one read operation and to start one more is cycle time.
Question 109 |
Program :
SUB A
MVI B,(01)H
DCR B
HLT
(54)H | |
(00)H | |
(01)H | |
(45)H |
Discussion Forum
Question 110 |
Byte 3 | |
Byte 2 | |
Byte 1 | |
Byte 0 |
How is a 32-bit pattern held in the four bytes of memory? There are 32 bits in the four bytes and 32 bits in the pattern, but a choice has to be made about which byte of memory gets what part of the pattern. There are two ways that computers commonly do this:
Big Endian Byte Order: The most significant byte (the "big end") of the data is placed at the byte with the lowest address. The rest of the data is placed in order in the next three bytes in memory.In these definitions, the data, a 32-bit pattern, is regarded as a 32-bit unsigned integer. The "most significant" byte is the one for the largest powers of two: 231, ..., 224. The "least significant" byte is the one for the smallest powers of two: 27, ..., 20.
Little Endian Byte Order: The least significant byte (the "little end") of the data is placed at the byte with the lowest address. The rest of the data is placed in order in the next three bytes in memory.
For example, say that the 32-bit pattern 0x12345678 is stored at address 0x00400000. The most significant byte is 0x12; the least significant is 0x78.
Within a byte the order of the bits is the same for all computers (no matter how the bytes themselves are arranged).

Source : https://chortle.ccsu.edu/AssemblyTutorial/Chapter-15/ass15_3.html#:~:text=The%20%22least%20significant%22%20byte%20is,the%20least%20significant%20is%200x78.
Question 111 |
ADD R1, R2, (R3)
4 | |
1 | |
3 | |
2 |
Question 112 |
Instruction cache | |
Instruction register | |
Instruction Opcode | |
Translation lookaside buffer |
- Instruction Cache : Used for storing frequently used instructions
- Instruction Register : Part of CPU’s control unit that stores the instruction currently being executed
- Instruction Opcode : The instruction opcode is a part of the instruction which tells the processor what operation is to be performed so it is not a form of memory while the others are instruction cache, instruction register and translation look a side buffer are the forms of memory
- Translation Lookaside Buffer : It is a memory cache that stores recent translations of virtual memory to physical addresses for faster access.
Question 113 |
10 | |
8 | |
13 | |
None |
Efficiency e= 80%= 0.8
Efficiency e= (Speedup factor s) / (Number of stages k)
- e= S/k
- k= S/e
- K=S/e=10/0.8=12.5 ≏ 13 stages
Question 114 |
RAID level 1 | |
RAID level 2 | |
RAID level 0 | |
RAID level 3 |
- RAID 0 (also known as a stripe set or striped volume) splits ("stripes") data evenly across two or more disks, without parity information, redundancy, or fault tolerance.
- RAID 1 consists of an exact copy (or mirror) of a set of data on two or more disks; a classic RAID 1 mirrored pair contains two disks
- RAID 2, which is rarely used in practice, stripes data at the bit (rather than block) level, and uses a Hamming code for error correction.
- RAID 3, which is rarely used in practice, consists of byte-level striping with a dedicated parity disk.
- RAID 4 consists of block-level striping with a dedicated parity disk.
- RAID 5 consists of block-level striping with distributed parity. Unlike in RAID 4, parity information is distributed among the drives. It requires that all drives but one be present to operate
- RAID 6 extends RAID 5 by adding another parity block; thus, it uses block-level striping with two parity blocks distributed across all member disks
Question 115 |
and has 4 two address instructions and 16 one address instructions.
The number of zero address instructions it can support is
256 | |
356 | |
640 | |
56 |
- Number of possible instruction encoding =210=1024
- Number of encoding taken by Two-address instructions = 4×23×23=4*8*8= 256
- Number of encoding taken by One-address instructions =16×23=16*8=128
- So, Number of possible Zero-address instructions =1024− (256 + 128)=640
Question 116 |
1 2 3 4 | |
3 2 4 1 | |
2 3 1 4 | |
1 4 2 3 |
- zero-address instruction An instruction that contains no address fields; operand sources and destination are both implicit. It may for example enable stack processing: a zero-address instruction implies that the absolute address of the operand is held in a special register that is automatically incremented (or decremented) to point to the location of the top
- One-address instructions use an implied accumulator (AC) register for all data manipulation. For multiplication and division there is a need for a second register. However, here we will neglect the second and assume that the AC contains the result of tall operations.
- In Two address instruction each address field can specify either a processor register or a memory word.
- In three-address instruction each address field to specify either a processor register or a memory operand.
Question 117 |
28 | |
Log2s | |
S2 | |
S |
"SET INDEX" is referred as SET OFFSET.
- In fully Associative only 1 set so SET INDEX not exit
- In Set-Associative if you have s sets then SET INDEX will be log2 s
Question 118 |
Zero address | |
One address | |
Two address | |
Three address |
Question 119 |
20ns, 10ns, 30ns, 25ns, 40ns, and 15ns respectively.
Suppose for implementing the pipelining the machine adds 5ns of overhead to each stage for clock skew and set up. What is the speed up factor of the pipelining system (ignoring any hazard impact) ?
7 | |
14 | |
3.11 | |
6.22 |
- Number of stages : 6
- Time taken for each stage : 20ns, 10ns, 30ns,25ns, 40 ns 15ns
Execution time 1 instruction = 20ns+10ns+30ns+25ns+40ns+15ns =140ns
With pipeline
Implementing pipeline adds 5 ns of overhead to each stage
So Add 5 ns to each stage
With ideal pipeline it will take 1 cycle time. Here 1 cycle time is max(25, 15, 35, 30, 45, 20) = 45ns
Speedup = ( Time without pipelining ) / ( Time with pipelining )
Speedup = 140/45= 3.11
Question 120 |
i. Large number of addressing modes
ii. Uniform instruction set
I only | |
Ii only | |
Both i and ii | |
None of the options |
CISC | RISC |
---|---|
Focus on software | Focus on hardware |
Uses only Hardwired control unit | Uses both hardwired and micro programmed control unit |
Transistors are used for more registers | Transistors are used for storing complex Instructions |
Fixed sized instructions | Variable sized instructions |
Can perform only Register to Register Arthmetic operations | Can perform REG to REG or REG to MEM or MEM to MEM |
Requires more number of registers | Requires less number of registers |
Code size is large | Code size is small |
A instruction execute in single clock cycle | Instruction take more than one clock cycle |
A instruction fit in one word | Instruction are larger than size of one word |
A large number of instructions are present in the architecture. | Very fewer instructions are present. The number of instructions are generally less than 100. |
Some instructions with long execution times. These include instructions that copy an entire block from one part of memory to another and others that copy multiple registers to and from memory. | No instruction with a long execution time due to very simple instruction set. Some early RISC machines did not even have an integer multiply instruction, requiring compilers to implement multiplication as a sequence of additions. |
Variable-length encodings of the instructions. Example: IA32 instruction size can range from 1 to 15 bytes. | Fixed-length encodings of the instructions are used. Example: In IA32, generally all instructions are encoded as 4 bytes. |
Multiple formats are supported for specifying operands. A memory operand specifier can have many different combinations of displacement, base and index registers. | Simple addressing formats are supported. Only base and displacement addressing is allowed. |
CISC supports array. | RISC does not supports array. |
Arithmetic and logical operations can be applied to both memory and register operands. | Arithmetic and logical operations only use register operands. Memory referencing is only allowed by load and store instructions, i.e. reading from memory into a register and writing from a register to memory respectively. |
Implementation programs are hidden from machine level programs. The ISA provides a clean abstraction between programs and how they get executed. | Implementation programs exposed to machine level programs. Few RISC machines do not allow specific instruction sequences. |
Condition codes are used. | No condition codes are used. |
The stack is being used for procedure arguments and return addresses. | Registers are being used for procedure arguments and return addresses. Memory references can be avoided by some procedures. |
Question 121 |
Immediate addressing | |
Indirect addressing | |
Implied addressing | |
Relative addressing |
Question 122 |
- S1: Interpreters process program according to the logical flow of control through the program
- S2: Interpreter translates and executes the error free instruction before it goes to the second
- S3: Interpreter processing time is less compared with compiler
- S4. LISP and Prolog are interpreted languages
Only S1 | |
Only S3 | |
Only S1,S2 and S3 | |
Only S1, S2 and S4 |
- S1: Interpreters process program according to the logical flow of control through the program. TRUE
- S2: Interpreters translates and executes the error-free first instruction before it goes to the second. TRUE Interpreter goes line-by-line of the program & executes line by line.
- S3: Interpreter processing time is less compared with compiler. FALSE
Because Compiler processing time is FASTER than Interpreter. - S4: LISP and Prolog are interpreted languages. TRUE Prolog is written to work with Microsoft Windows and is a Compiler version; however, they offer a sample program called ‘PIE', which is a simplified Prolog Interpreter
- So, option (D) Only S1, S2 and S4 is CORRECT
Question 123 |
Interrupts which are initially by an instruction are software interrupts | |
When a subordinate is called, the address of the instruction following the CALL instruction is stored in the stack pointer | |
A micro program which is written as 0's and 1's is a binary micro program | |
None of the options |
CALL instruction is used whenever we need to make a call to some procedure or a subprogram. Whenever a CALL is made, the following process takes place inside the microprocessor:
- The address of the next instruction that exists in the caller program (after the program CALL instruction) is stored in the stack.
- The instruction queue is emptied for accommodating the instructions of the procedure.
microprogram
The computer understands only binary language. So, the microprogram should have instructions which are in the form of 0s and 1s. Each output line of the micro-program corresponds to one control signal.
Reference : https://www.includehelp.com/embedded-system/the-call-and-ret-instruction-in-the-8086-microprocessor.aspx#:~:text=The%20CALL%20instruction%20in%20the%208086%20microprocessor&text=The%20address%20of%20the%20next,the%20instructions%20of%20the%20procedure.
Question 124 |
How many stalls are there for an incorrect predicted branch?
5 | |
6 | |
7 | |
4 |
- In General, if the branch instruction is known at Nth stage then the number of stalls would be = (N - 1)
- Here Given N =5
- Number of stalls = (N-1)=(5-1) = 4 Stall Cycles

Question 125 |
212 | |
210 | |
219 | |
213 |
Number of address lines = 7
Total number of addressable memory locations/number of memory words = 27 = 128
The number of data lines just gives the word size.
Thus, the answer should be 27
Although, if the question. was size of the chip, it is given by 128∗8=210
Question 126 |
A+B+2 | |
A+B+1 | |
B+1 | |
A+B |
Effective address of the operand is obtained by adding the content of program counter with the address part of the instruction.
Effective Address (EA) = (Content of Program Counter ) + (Address part of the instruction)
EA = PC + operand part
After fetching instruction PC will be incremented by 2
- Now , PC = A+2
- operand part = B.
Question 127 |
The primary reason behind this is:
Programs exhibits temporal locality | |
Programs have small working set | |
Read operation is frequently required rather than write operation | |
Programs exhibits spatial locality |
Spatial locality refers to the use of data elements within relatively close storage locations.
To exploit the spatial locality, more than one word are put into cache block.
References: http://en.wikipedia.org/wiki/Locality_of_reference
The Principle of Locality of Reference justifies the use of cache Memory.
In other words, Locality of Reference refers to the tendency of the computer program to access instructions whose addresses are near one another.
locality of reference. There are two ways with which data or instruction is fetched from main memory and get stored in cache memory. These two ways are the following:
Temporal Locality :
Temporal locality means current data or instruction that is being fetched may be needed soon.
In Temporal Locality The Least Recently Algorithm is Used (LRU)
Clustering in time: items referenced in the immediate past have a high probability of being re-referenced in the immediate future
Spatial Locality:
Spatial locality means instruction or data near to the current memory location that is being fetched, may be needed soon in the near future.
Increasing the block size of the cache comes under this
Clustering in space: items located physically near an item referenced in the immediate past have a high probability of being re-referenced in the immediate future
Refer : https://www.cs.usask.ca/faculty/bunt/presentations/Locality.ppt
Question 128 |
Instruction fetch | |
Instruction decode | |
Instruction execution | |
Instruction program |
- The basic function performed by a computer is the execution of a program. The program which is to be executed is a set of instructions which are stored in memory. The central processing unit (CPU) executes the instructions of the program to complete a task.
- The major responsibility of the instruction execution is with the CPU. The instruction execution takes place in the CPU registers
Question 129 |
Macro operation | |
Micro operation | |
Bit operation | |
Byte operation |
- The operations executed on data stored in registers are called micro-operations.
- Micro operation is an elementary operation performed (during one clock pulse), on the information stored in one or more registers.
Types of Micro Operations
Micro-operations are of 4 types:
- Register transfer micro - operations transfer binary information from one register to another.
- Arithmetic micro - operations perform arithmetic operations on numeric data stored in registers.
- Logic micro - operations perform bit manipulation operation on non-numeric data stored in registers.
- Shift micro - operations perform shift micro-operations performed on data.
Question 130 |
Busy-waiting | |
Interrupt | |
Polling | |
DMA |
Question 131 |
240 | |
250 | |
275 | |
300 |
- Total number of bits per character while transmitting is (7+1)=8 bits
- No of character transmitted 2400/8=300 bps
- Total number of bits per character while transmitting is (7+1+1+1)=10 bits
- No of character transmitted 2400/10=240 bps
Question 132 |
SISD | |
SIMD | |
MIMD | |
MISD |
SISD is one of the four main classifications as defined in Flynn's taxonomy.
Reference : https://en.wikipedia.org/wiki/SISD#:~:text=This%20corresponds%20to%20the%20von,present%20in%20the%20computer%20architecture.
Question 133 |
I/O bus | |
Data bus | |
Address bus | |
Control lines |
There are normally three types of bus in any processor system:
-
- An address bus: this determines the location in memory that the processor will read data from or write data to.
- A data bus: this contains the contents that have been read from the memory location or are to be written into the memory location.
- A control bus: this manages the information flow between components indicating whether the operation is a read or a write and ensuring that the operation happens at the right time.

Question 134 |
DDA | |
Serial Interface | |
BR | |
DMA |
- In the Direct Memory Access (DMA) the interface transfer the data into and out of the memory unit through the memory bus.
- The transfer of data between a fast storage device such as magnetic disk and memory is often limited by the speed of the CPU.
- Removing the CPU from the path and letting the peripheral device manage the memory buses directly would improve the speed of transfer.
- This transfer technique is called Direct Memory Access (DMA)
Question 135 |
1 2 3 4 | |
3 2 4 1 | |
2 3 1 4 | |
1 4 2 3 |
- zero-address instruction An instruction that contains no address fields; operand sources and destination are both implicit. It may for example enable stack processing: a zero-address instruction implies that the absolute address of the operand is held in a special register that is automatically incremented (or decremented) to point to the location of the top
- One-address instructions use an implied accumulator (AC) register for all data manipulation. For multiplication and division there is a need for a second register. However, here we will neglect the second and assume that the AC contains the result of tall operations.
- In Two address instruction each address field can specify either a processor register or a memory word.
- In three-address instruction each address field to specify either a processor register or a memory operand.
Question 136 |
Is faster than a hardwired unit | |
Facilitates easy implementation of a new instruction | |
Is useful when small programs are to be run | |
All of the above |
HARDWIRED CONTROL UNIT | MICROPROGRAMMED CONTROL UNIT |
---|---|
Hardwired control unit generates the control signals needed for the processor using logic circuits | Micrprogrammed control unit generates the control signals with the help of micro instructions stored in control memory |
Hardwired control unit is faster when compared to microprogrammed control unit as the required control signals are generated with the help of hardwares | This is slower than the other as micro instructions are used for generating signals here |
Difficult to modify as the control signals that need to be generated are hard wired | Easy to modify as the modification need to be done only at the instruction level |
More costlier as everything has to be realized in terms of logic gates | Less costlier than hardwired control as only micro instructions are used for generating control signals |
It cannot handle complex instructions as the circuit design for it becomes complex | It can handle complex instructions |
Only limited number of instructions are used due to the hardware implementation | Control signals for many instructions can be generated |
Used in computer that makes use of Reduced Instruction Set Computers(RISC) | Used in computer that makes use of Complex Instruction Set Computers(CISC) |
ATTRIBUTES | HARDWIRED CONTROL UNIT | MICROPROGRAMMED CONTROL UNIT |
---|---|---|
1. Speed | Speed is fast | Speed is slow |
2. Cost of Imlementation | More costlier. | Cheaper. |
3. Flexibility | Not flexible to accommodate new system specification or new instruction redesign is required. | More flexible to accommodate new system specification or new instruction sets. |
4. Ability to Handle Complex Instructions | Difficult to handle complex intruction sets. | Easier to handle complex intruction sets. |
5. Decoding | Complex decoding and sequencing logic. | Easier decoding and sequencing logic. |
6. Applications | RISC Microprocessor | CISC Microprocessor |
7. Instruction set of Size | Small | Large |
8. Control Memory | Absent | Present |
9. Chip Area Required | Less | More |
10. Occurrence | Occurrence of error is more | Occurrence of error is less |
Question 137 |
RAID level 1 | |
RAID level 2 | |
RAID level 0 | |
RAID level 3 |
- RAID 0 (also known as a stripe set or striped volume) splits ("stripes") data evenly across two or more disks, without parity information, redundancy, or fault tolerance.
- RAID 1 consists of an exact copy (or mirror) of a set of data on two or more disks; a classic RAID 1 mirrored pair contains two disks
- RAID 2, which is rarely used in practice, stripes data at the bit (rather than block) level, and uses a Hamming code for error correction.
- RAID 3, which is rarely used in practice, consists of byte-level striping with a dedicated parity disk.
- RAID 4 consists of block-level striping with a dedicated parity disk.
- RAID 5 consists of block-level striping with distributed parity. Unlike in RAID 4, parity information is distributed among the drives. It requires that all drives but one be present to operate
- RAID 6 extends RAID 5 by adding another parity block; thus, it uses block-level striping with two parity blocks distributed across all member disks
Question 138 |
Instruction cache | |
Instruction register | |
Instruction Opcode | |
Translation lookaside buffer |
- Instruction Cache : Used for storing frequently used instructions
- Instruction Register : Part of CPU’s control unit that stores the instruction currently being executed
- Instruction Opcode : The instruction opcode is a part of the instruction which tells the processor what operation is to be performed so it is not a form of memory while the others are instruction cache, instruction register and translation look a side buffer are the forms of memory
- Translation Lookaside Buffer : It is a memory cache that stores recent translations of virtual memory to physical addresses for faster access.
Question 139 |
Computer organization | |
Computer architecture | |
Microprocessor | |
Bus |
Computer organization refers to the operational units and their interconnection that realize the architecture specification.
Examples of architecture attributes include the instruction set, the number of bit to represent various data types (e.g.., numbers, and characters), I/O mechanisms, and technique for addressing memory. Organization attributes include those hardware details transparent to the programmer, such as control signals, interfaces between the computer and peripherals, and the memory technology used.
As an example, it is an architectural design issue whether a computer will have a multiply instruction. It is an organizational issue whether that instruction will be implemented by a special multiply unit or by a mechanism that makes repeated use of the add unit of the system. The organization decision may be bases on the anticipated frequency of use of the multiply instruction, the relative speed of the two approaches, and the cost and physical size of a special multiply unit.
Refer : https://voer.edu.vn/c/introduction-to-organization-and-architecture-of-computer/c5bb8246/94a52c13#:~:text=Organization%20and%20Architecture,-In%20describing%20computer&text=Computer%20architecture%20refers%20to%20those,logical%20execution%20of%20a%20program.
Question 140 |
Core | |
Core 2 duo | |
Dual core | |
Centrino |
- Core : It is the first Intel microprocessor with dual core that is the implementation of 2 processors on a single chip. There is an addition of Visualizing Technology.
- Core 2 : It extends the architecture to 64-bits and core 2 Quad provides four processors on a single chip. The register set as well as addressing modes are of 64-bits.
- Dual-Core : A dual-core processor is a CPU with two processors or "execution cores" in the same integrated circuit. Each processor has its own cache and controller, which enables it to function as efficiently as a single processor.
Question 141 |
HAND | |
LEG | |
ARM | |
SUN |
- An ARM processor is one of a family of CPUs based on the RISC (reduced instruction set computer) architecture developed by Advanced RISC Machines (ARM)
- ARM makes 32-bit and 64-bit RISC multi-core processors.
- ARM processors are extensively used in consumer electronic devices such as smartphones, tablets, multimedia players and other mobile devices, such as wearables. Because of their reduced instruction set, they require fewer transistors, which enables a smaller die size for the integrated circuitry (IC). The ARM processor’s smaller size, reduced complexity and lower power consumption makes them suitable for increasingly miniaturized devices.
Question 142 |
Register | |
Counter | |
Flip flop | |
Cache |

- Cache contains a copy of portions of main memory. When the processor attempts to read a word of memory, a check is made to determine if the word is in the cache. If so, the word is delivered to the processor. If not, a block of main memory, consisting of some fixed number of words, is read into the cache and then the word is delivered to the processor.
- Because of the phenomenon of locality of reference, when a block of data is fetched into the cache to satisfy a single memory reference, it is likely that there will be future references to that same memory location or to other words in the block
Question 143 |
Sequences | |
Arrays | |
Records | |
Registers |
- File consists of records. There are typically several records per block.
- Records are used to access data on secondary, sequential access stores, such as disks and tapes.
Question 144 |
Seek time | |
Rotational latency | |
Flash drives | |
Transfer rate |
Seek latency is not linearly proportional to the seek distance due to arm starting and stopping inertia.
Seek Time :
- The time taken by the read / write head to reach the desired track is called as seek time.
- It is the component which contributes the largest percentage of the disk service time.
- The lower the seek time, the faster the I/O operation
- The time taken by the desired sector to come under the read / write head is called as rotational latency.
- It depends on the rotation speed of the spindle.
Question 145 |
Minicomputer | |
Supercomputer | |
Mainframe | |
Microcomputer |
- Mainframe computers or mainframes are computers used primarily by large organizations for critical applications; bulk data processing,
- Mainframe computers are larger and have more processing power than some other classes of computers: minicomputers, servers, workstations, and personal computers.
Question 146 |
4004 | |
8008 | |
8080 | |
All of the these |
- 8080 is first single-chip microprocessor, began in 1972
- 4-bit 4004 released in 1971, and the first 8-bit processor, the 8008, in 1972.
- Both devices – released within five months of each other – had been breakthroughs.
- Both the 4004 and 8008 operated as components in four-chip sets, and their practical applications were limited.
- Single-chip microprocessor with speed and usability.
Question 147 |
Peripheral component interconnect(PCI) | |
Peripheral component disconnect(PCD) | |
Input output connect | |
Array connect |
- Peripheral Component Interconnection
- Intel released to public domain, in 1990.
- 32 or 64 bit
- 50 lines
- PCI is a high bandwidth processor-independent bus that function as a mezzanine or peripheral bus.
- Better system performance for high speed I/O subsystems (e.g graphic display adaptor network controllers, disk controllers, etc.)
- Currently allows: 64 data bus, 66 MHz and Transfer rate of 528 Mbyte/s, or 4.224 Gbps.
Question 148 |
- Number of tracks per side=600;
- Number of sides=2;
- Number of bytes per sector=512;
- Storage capacity in bytes=21 504 000
35 | |
40 | |
45 | |
50 |
- Number of tracks per side=600;
- Number of sides=2;
- Number of bytes per sector=512;
- Storage capacity in bytes=21 504 000
In this question we have to find Number of Sectors per Track
Number of Sectors per Track = [ (Total Storage Capacity) / ( Number of sides) * (Number of Tracks per side) * (Number of Bytes per Sector) ]
Number of Sectors per Track = (21 504 000) / 2 * 600 * 512
Number of Sectors per Track = 35
Question 149 |
MIMD | |
CISC | |
RISC | |
SIMD |
CISC | RISC |
---|---|
Focus on software | Focus on hardware |
Uses only Hardwired control unit | Uses both hardwired and micro programmed control unit |
Transistors are used for more registers | Transistors are used for storing complex Instructions |
Fixed sized instructions | Variable sized instructions |
Can perform only Register to Register Arthmetic operations | Can perform REG to REG or REG to MEM or MEM to MEM |
Requires more number of registers | Requires less number of registers |
Code size is large | Code size is small |
A instruction execute in single clock cycle | Instruction take more than one clock cycle |
A instruction fit in one word | Instruction are larger than size of one word |
A large number of instructions are present in the architecture. | Very fewer instructions are present. The number of instructions are generally less than 100. |
Some instructions with long execution times. These include instructions that copy an entire block from one part of memory to another and others that copy multiple registers to and from memory. | No instruction with a long execution time due to very simple instruction set. Some early RISC machines did not even have an integer multiply instruction, requiring compilers to implement multiplication as a sequence of additions. |
Variable-length encodings of the instructions. Example: IA32 instruction size can range from 1 to 15 bytes. | Fixed-length encodings of the instructions are used. Example: In IA32, generally all instructions are encoded as 4 bytes. |
Multiple formats are supported for specifying operands. A memory operand specifier can have many different combinations of displacement, base and index registers. | Simple addressing formats are supported. Only base and displacement addressing is allowed. |
CISC supports array. | RISC does not supports array. |
Arithmetic and logical operations can be applied to both memory and register operands. | Arithmetic and logical operations only use register operands. Memory referencing is only allowed by load and store instructions, i.e. reading from memory into a register and writing from a register to memory respectively. |
Implementation programs are hidden from machine level programs. The ISA provides a clean abstraction between programs and how they get executed. | Implementation programs exposed to machine level programs. Few RISC machines do not allow specific instruction sequences. |
Condition codes are used. | No condition codes are used. |
The stack is being used for procedure arguments and return addresses. | Registers are being used for procedure arguments and return addresses. Memory references can be avoided by some procedures. |
Question 150 |
Program counter | |
Stack | |
Stack pointer | |
Accumulator |
A set of Instructions which are used repeatedly in a program can be referred to as Subroutine. Only one copy of this Instruction is stored in the memory. When a Subroutine is required it can be called many times during the Execution of a Particular program. A call Subroutine Instruction calls the Subroutine. Care Should be taken while returning a Subroutine as Subroutine can be called from a different place from the memory.
The content of the PC must be Saved by the call Subroutine Instruction to make a correct return to the calling program.
Refer : https://www.quora.com/How-did-the-call-instruction-work-in-the-8085-microprocessor
Refer : https://www.geeksforgeeks.org/subroutine-subroutine-nestin.
Question 151 |
Accumulator | |
Stack pointer | |
Program Counter | |
Instruction pointer |
- ALU is the computational center of the CPU. It performs all mathematical and logical operations.
- The accumulator is a register in which intermediate arithmetic and logic results are stored.
- Without a register like an accumulator, it would be necessary to write the result of each calculation (addition, multiplication, shift, etc.) to main memory, perhaps only to be read right back again for use in the next operation. Access to main memory is slower than access to a register like the accumulator
Question 152 |
CD-ROM | |
RAM | |
Hard disk | |
Floppy disk |
Question 153 |
Virtual memory | |
Primary memory | |
Secondary memory | |
Cache memory |
- Program which is to be executed is loaded in the main memory. Processor then fetches the code and data from the main memory to execute the program.
- DRAM's (main memory ) are slower devices. So it is necessary to insert wait states in memory read / write cycles. This reduces the speed of execution.
- To speed up the process, high speed memories such as SRAMs(cache) are introduced
- In the memory system small sections of SRAM is added along with main memory, is referred to as cache memory
Question 154 |
Based indexed mode | |
Absolute mode | |
Immediate mode | |
Register indirect mode |
Immediate addressing mode
In immediate addressing mode when the instruction is assembled, the operand comes immediately after the opcode.
Notice that the immediate data must be preceded by the pound sign, “#”.
This addressing mode can be used to load information into any of the registers, including the DPTR register.
Examples follow :
MOV AL, 35H (move the data 35H into AL register)
Question 155 |
CMP | |
MOV | |
JMP | |
CALL |
- Direct Addressing Mode Effective address of operand is present in instruction itself.
- Single memory reference to access data.
- No additional calculations to find the effective address of the operand.
- Usually indicated by variable names
https://www.studytonight.com/computer-architecture/addressingmodes-instructioncycle#:~:text=Direct%20Addressing%20Mode&text=For%20Example%3A%20ADD%20R1%2C%204000,location%20where%20operand%20is%20present.
Question 156 |
Index | |
Absolute | |
Immediate | |
Indirect |
- Direct Addressing Mode Effective address of operand is present in instruction itself.
- Single memory reference to access data.
- No additional calculations to find the effective address of the operand.
- Usually indicated by variable names
https://www.studytonight.com/computer-architecture/addressingmodes-instructioncycle#:~:text=Direct%20Addressing%20Mode&text=For%20Example%3A%20ADD%20R1%2C%204000,location%20where%20operand%20is%20present.
Question 157 |
The time needed to execute a program | |
The time elapsed since execution begins | |
The address where next instruction is stored | |
The count of programs being executed after switching the power ON |
Question 158 |
Load Time | |
Seek time | |
Access time | |
Rotational latency |
Seek latency is not linearly proportional to the seek distance due to arm starting and stopping inertia.
Seek Time :
- The time taken by the read / write head to reach the desired track is called as seek time.
- It is the component which contributes the largest percentage of the disk service time.
- The lower the seek time, the faster the I/O operation
- The time taken by the desired sector to come under the read / write head is called as rotational latency.
- It depends on the rotation speed of the spindle.
Question 159 |
1, 6, 16 | |
28 | |
6, 8, 2 | |
24 |
Main Memory Size = 64K * 16
We can write 64k as 216 * 16
∴ Main Memory has 216 words

Number of blocks in cache = (Cache size / Block size) = 210/22=28=256
∴ 8 bits for block
Block size = 4 words = 22 words
∴ 2 bits for offset
Tag size = 16 - 8 - 2 = 6 bits
∴ 6 bits for Tag
Tag = 6 bits,
Index = Block = 8 bits,
Offset = Word = 2 bits
Question 160 |
4, 16 | |
16, 4 | |
4, 8 | |
8, 4 |

Question 161 |
Efficiently erasable programmable read only memory | |
Electrically erasable programmable read only memory | |
Electronically erasable programmable read only memory | |
Electrically and Electronically programmable read only memory |
- EEPROM stands for Electrically Erasable Programmable Read-Only Memory.
- It is a non-volatile ROM chip which used for storing a small amount of data in computers or some other electronic devices.
- Through EEPROM, an individual byte of data can erase and reprogrammed entirety, not selectively by the electrical voltage
Question 162 |
Instruction code | |
Micro operation | |
Accumulator | |
Register |
- Instruction code :The instruction code contains a group of bits that instruct computer to perform operations such as addition, Shift, Subtractions, complement etc. The instruction codes given to computer can also be explained as commands.
- Op code : op code which is also called operation code contains a group of bits that defines the operations such as addition, Shift, Subtractions, complement etc.
- Micro operation : micro-operations (also known as micro-ops) are the functional or atomic, operations of a processor. These are low level instructions used in some designs to implement complex machine instructions
- Accumulator : Accumulator is a register in which intermediate arithmetic and logic results are stored
- Register : A processor register is a quickly accessible location available to a computer's processor.
Question 163 |
Immediate | |
Direct | |
Indirect | |
Implied |
Question 164 |
Disk,tape,Cache,RAM | |
Tape,Disk,RAM,Cache | |
Cache,RAM,Disk,tape | |
Tape,Disk,cache,RAM |
Question 165 |
Non Maskable interrupts are reserved for unrecoverable memory error | |
Vectored interrupt mechanism reduces the need for searching all possible sources of interrupt | |
Priority interrupt mechanism enables preemption of high priority interrupt | |
System calls are implemented using software interrupts |
When two or more devices interrupt the computer simultaneously, the computer services the device with the higher priority first.
Question 166 |
- mov ax, 0h
- mov cx, 0A h
- do loop:
- dec ax
- loop do loop
Ax=FFF5 h and cx=0 h | |
Ax=FFF6 h and cx=0 h | |
Ax=FFF7 h and cx=0A h | |
Ax=FFF5 h and cx=0A h |
ax = 0;
cx = 0Ah = 10 (A=10 in hex;)
loop instruction in 8086 works by decrementing the value of cx register by 1 until it becomes 0h
Do loop will decrement ax and cx value by 1
- 1st iteration : ax=ax-1 ∴ ax=-1 and cx=cx-1 ∴cx=9
- 2nd iteration : ax=ax-1 ∴ ax=-2 and cx=cx-1 ∴cx=8
- 3rd iteration : ax=ax-1 ∴ ax=-3 and cx=cx-1 ∴cx=7
- 4th iteration : ax=ax-1 ∴ ax=-4 and cx=cx-1 ∴cx=6
- 5th iteration : ax=ax-1 ∴ ax=-5 and cx=cx-1 ∴cx=5
- 6th iteration : ax=ax-1 ∴ ax=-6 and cx=cx-1 ∴cx=4
- 7th iteration : ax=ax-1 ∴ ax=-7 and cx=cx-1 ∴cx=3
- 8th iteration : ax=ax-1 ∴ ax=-8 and cx=cx-1 ∴cx=2
- 9th iteration : ax=ax-1 ∴ ax=-9 and cx=cx-1 ∴cx=1
- 10th iteration : ax=ax-1 ∴ ax=-10 and cx=cx-1 ∴cx=0
- Now loop breaks because cx became 0
Question 167 |
- stc
- mov al, 11010110b
- mov cl, 2
- rcl al, 3
- rol al, 4
- shr al, cl
- mul cl
Ax=003CH; CF=0 | |
Ax=001EH; CF=0 | |
Ax=007BH; CF=1 | |
Ax=00B7H; CF=1 |

Question 168 |

a. Application of layer i. TCP
b. Transport layer ii. IP
c. Network layer iii. PPP
d. Datalink layer iv. HTTP
A-(iv), b-(i), c-(ii), d-(iii) | |
A-(iii), b-(ii), c-(i), d-(iv) | |
A-(ii), b-(iii), c-(iv), d-(i) | |
A-(iii), b-(i), c-(iv), d-(ii) |
Application Layer Protocols : (DNS, SMTP, POP, FTP, HTTP,IMAP,POP3,HTML)
Transport layer uses : TCP,UDP,DTAP,WDP,BSSMAP
Network layer Protocols :
- CLNS, Connectionless-mode Network Service
- DDP, Datagram Delivery Protocol
- EGP, Exterior Gateway Protocol
- EIGRP, Enhanced Interior Gateway Routing Protocol
- ICMP, Internet Control Message Protocol
- IGMP, Internet Group Management Protocol
- IPsec, Internet Protocol Security
- IPv4/IPv6, Internet Protocol
- IPX, Internetwork Packet Exchange
- OSPF, Open Shortest Path First
- PIM, Protocol Independent Multicast
- RIP, Routing Information Protocol
- WireGuard, WireGuard
- Synchronous Data Link Protocol (SDLC)
- High-Level Data Link Protocol (HDLC) –
- Serial Line Interface Protocol (SLIP) –
- Point to Point Protocol (PPP) –
- Link Control Protocol (LCP) –
- Network Control Protocol (NCP) –
- Link Access Procedure (LAP) –
Question 169 |
- mov al, 15
- mov ah, 15
- xor al, al
- mov cl, 3
- shr ax, cl
- add al, 90H
- adc ah, 0
0270H | |
0170H | |
01E0H | |
0370H |
- EAX is the full 32-bit value
- AX is the lower 16-bits
- AL is the lower 8 bits
- AH is the bits 8 through 15 (zero-based)
- EAX: 12 34 56 78
- AX: 56 78
- AH: 56
- AL: 78
In assembly AX=AH+AL
mov al, 15
It means move 15 to lower part of 'ax' register
mov ah, 15
It means move 15 to higher part of 'ax' register
'ax' register = 00001111 00001111
Note : In ax register First 8 bits for ah and second 8 bits for al
AL and Ah both contains 15(F in hexa) so AX contains 0F0F or 00001111 00001111
xor al,al
It means 'XORing lower part of 'ax' register with its own content and storing result back in 'al' , now the 'ax' register content will be
00001111 XOR 00001111 =00000000
'ax' register content:: 0000111100000000
move cl,3
It means move cl = 3
'c' register content = 00000000 00000011
shr ax,cl
ax =00001111 00000000
cl =3
It will take the bit values that are in AX and Shifting those bits to the right 3 places then ax=00000001 11100000 or 01E0 in hexadecimal
add al, 90H
Add hexadecimal 90 to al
0000000111100000
0000000010010000
+0000001001110000
adc ah,0
It means addition with carry which does not affect 'ax' register
So, content of ax register will be 0270H.
Note :
ax = 0000000111100000
90H=0000000010010000 --> (0090)
After addition result is
0000001001110000
Question 170 |
AL = 0FH; CF = 1; SF = 1 | |
AL = F0H; CF = 0; SF = 0 | |
AL = F1H; CF = 1; SF = 1 | |
AL = 1FH; CF = 1; SF = 1 |
(AL) => 3AH => 00111010
sub AL - BL
(AL) => 3AH => 00111010
(BL) => 49H => 01001001
-----------------------------------
11110001

(AL) => F1H
(CF) => 1
(Sign flag) => 1
Question 171 |

a. Device controller i. Extracts information from the controller register and store it in data buffer
b. Device driver ii. I/O scheduling
c. Interrupt handler iii. Performs data transfer
d. Kernel I/O subsystem iv. Processing of I/O request
A-iii, b-iv, c-i, d-ii | |
A-ii, b-i, c-iv, d-iii | |
A-iv, b-i, c-ii, d-iii | |
A-i, b-iii, c-iv, d-ii |
- Device controller performs data transfer.
- Device driver process I/O request.
- Inturrupt handler Extracts information from the controller register and store it in data buffer
- Kernel I/O subsystem performs I/O scheduling.
Question 172 |
MVI A, 35H
MOV B, A
STC
CMC
RAR
XRA B
00H | |
35H | |
EFH | |
2FH |
- MVI A, 35H
move 35H to Accumulator = 35H = 0011 0101 - MOV B, A
move B to A now register B = 35H - STC
set carry flag c = 1. - CMC
complement carry flag c = not( 1) = 0 now c=0. - RAR
Each binary bit of the accumulator is rotated right by one position through the Carry flag. And modify carry = D0.
D7 = previous carry.
Accumulator = 0001 1010 , carry = 1. (After Rotation) - XRA B
A= A XOR B
(0011 0101 ) xor ( 0001 1010 )
= 0010 1111
= 2F H
Question 173 |
- MVI A, 42H
- MVI B, 05H
- UGC :
- ADD B
- DCR B
- JNZ UGC
- ADI 25H
- HLT
82 H | |
78 H | |
76 H | |
47 H |
- MVI A, 42H
MOVE 42H to Accumulator Now A = 42H (42H(in hexa) = 66 in decimal by A= 4 * 16 + 2 = 66 in decimal) - MVI B, 05H
MOVE 05H to B Register Now B = 05H ( 05H(in Hexa) = 5 in decimal - UGC : Loop runs from B=5 to 1
- ADD B :
Register B will be added to Accumulator A ∴ A=66+5=71 - DCR B :
Now B value Decremented by 1 - JNZ UGC :
means JUMP not equals to zero
loop will run until B=0
∴ mean while B will be added to A
A=71+4=75
A=75+3=78
A=78+2=80
A=80+1=81
Now B=0 so loop fails - ADI 25H
Add 25H to Accumulator (81 + 25H = 81 + 37 =118)
25(in hexa) =37(in decimal)
Finally 118 in hexa = 76 in decimal
01110110 = 76H - HLT :
Halt the problem
Question 174 |
Decreasing instruction latency | |
Eliminating data hazards | |
Exploiting instruction level parallelism | |
Decreasing the cache miss rate |
Pipelining : Each instruction is split up into a sequence of stages – different stages can be executed concurrently by different circuitry.
A basic pipeline in a RISC processor
- IF – Instruction Fetch
- ID – Instruction Decode
- EX – Instruction Execution
- MEM – Memory Access
- WB – Register Write Back
Question 175 |
- mov al, 15
- mov ah, 15
- xor al, al
- mov cl, 3
- shr ax, cl
0F00 h | |
0F0F h | |
01E0 h | |
FFFF h |
- EAX is the full 32-bit value
- AX is the lower 16-bits
- AL is the lower 8 bits
- AH is the bits 8 through 15 (zero-based)
- EAX: 12 34 56 78
- AX: 56 78
- AH: 56
- AL: 78
In assembly AX=AH+AL
mov al, 15
It means move 15 to lower part of 'ax' register
mov ah, 15
It means move 15 to higher part of 'ax' register
'ax' register = 00001111 00001111
Note : In ax register First 8 bits for ah and second 8 bits for al
AL and Ah both contains 15(F in hexa) so AX contains 0F0F or 00001111 00001111
xor al,al
It means 'XORing lower part of 'ax' register with its own content and storing result back in 'al' , now the 'ax' register content will be
00001111 XOR 00001111 =00000000
'ax' register content:: 0000111100000000
move cl,3
It means move cl = 3
'c' register content = 00000000 00000011
shr ax,cl
ax =00001111 00000000
cl =3
It will take the bit values that are in AX and Shifting those bits to the right 3 places then ax=00000001 11100000 or 01E0 in hexadecimal
Note :
ax = 00000001 11100000
Question 176 |
Top-down parsers are LL parsers where first L stands for left - to - right scan and second L stands for a leftmost derivation. | |
(000)* is a regular expression that matches only strings containing an odd number of zeroes, including the empty string. | |
Bottom-up parsers are in the LR family, where L stands for left - to - right scan and R stands for rightmost derivation. | |
The class of context - free languages is closed under reversal. That is, if L is any context- free language, then the language L R = {w R : w∈L} is context - free. |
- Option(A) = True
- Option(B) = False
(000)* will generate( ε, 000, 000000, 000000000, …….. ) multiples of 3 which include odd and even strings, String contain 6, 12, 18, 24 which are even so this is incorrect. - Option(C) = True
- Option(D) = True
Question 177 |
1/((1−p)+ N .P) | |
1/((N −1)P +P) | |
1/((1−P )+ P /N) | |
1/((P)+(1-P)/N) |


- shows that the theoretical speedup of the execution of the whole task increases with the improvement of the resources of the system and that regardless of the magnitude of the improvement, the theoretical speedup is always limited by the part of the task that cannot benefit from the improvement.
- Amdahl's law applies only to the cases where the problem size is fixed. In practice, as more computing resources become available, they tend to get used on larger problems (larger datasets), and the time spent in the parallelizable part often grows much faster than the inherently serial work. In this case, Gustafson's law gives a less pessimistic and more realistic assessment of the parallel performance
Question 178 |
Pointer | |
Indexed register | |
Special Locations | |
Scratch Pad |
- Effective address of the operand is the contents of a register or main memory location, location whose address appears in the instruction.
- The register or memory location that contains the address of the operand is a pointer.
- When an execution takes place in such mode, instruction may be told to go to a specific address. Once it's there, instead of finding an operand, it finds an address where the operand is located.
Question 179 |
Virtual memory | |
Interrupts | |
Cache memory | |
Secondary memory |
In other words, Locality of Reference refers to the tendency of the computer program to access instructions whose addresses are near one another.
locality of reference. There are two ways with which data or instruction is fetched from main memory and get stored in cache memory. These two ways are the following:
Temporal Locality :
Temporal locality means current data or instruction that is being fetched may be needed soon.
In Temporal Locality The Least Recently Algorithm is Used (LRU)
Clustering in time: items referenced in the immediate past have a high probability of being re-referenced in the immediate future
Spatial Locality:
Spatial locality means instruction or data near to the current memory location that is being fetched, may be needed soon in the near future.
Clustering in space: items located physically near an item referenced in the immediate past have a high probability of being re-referenced in the immediate future
Refer : https://www.cs.usask.ca/faculty/bunt/presentations/Locality.ppt
Question 180 |
ATLAS | |
CP/M | |
SAGE | |
T.H.E. |
Question 181 |
2 16 * 8 | |
2 18 * 10 | |
2 16 * 10 | |
2 18 * 8 |
- Total input to the ROM decoder will be (8+8 ( two 8 bit number ) +1( mode ) +1( carry in))
- Total number of words out of decoder will be 218 .
- Result will be 8 bit so 8 vertical lines +( 1 for carry ) +1 ( for saying underflow) .
Question 182 |
Where
n → no. of tasks
tn→ time of completion of each task
k → no. of segments of pipeline
tp → clock cycle time
S → speed up ratio
S =n tn/(k + n – 1)tp | |
S =n tn/(k + n + 1)tp | |
S =n tn/(k – n + 1)tp | |
S =(k + n – 1)tp/n tn |
With pipeline
- 1st task takes k cycles to finish then time will be k * tp
- Remaining (n-1) tasks needs tp time only to finish.
- Total time will be Time for first + remaining (n-1 task's) * tp time
- ∴ Total time = (k+ n -1 ) tp
Question 183 |
Absolute | |
Indirect | |
Immediate | |
Index |
Question 184 |
16 frames per second | |
19 frames per second | |
21 frames per second | |
23 frames per second |
Refer : https://en.wikipedia.org/wiki/Linux_framebuffer
Given :
Width = 640 px
height = 480 px
color depth = 1 bit / px
No of total pixels in the frame buffer = (width * height)= 640 px * 480 px = 307200
Memory required by frame buffer = Memory required for total pixel = ( Total pixels in the frame buffer ) * (Color depth) = 307200 * 1
1 pixel takes 200 nano second to refresh
To refresh the whole "screen" or "frame buffer" = Memory required by frame buffer x 200 ns = 640 x 480 x 200 ns = 61440000 nano second = 61440000 x 10−9 second
Then, refresh rate of frame buffer =
number of frame changes per second = 1 / 61440000 x 10−9 second = 100,00,00,000 / 61440000 = 100,000 / 6144 = 16.2760 = 16
Question 185 |
S1 : The Painter’s algorithm sorts polygons by depth and then paints (scan - converts) each Polygon onto the screen starting with the most nearest polygon.
S2 : Backface Culling refers to eliminating geometry with back facing normals.
S1 only | |
S2 only | |
Both S1 and S2 | |
Neither S1 Nor S2 |
The painter's algorithm, also known as a priority fill, is one of the simplest solutions to the visibility problem in 3D computer graphics. The name "painter's algorithm" refers to the technique employed by many painters for painting distant parts of a scene before parts which are nearer thereby covering some areas of distant parts. The painter's algorithm sorts all the polygons in a scene by their depth and then paints them in this order, farthest to closest. It will paint over the parts that are normally not visible which solving the visibility problem at the cost of having painted invisible areas of distant objects.
So according to above paragraph the option S1 is FALSE.
For S2 Statement :
Back-face culling is an important part of how a 3D engine performs visibility checks. Its purpose is to detect polygons that are invisible in a particular scene that is, polygons that face away from the viewer. The process is similar to clipping, which determines if polygons are within the camera's field of view at all, and if not, are not rendered.
Back-face culling is a method in computer graphics programming which determines whether a polygon of a graphical object is visible; if it is not, the polygon is "culled" from rendering process, which increases efficiency by reducing the number of polygons that the hardware has to draw.
The vertices of front-facing polygons wind in a clockwise fashion, so polygons that face away from the camera are in a counter-clockwise order relative to the current view. When back-faces are culled, these polygons are not drawn.
So according to above paragraph the option S2 is TRUE.
Statement S2 only true statement.
So, Option (2) is correct answer.
Reference : Painter’s Algorithm
Reference 1 : Painter’s Algorithm
Reference 2 : A Compact Method for Backface Culling
Question 186 |
I/O protection is ensured by operating system routines. | |
I/O protection is ensured by a hardware trap. | |
I/O protection is ensured during system configuration. | |
I/O protection is not possible. |
- Memory mapped I/O means, accessing I/O via general memory access as opposed to specialized IO instructions.
- Programmer can directly access any memory location directly. To prevent such an access, the OS (kernel) will divide the address space into kernel space and user space. An user application can easily access user application. To access kernel space, we need system calls (traps)
- User applications are not allowed to perform I/O in user mode – All I/O requests are handled through system calls that must be performed in kernel mode.
- This means explicit I/O is done at kernel mode , it can not done in user mode.
- In a CPU with memory mapped I/O, there is no explicit I/O instruction so protection is ensured by operating system routines only .
- As in kernel mode only OS can handle the task . And Kernal mode deals with system calls.
Question 187 |
Associative mapping | |
Direct mapping | |
Set-Associative mapping | |
Segmented - page mapping |
- Direct Mapping
- Fully Associative Mapping
- K-way Set Associative Mapping
Question 188 |
LDA 8000H
MVI B, 30H
ADD B
STA 8001H
Read a number from input port and store it in memory | |
Read a number from input device with address 8000H and store it in memory at location 8001H | |
Read a number from memory at location 8000H and store it in memory location 8001H | |
Load A with data from input device with address 8000H and display it on the output device with address 8001H |
- I/O devices are identified by 16-bit addresses
- 8085 communicates with an I/O device as if it were one of the memory locations
- Memory related instructions are used
For e.g. LDA, STA
Loads A with data read from input device with 16-bit address 8000H
STA 8001H
Stores (Outputs) contents of A to output device with 16-bit address 8001H
Reading a number from input port (port address 8000H) and display it on ASCII display connected to output port (port address 8001H)
- LDA 8000H ; reads data value 03H (example)into ; Accumulator, A = 03H
- MVI B, 30H ; loads register B with 30H
- ADD B ; A = 33H, ASCII code for 3
- STA 8001H ; display 3 on ASCII display
Option(D) is Most Appropriate
Question 189 |
Controlled transfer | |
Conditional transfer | |
Unconditional transfer | |
None of the above |




Question 190 |
(i) Cached memory is best suited for small loops.
(ii) Interleaved memory is best suited for small loops
(iii) Interleaved memory is best suited for large sequential code.
(iv) Cached memory is best suited for large sequential code.
(i) and (ii) are true. | |
(i) and (iii) are true. | |
(iv) and (ii) are true. | |
(iv) and (iii) are true. |
- Compared to the processor speed, the speed of the primary memory is slow. Cache memory is a small memory which sits in between the processor and primary memory and fetches information to the processor at a much higher speed or it makes it appear .
- Caching can be effective based on a property of computer programs called locality of reference. Analysis of program show that the majority of the execution time is spent around a small part of the program may be a simple loop, nested loop or a few functions. The rest of the program is accessed infrequently.
In other words, Locality of Reference refers to the tendency of the computer program to access instructions whose addresses are near one another.
locality of reference. There are two ways with which data or instruction is fetched from main memory and get stored in cache memory. These two ways are the following:
Temporal Locality :
Temporal locality means current data or instruction that is being fetched may be needed soon.
In Temporal Locality The Least Recently Algorithm is Used (LRU)
Clustering in time: items referenced in the immediate past have a high probability of being re-referenced in the immediate future
Spatial Locality:
Spatial locality means instruction or data near to the current memory location that is being fetched, may be needed soon in the near future.
Clustering in space: items located physically near an item referenced in the immediate past have a high probability of being re-referenced in the immediate future
Refer : https://www.cs.usask.ca/faculty/bunt/presentations/Locality.ppt
Interleaved memory
- It is a technique for increasing the speed of RAM. Here multiple memory chips are grouped together to form what are known as banks. Each of them take turns for supplying data.
- An interleaved memory with "n" banks is said to be n-way interleaved. Macintosh systems are considered to be one using memory interleaving.
Question 191 |
Internal | |
External | |
Hardware | |
Software |
- A software interrupt is a type of interrupt that is caused either by a special instruction in the instruction set or by an exceptional condition in the processor itself.
- A software interrupt is invoked by software, unlike a hardware interrupt, and is considered one of the ways to communicate with the kernel or to invoke system calls, especially during error or exception handling
What is an Interrupt ?
Interrupt is a signal which has highest priority from hardware or software which processor should process its signal immediately.
Types of Interrupts:
Although interrupts have highest priority than other signals, there are many type of interrupts but basic type of interrupts are- Hardware Interrupts: If the signal for the processor is from external device or hardware is called hardware interrupts. Example: from keyboard we will press the key to do some action this pressing of key in keyboard will generate a signal which is given to the processor to do action, such interrupts are called hardware interrupts. Hardware interrupts can be classified into two types they are
- Maskable Interrupt: The hardware interrupts which can be delayed when a much highest priority interrupt has occurred to the processor.
- Non Maskable Interrupt: The hardware which cannot be delayed and should process by the processor immediately.
- Software Interrupts: Software interrupt can also divided in to two types. They are
- Normal Interrupts: the interrupts which are caused by the software instructions are called software instructions.
- Exception: unplanned interrupts while executing a program is called Exception. For example: while executing a program if we got a value which should be divided by zero is called a exception.
- Periodic Interrupt: If the interrupts occurred at fixed interval in timeline then that interrupts are called periodic interrupts
- Aperiodic Interrupt: If the occurrence of interrupt cannot be predicted then that interrupt is called aperiodic interrupt.
- Synchronous Interrupt: The source of interrupt is in phase to the system clock is called synchronous interrupt. In other words interrupts which are dependent on the system clock. Example: timer service that uses the system clock.
- Asynchronous Interrupts: If the interrupts are independent or not in phase to the system clock is called asynchronous interrupt
Question 192 |
Microprocessor | |
Memory | |
Peripheral equipment | |
All of the above |
Question 193 |
Instruction execution | |
Instruction prefetch | |
Instruction decoding | |
Instruction manipulation |
- A technique which attempts to minimize the time a processor spends waiting for instructions to be fetched from memory. Instructions following the one currently being executed are loaded into a prefetch queue when the processor's external bus is otherwise idle. If the processor executes a branch instruction or receives an interrupt then the queue must be flushed and reloaded from the new address.
- Instruction prefetch is often combined with pipelining in an attempt to keep the pipeline busy.
- By 1995 most processors used prefetching, e.g. Motorola 680x0, Intel 80x86.
Question 194 |
Error detection | |
Error correction | |
Synchronization | |
Slowing down the communication |
- Start and Stop bits are used in asynchronous communication as a means of timing or synchronizing the data characters being transmitted.
- Start bit is used to signal the beginning of a frame.
- Stop bit is used to signal the end of a frame.
Question 195 |
Halts for predetermined time. | |
Branches off to the interrupt service routine after completion of the current instruction. | |
Branches off to the interrupt service routine immediately. | |
Hands over control of address bus and data bus to the interrupting device. |
- CPU continuously checks the status bit of interrupt at the completion of each current instruction running when there is a interrupt it service the interrupt using Interrupt Service Routine (ISR)
- An interrupt service routine (ISR) is a software routine that hardware invokes in response to an interrupt. ISR examines an interrupt and determines how to handle it executes the handling, and then returns a logical interrupt value. If no further handling is required the ISR notifies the kernel with a return value. An ISR must perform very quickly to avoid slowing down the operation of the device and the operation of all lower-priority ISRs.
Question 196 |
A plate of data | |
A cylinder of data | |
A track of data | |
A block of data |

Question 197 |
Data transfer | |
Logic operation | |
Arithmetic operation | |
All of the above |
Refer : https://en.wikipedia.org/wiki/Central_processing_unit
Question 198 |
8 | |
12 | |
13 | |
16 |
- 8192 locations
- 8 bits per location
So to address 8192 we need 13 bits (213=8192),
so 13 address lines.
Question 199 |
8 bit | |
16 bit | |
32 bit | |
64 bit |
- The 8086 (also called iAPX 86) is a 16-bit microprocessor chip designed by Intel between early 1976 and June 8, 1978, when it was released.
- The 8086 gave rise to the x86 architecture, which eventually became Intel's most successful line of processors.
- 8086, it is a 16-bit Integer processor in a 40 pin, Dual Inline Packaged IC
Question 200 |
Zenix | |
DOS | |
CP/M | |
Multics |
Question 201 |
PC ⟶ Mar ⟶ Memory ⟶ MDR ⟶ IR | |
PC ⟶ Memory ⟶ MDR ⟶ IR | |
PC ⟶ Memory ⟶ IR | |
PC ⟶ MAR ⟶ Memory ⟶ IR |
- (PC) the contents of PC transferred to MAR)
- (MAR) (Address bus) Select a particular memory location
- Issues RD control signals
- Reads instruction present in memory and loaded into MDR
- Will be placed in IR (Contents transferred from MDR to IR)
- Instruction present in IR will be decoded by which processor understand what operation it has to perform.
- Increments the contents of PC by 1, so that it points to the next instruction address.
- If data required for operation is available in register, it performs the operation.
- If data is present in memory following sequence is performed
- Address of the data to MAR
- MAR to Address bus to select memory location where is issued RD signal
- Reads data via data bus to MDR
- From MDR data can be directly routed to ALU or it can be placed in register and then operation can be performed
- Results of the operation can be directed towards output device, memory or register
- Normal execution preempted (interrupt)
Two registers-MAR (Memory Address Register) and MDR (Memory Data Register) : To handle the data transfer between main memory and processor. MAR-Holds addresses, MDR-Holds data
Instruction register (IR) : Hold the Instructions that is currently being executed
Program counter: Points to the next instructions that is to be fetched from memory
Question 202 |
Absolute | |
Immediate | |
Indirect | |
Index |
- Direct Addressing Mode Effective address of operand is present in instruction itself.
- Single memory reference to access data.
- No additional calculations to find the effective address of the operand.
- Usually indicated by variable names
https://www.studytonight.com/computer-architecture/addressingmodes-instructioncycle#:~:text=Direct%20Addressing%20Mode&text=For%20Example%3A%20ADD%20R1%2C%204000,location%20where%20operand%20is%20present.
Question 203 |
100 or more | |
125 or more | |
150 or more | |
175 or more |
- Let R be the total reds on inner disk.
- Consider a half with r reds.
- Half 1 = r reds and 100-r whites
- Half 2 = R -r reds and 100-(R-r) = 100 - R +r whites.
- If r > = R - r, match half1 with Red half of outer disk.
- Total matching = r + 100 - R + r = 100 - R + 2r
- Now r >= R - r => 2r - R >= 0
- Total matching = 100 - R + 2r >= 100
Question 204 |
Improve disk performance | |
Handle interrupts | |
Increase the capacity of main memory | |
Speed up main memory Read operations |
- Generally caches are used to speed up the whole process .more cache size include more frequent referred data so there will be the chance of improving the speed of the required operation .
- The disk driver copies data from and back to the disk, The buffer cache manages these temporary copies of the disk blocks. Caching disk blocks has an obvious performance benefit: disk access is significantly slower than memory access, so keeping frequently-accessed disk blocks in memory reduces the number of disk accesses and makes the system faster
Question 205 |
Data transfer | |
Arithmetic | |
Logical | |
Program control |
Data Transfer
The data transfer instructions move data between registers or between memory and registers.
MOV , MVI,LDA,STA,LHLD,SHLD etc.
Logical
The Instructions under this group perform logical operation such as AND, OR, compare, rotate etc.
Examples are: ANA, XRA, ORA, CMP, RAL,STC etc.
Program control
instructions change or modify the flow of a program. The most basic kind of program control is the unconditional branch or unconditional jump. Branch is usually an indication of a short change relative to the current program counter. Jump is usually an indication of a change in program counter that is not directly related to the current program counter (such as a jump to an absolute memory location or a jump using a dynamic or static table), and is often free of distance limits from the current program counter.
LOOPNZ,RET,CALL,LOOPZ,IRET,JUMP,JUMPNZ etc.
Question 206 |
Stack pointer | |
Address latch | |
Program counter | |
Any general purpose register |
Question 207 |
80286 | |
8085 | |
80386 | |
8086 |
- Intel 8085 is an 8-bit microprocessor. Its data bus is 8-bit wide and hence, 8 bits of data can be transmitted in parallel from or to the microprocessor.
- Intel 8088 microprocessor is a variant of the Intel 8086. Introduced on July 1, 1979, the 8088 had an eight-bit external data bus instead of the 16-bit bus of the 8086.
- Intel 8086 (also called iAPX 86) is a 16-bit microprocessor chip designed by Intel between early 1976 and June 8, 1978
- Intel 80286 (also marketed as the iAPX 286 and often called Intel 286) is a 16-bit microprocessor that was introduced on February 1, 1982. It was the first 8086-based CPU with separate, non-multiplexed address and data buses and also the first with memory management and wide protection abilities.
- Intel 80386, also known as i386 or just 386, is a 32-bit microprocessor introduced in 1985.
Question 208 |
Error detection | |
Error correction | |
Synchronization | |
Slowing down the communication |
- Start and Stop bits are used in asynchronous communication as a means of timing or synchronizing the data characters being transmitted.
- Start bit is used to signal the beginning of a frame.
- Stop bit is used to signal the end of a frame.
Question 209 |
Pointer | |
Special location | |
Indexed register | |
None of the above |
- Effective address of the operand is the contents of a register or main memory location, location whose address appears in the instruction.
- The register or memory location that contains the address of the operand is a pointer.
- When an execution takes place in such mode, instruction may be told to go to a specific address. Once it's there, instead of finding an operand, it finds an address where the operand is located.
Question 210 |
Absolute mode | |
Immediate mode | |
Indirect mode | |
Index mode |
In immediate addressing mode when the instruction is assembled, the operand comes immediately after the opcode.
Notice that the immediate data must be preceded by the pound sign, “#”.
This addressing mode can be used to load information into any of the registers, including the DPTR register.
Examples follow :
MOV AL, 35H (move the data 35H into AL register)
Question 211 |
Absolute mode | |
Immediate mode | |
Indirect mode | |
Index mode |
Question 212 |
The operand in decimal form | |
The address of the location where the value of the operand is stored | |
The address of the location where the address of the operand is stored | |
The operand in an encoded form |
- The address field of the instruction specifies the address of memory location that contains the effective address of the operand.
- Two references to memory are required to fetch the operand
ADD X will increment the value stored in the accumulator by the value stored at memory location specified by X.
AC ← AC + [[X]]
Question 213 |
S≤f+(1-f)/p | |
S≤f/p+(1-f) | |
S≤1/[f+(1-f)/p] | |
S≤1/[1-f+f/p] |


- shows that the theoretical speedup of the execution of the whole task increases with the improvement of the resources of the system and that regardless of the magnitude of the improvement, the theoretical speedup is always limited by the part of the task that cannot benefit from the improvement.
- Amdahl's law applies only to the cases where the problem size is fixed. In practice, as more computing resources become available, they tend to get used on larger problems (larger datasets), and the time spent in the parallelizable part often grows much faster than the inherently serial work. In this case, Gustafson's law gives a less pessimistic and more realistic assessment of the parallel performance
Question 214 |
1 | |
H + 10 (1 - h) | |
(1 - h) + 10 h | |
10 |
Cache Miss Rate = (1- h)
Time for cache access = 1 ms
Time for hard disk access = 10ms
The mean time required to satisfy a request is
Mean time = (cache hit) * (cache access time) * + (cache miss rate)*(memory access time)
Mean time = h * 1 + (1 - h) * 10
Mean time = = h + 10 - 10h
mean time = h+10(1-h)
Question 215 |
High-Speed Register | |
Low-Speed RAM | |
Non-Volatile RAM | |
High-speed RAM |
- Volatile and Non-Volatile Memory are both types of computer memory.
- Volatile Memory is used to store computer programs and data that CPU needs in real time and is erased once computer is switched off.
- RAM and Cache memory are volatile memory. Where as Non-volatile memory is static and remains in the computer even if computer is switched off.
- ROM and HDD are non-volatile memory.
Question 216 |
AC flag Only | |
CY flag Only | |
Z flag Only | |
AC, CY, Z flags |
ALU of 8085 have five flip flops whose states (set/reset) are determined by the result data of other registers and accumulator.
They are called as Zero, Carry, Sign, Parity and Auxiliary-Carry flags.
- Zero Flag (Z): When an arithmetic operation results in zero , the flip-flop called the Zero flag - which is set to one.
- Carry flag (CY): After an addition of two numbers, if the sum in the accumulator is larger than eight bits, then the flip-flop uses to indicate a carry called the Carry flag – which is set to one.
- Sign (S): It is set to 1, if bit D7 of the result = 1; otherwise reset. D7 is the first digit of a binary number.
- Parity (P): If the result has an even number of 1s, the flag is set to 1; for an odd number of 1s the flag is reset.
- Auxiliary Carry (AC): In an arithmetic operation, when a carry is generated by digit D3 and passed to digit D4, the AC flag is set. Generally this flag is used internally for Binary Coded Decimals (BCD)

Figure shows a 8-bit flag register, adjacent to the accumulator. It is not used as a register. Out of eight bit-positions, five positions are used to store the outputs of five flip-flops.
Some of the arithmetic operations are -
- ADD : Add
- ADI : Add Immediate
- SUB : Subtract
- SUI : Subtract Immediate
Question 217 |
4 | |
8 | |
16 | |
32 |
- Length of Address Bus of 8085 microprocessor is 16 Bit (That is, Four Hexadecimal Digits), ranging from 0000 H to FFFF H, (H denotes Hexadecimal).
- The microprocessor 8085 can transfer maximum 16 bit address which means it can address 65, 536 different memory location.
- The Length of the address bus determines the amount of memory a system can address.
Question 218 |
(a)-(iv), (b)-(i), (c)-(ii) | |
(a)-(iii), (b)-(iv), (c)-(ii) | |
(a)-(ii), (b)-(iii), (c)-(i) | |
(a)-(i), (b)-(ii), (c)-(iv) |
- 8-bit ALU of 8085 is capable of performing the following operations
Arithmetic : Addition, Subtraction, Increment, Decrement, Compare.
Logical : AND, OR, EXOR, NOT, SHIFT / ROTATE, CLEAR. - Timing and control instruction are covered in instruction unit of microprocessor.
- General Purpose Register
General purpose registers are used to store temporary data within the microprocessor. It is a multipurpose register.
They can be used either by programmer or by a user.
Question 219 |
In memory - mapped I/O, the CPU can manipulate I/O data residing in interface registers that are not used to manipulate memory words. | |
The isolated I/O method isolates memory and I/O addresses so that memory address range is not affected by interface address assignment. | |
In asynchronous serial transfer of data the two units share a common clock. | |
In synchronous serial transmission of data the two units have different clocks. |
- The isolated I/O method isolates memory and I/O addresses so that memory address values are not affected by interface address assignment since each has its own address space.
- The memory mapped I/O uses the same address space for both memory and I/O.
- This is the case in computers that employ only one set of read and write signals and do not distinguish between memory and I/O addresses.
- The computer treats an interface register as being part of the memory system.
- The assigned addresses for interface registers cannot be used for memory words, which reduce the memory address( range available).
- In memory mapped I/O organization, there are no specific inputs or output instructions. The CPU can manipulate I/O data residing in interface registers with the same instructions that are used to manipulate memory words.
- Typically, a segment of the total address space is reserved for interface registers, but in general, they can be located at any address as long as there is not also a memory word that responds to the same address.
- It allows the computer to use the same instructions for either input-output transfers or for memory transfers.
Option(D) :In synchronous serial transfer of data the two units share a common clock.
Question 220 |
17 | |
20 | |
24 | |
32 |
- Micro operation fields. F1,F2,F3 (each are having 7 microoperation)
- CD for status bits
- Branch field BR having four options used in conjunction with address field ADF.
Size of the micro operation = ?
Given Microinstruction Format

- F1,F2,F3 each having seven distinct micro-operation
- Number of bits to represent
- log27+ log27+ log27=3+3+3=9
- 3 bits are required for each
Branch field have four option ∴ log24=2 so we needs 2 bits to represent four option
For ADP We 128 status bit ∴ log2128=7 so we needs 7 bits to represent128 different memory location,

Size of micro operation = F1 + F2 + F3 + CD + BR + ADF
Size of micro operation = 3 + 3 + 3 + 2 + 2 + 7
Size of micro operation = 20
Question 221 |
Maskable interrupt | |
Periodic interrupt | |
Division by zero | |
Synchronous interrupt |
Example: timer service that uses the system clock.
What is an Interrupt ?
Interrupt is a signal which has highest priority from hardware or software which processor should process its signal immediately.
Types of Interrupts:
Although interrupts have highest priority than other signals, there are many type of interrupts but basic type of interrupts are- Hardware Interrupts: If the signal for the processor is from external device or hardware is called hardware interrupts. Example: from keyboard we will press the key to do some action this pressing of key in keyboard will generate a signal which is given to the processor to do action, such interrupts are called hardware interrupts. Hardware interrupts can be classified into two types they are
- Maskable Interrupt: The hardware interrupts which can be delayed when a much highest priority interrupt has occurred to the processor.
- Non Maskable Interrupt: The hardware which cannot be delayed and should process by the processor immediately.
- Software Interrupts: Software interrupt can also divided in to two types. They are
- Normal Interrupts: the interrupts which are caused by the software instructions are called software instructions.
- Exception: unplanned interrupts while executing a program is called Exception. For example: while executing a program if we got a value which should be divided by zero is called a exception.
- Periodic Interrupt: If the interrupts occurred at fixed interval in timeline then that interrupts are called periodic interrupts
- Aperiodic Interrupt: If the occurrence of interrupt cannot be predicted then that interrupt is called aperiodic interrupt.
- Synchronous Interrupt: The source of interrupt is in phase to the system clock is called synchronous interrupt. In other words interrupts which are dependent on the system clock.
Example: timer service that uses the system clock. - Asynchronous Interrupts: If the interrupts are independent or not in phase to the system clock is called asynchronous interrupt
Question 222 |

Block address register and cache memory | |
Control address register and control memory | |
Branch register and cache memory | |
Control address register and random access memory |

Question 223 |
Addressing Mode | Location of Operand |
a. Implied | i . Registers which are in CPU |
b. Immediate | ii. Register specifies the address of the operand |
c. Register | iii. Specified in the register |
d. Register Indirect | iv. Specified implicitly in the definition of instruction |

A-(iv), b-(iii), c-(i), d-(ii) | |
A-(iv), b-(i), c-(iii), d-(ii) | |
A-(iv), b-(ii), c-(i), d-(iii) | |
A-(iv), b-(iii), c-(ii), d-(i) |
- In Implied Addressing Mode
location of operand specified implicitly in the definition of instruction
The instruction “Complement Accumulator” is an implied mode instruction. - In Immediate mode takes directly the value contained in a register in CPU...
- In Register Addressing Mode
The operand is contained in a register set.
The address field of the instruction refers to a CPU register that contains the operand. - In Register Indirect Addressing Mode
The address field of the instruction refers to a CPU register that contains the effective address of the operand.
Only one reference to memory is required to fetch the operand.
Question 224 |
–5 volts, +5 volts supply | |
+5 volts supply only | |
–5 volts supply only | |
5 MHz clock |
Question 225 |
LDAX rp | |
LHLD addr | |
LXI rp, data | |
INX rp |
- LDAX – Load accumulator indirect
This instruction copies the contents of that memory location into the accumulator. - LHLD – Load H and L register direct
This instruction loads the contents of the 16- bit memory location into the H and L register pair. - LXI – Load register pair immediate
The instruction loads 16-bit data in the register pair designated in the operand. - INX – Increment register pair by 1.
It will increment the register value by 1.
Question 226 |
32 | |
16 | |
8 | |
4 |
8086 microprocessor has 16 bit ALU.
Question 227 |
Status register | |
Interrupt service register | |
Interrupt mask register | |
Interrupt request register |
- Interrupt mask register: The register that stores the bits required to mask the interrupts
- Status register :The register that stores the bits required for Status
- Interrupt service register : The register that stores the bits required to service the interrupts
- Interrupt request register :The register that stores the bits required to request the interrupts
Question 228 |
HL = HL + HL?
DAD D | |
DAD H | |
DAD B | |
DAD SP |
rp = BC, DE, or HLIn this instruction HL register pair works as Accumulator. Because the 16-bit content of rp will be added with HL register pair content and sum thus produced will be stored back on to HL again.
DAD B means BC + HL --> HL.
DAD D means DE + HL -- HL
- DAD H will do HL = HL + HL;
- DAD B will do HL = HL + BC;
- DAD D will do HL = HL + DE;
Question 229 |
Register direct | |
Register indirect | |
Base indexed | |
Displacement |
- The address field of the instruction refers to a CPU register that contains the effective address of the operand.
- Only one reference to memory is required to fetch the operand.
ADD R will increment the value stored in the accumulator by the content of memory location specified in register R.
AC ← AC + [[R]]
- This addressing mode is similar to indirect addressing mode.
- The only difference is address field of the instruction refers to a CPU register.
Question 230 |
2 | |
3 | |
4 | |
5 |
Maskable Interrupts are those which can be disabled or ignored by the microprocessor. These interrupts are either edge-triggered or level-triggered, so they can be disabled. INTR, RST 7.5, RST 6.5, RST 5.5 are maskable interrupts in 8085 microprocessor.
Non-Maskable Interrupts are those which cannot be disabled or ignored by microprocessor. TRAP is a non-maskable interrupt. It consists of both level as well as edge triggering and is used in critical power failure conditions.
Question 231 |
DAD D | |
DAD H | |
DAD B | |
DAD SP |
rp = BC, DE, or HLIn this instruction HL register pair works as Accumulator. Because the 16-bit content of rp will be added with HL register pair content and sum thus produced will be stored back on to HL again.
DAD B means BC + HL --> HL.
DAD D means DE + HL -- HL
- DAD H will do HL = HL + HL;
- DAD B will do HL = HL + BC;
- DAD D will do HL = HL + DE;
Question 232 |
Interrupt mask register | |
Interrupt service register | |
Interrupt request register | |
Status register |
- Interrupt mask register: The register that stores the bits required to mask the interrupts
- Status register :The register that stores the bits required for Status
- Interrupt service register : The register that stores the bits required to service the interrupts
- Interrupt request register :The register that stores the bits required to request the interrupts
Question 233 |
Base indexed | |
Base indexed plus displacement | |
Indexed | |
Displacement |
- option(A) : Based Indexed Addressing: The operand’s offset is sum of the content of a base register BX or BP and an index register SI or DI.
- option(B) : Based Indexed plus displacement addressing mode: In this mode of addressing the operand’s offset is given by offset=[BX or BP]+[SI or DI]+8 bit or 16 bit displacement.
- option(C) : Indexed addressing mode: The operand’s offset is the sum of the content of an index register SI or DI and an 8 bit or 16 bit displacement.
- option(D) : Displacement addressing mode : Similar to index mode, except instead of a index register a base register will be used. Base register contains a pointer to a memory location. An integer (constant) is also referred to as a displacement. The address of the operand is obtained by adding the contents of the base register plus the constant. The difference between index mode and displacement mode is in the number of bits used to represent the constant. When the constant is represented a number of bits to access the memory, then we have index mode. Index mode is more appropriate for array accessing; displacement mode is more appropriate for structure (records) accessing.
- In this the contents of the indexed register is added to the Address part of the instruction, to obtain the effective address of operand. EA = A + (R),
- In this the address field holds two values, A(which is the base value) and R(that holds the displacement), or vice versa.
Question 234 |
Write through | |
Write back | |
Write protected | |
Direct mapping |
we solve this problem by using
- Write Through
- Write Back protocols
- In write through, data is simultaneously updated to cache and memory.
- This process is simpler and more reliable.
- This is used when there are no frequent writes to the cache(Number of write operation is less).
- The data is updated only in the cache and updated into the memory in later time
- Write Back is also known as Write Deferred.
- Write Back Uses Dirty Bity
Question 235 |
MVI B, 82H
MOV A, B
MOV C, A
MVI D, 37H
OUT PORT1
HLT
37H | |
82H | |
B9H | |
00H |
- MVI B, 82H
Move 82 value in hexadecimal to register B ∴ Now, B=82H - MOV A, B
Move B value(82 in hexa) to Accumulator A ∴ Now, A=82H - MOV C, A
Move Accumulator A value(82 in hexa) to Register C ∴ Now, C=82H - MVI D, 37H
Move immediate the value 37 in hexa to Register D ∴ Now, D=37H - OUT PORT1
Output the value of port1 i.e of Accumulator A Therefore 82 H will be the output - HLT Halt the computer
Question 236 |
RST 6.5 | |
RST 7.5 | |
TRAP | |
INTR |
Question 237 |
0.6% | |
0.12% | |
1.2% | |
2.5% |
Given Cycle stealing Mode
DMA controller transfers 32 bit words to memory
32 bit Word= 4 Bytes words
Device transmits 4800 character per second
4800 Bytes = 1 second(1 character=1 byte)
1 Byte = 1/4800 second
4 byte word it takes 4 * (1 / 4800) = 1 / 1200 sec.
So 1200 character will be transfered through cycle stealing mode
and it is given that CPU is fetching and executing instructions at an average rate of one million instructions per second.
% of slow down or cycle wasted % in DMA transfer = ( 1200 / 106) * 100
% of slow down or cycle wasted % in DMA transfer= ( 1200 / 1000000) * 100 = 0.12 %
Question 238 |
By checking interrupt register after execution of each instruction | |
By checking interrupt register at the end of the fetch cycle | |
Whenever an interrupt is registered | |
By checking interrupt register at regular time interval |
- INTR =0 // Interrupt is not present.
Ignore and go to next Instruction fetch from user program - INTR =1 // Interrupt is present.
Service the Interrupt
Question 239 |
What is the size of a page in KB in this computer?
2 | |
4 | |
8 | |
16 |

Question 240 |
CF = 0 or ZF = 0 | |
ZF = 0 and SF = 1 | |
CF = 0 and ZF = 0 | |
CF = 0 |
8086 Conditional jumps
Opcode | Description | CPU Flags |
---|---|---|
JA | Above | CF = 0 and ZF = 0 |
JAE | Above or equal | CF = 0 |
JB | Bellow | CF |
JBE | Bellow or equal | CF or ZF |
JC | Carry | CF |
JE | Equality | ZF |
JG | Greater(s) | ZF = 0 and SF = OF |
JGE | Greater of equal(s) | SF = OF |
JL | Less(s) | SF ≠ OF |
JLE | Less equal(s) | ZF or SF ≠ OF |
JNA | Not above | CF or ZF |
JNAE | Neither above nor equal | CF |
JNB | Not bellow | CF = 0 |
JNBE | Neither bellow nor equal | CF = 0 and ZF = 0 |
JNC | Not carry | CF = 0 |
JNE | Not equal | ZF = 0 |
JNG | Not greater | ZF or SF ≠ OF |
JNGE | Neither greater nor equal | SF ≠ OF |
JNL | Not less | SF = OF |
JNLE | Not less nor equal | ZF = 0 and SF = OF |
JNO | Not overflow | OF = 0 |
JNP | Not parity | PF = 0 |
JNS | Not negative | SF = 0 |
JNZ | Not zero | ZF = 0 |
JO | Overflow(s) | OF |
JP | Parity | PF |
JPE | Parity | PF |
JPO | Not parity | PF = 0 |
JS | Negative(s) | SF |
JZ | Null | ZF |
Question 241 |
3CH | |
34H | |
74H | |
24H |
- The trap is a non-maskable interrupt, having the highest priority among all interrupts. By default, it is enabled until it gets acknowledged i.e. whenever this pin gets activated, the 8085 always gets interrupted even if the state of 8085 is in DI. The input of Trap input is level sensitive and edge sensitive. Hence the Trapline always makes a transition from 0 to 1 and remains in state 1 until the end of the execution of an instruction for the interruption of 8085. In case of failure, it executes as ISR (Interrupt Service Routine) and sends the data to backup memory. This interrupt transfers the control to the location 0024H.
- These are maskable interrupts and are enabled under program control of two instructions:
- EI and SIM(Set Interrupt Mask ) :
