Computer Organization | Subject Wise

Computer Organization Subject-Wise

Question 1
Micro program is
A
The name of a source program in microcomputers
B
Set of micro instructions that define the individual operations in response to a machine-language instruction
C
A primitive form of macros used in assembly language programming
D
A very small segment of machine code
Question 1 Explanation: 
Microprogramming is a process of writing microcode for a microprocessor. Microcode is low-level code that defines how a microprocessor should function when it executes machine-language instructions. Typically, one machine language instruction translates into several microcode instruction, on some computers, the microcode is stored in ROM and can not be modified;

Reference : https://www.ques10.com/p/11119/what-is-microprogramming-draw-and-explain-micro--1/
Question 2
A particular disk unit uses a bit string to record the occupancy or vacancy of its tracks, with 0 denoting vacant and 1 for occupied. A 32-bit segment of this string has hexadecimal value D4FE2003. The percentage of occupied tracks for the corresponding part of the disk, to the nearest percentage is
A
12
B
25
C
38
D
44
Question 2 Explanation: 
Given Bit String: D4FE2003
converting in to Binary D4FE2003 = 1101 0100 1111 1110 0010 0000 0000 0011
Total bits = 32
Number of vacant tracks i.e. with value 0 = 18
Number of occupied tracks i.e. with value 1 =14
Thus Percentage occupied tracks = 14/32 * 100 = 43.75% ≃ 44%
so, Nearest percentage is 44%
Question 3
Of the following, which best characterizes computers that use memory-mapped I/O?
A
The computer provides special instructions for manipulating I/O ports
B
I/O ports are placed at addresses on the bus and are accessed just like other memory locations
C
To perform I/O operations, it is sufficient to place the data in an address register and call channel to perform the operation
D
I/O can be performed only when memory management hardware is turned on
Question 3 Explanation: 
  • Memory-mapped I/O uses the same address space to address both memory and I/O devices.
  • The memory and registers of the I/O devices are mapped to (associated with) address values.
  • So when an address is accessed by the CPU, it may refer to a portion of physical RAM, or it can instead refer to
  • memory of the I/O device. Thus, the CPU instructions used to access the memory can also be used for accessing devices.
  • Each I/O device monitors the CPU's address bus and responds to any CPU access of an address assigned to that device, connecting the data bus to the desired device's hardware register.
  • To accommodate the I/O devices, areas of the addresses used by the CPU must be reserved for I/O and must not be available for normal physical memory.
  • The reservation may be permanent, or temporary (as achieved via bank switching). An example of the latter is found in the Commodore 64, which uses a form of memory mapping to cause RAM or I/O hardware to appear in the 0xD000-0xDFFF range.
Reference : https://en.wikipedia.org/wiki/Memory-mapped_I/O
Question 4
A byte addressable computer has a memory capacity of 2m KB( kbytes ) and can perform 2n operations. An instruction involving 3 operands and one operator needs maximum of
A
3m bits
B
3m + n bits
C
M + n bits
D
3m + n + 30 bits
Question 4 Explanation: 
Give Memory capacity = 2m Kbytes  =2m + 210 bytes =2m+10 bytes (k can written as 210)
Therefore m+10 bits are required to represented the Whole memory
Similarly 2n operations can be represented by using n bits.
Now instruction form

So Instruction operator1,operator 2,operator 3. Will take 3m+30+n bits
Question 5
For a multiprocessor architecture, In which protocol a write transaction is forwarded to only those processors that are known to possess a copy of newly altered cache line ?
A
Snoopy bus protocol
B
Cache coherence protocol
C
Directory based protocol
D
None of the above
Question 5 Explanation: 
Question 6
A read bit can be read
A
And written by CPU
B
And written by peripheral
C
By peripheral and written by CPU
D
By CPU and written by the peripheral
Question 6 Explanation: 
When a user enter's a bit. CPU process the bit and it is written back by any of the output peripheral like screen or the printer.
Here, the peripheral refers to the output devices. The output devices may be a monitor, or pen drive or a disc.
Every peripheral device is controlled by writing and reading its registers
Question 7
The principal of the locality of reference justifies the use of
A
Virtual memory
B
Interrupts
C
Main memory
D
Cache memory
Question 7 Explanation: 
The Principle of Locality of Reference justifies the use of cache Memory.
In other words, Locality of Reference refers to the tendency of the computer program to access instructions whose addresses are near one another.

locality of reference. There are two ways with which data or instruction is fetched from main memory and get stored in cache memory. These two ways are the following:

Temporal Locality :
Temporal locality means current data or instruction that is being fetched may be needed soon.
In Temporal Locality The Least Recently Algorithm is Used (LRU)
Clustering in time: items referenced in the immediate past have a high probability of being re-referenced in the immediate future

Spatial Locality:
Spatial locality means instruction or data near to the current memory location that is being fetched, may be needed soon in the near future.
Clustering in space: items located physically near an item referenced in the immediate past have a high probability of being re-referenced in the immediate future  

Refer : https://www.cs.usask.ca/faculty/bunt/presentations/Locality.ppt 
Question 8
Assume that each character code consists of 8 bits. The number of characters that can be transmitted per second through an synchronous serial line at 2400 baud rate, and with two stop bits is
A
109
B
216
C
300
D
219
Question 8 Explanation: 
The baud rate is the rate at which information is transferred in a communication channel. Serial ports use two-level (binary) signaling, so the data rate in bits per second is equal to the symbol rate in bauds.
 Reference: https://en.wikipedia.org/wiki/Serial_port#Speed.
"2400 baud" means that the serial port is capable of transferring a maximum of 2400 bits per second."
So, transmission rate here = 2400 bps

For asynchronous communication we require start and stop bits,
Total bit per character = 8 bit data + 2 stop bit +1 start bit = 11 bits
no of characters = 2400/11 = 218.18
for transmitted characters we take floor i.e,. 218

For synchronous communication, we don't need start and stop bits.
Number of 8 bit characters that can be transmitted per second = 2400/8 = 300
Question 9
In the Big-Endian system, the computer stores ;
A
MSB of data in the lowest memory address of data unit
B
LSB of data in the lowest memory address of data unit
C
MSB of data in the highest memory address of data unit
D
LSB of data in the highest memory address of data uni
Question 9 Explanation: 
Big-endian and little-endian are terms that describe the order in which a sequence of bytes are stored in computer memory.
- A big-endian system stores the most significant byte of a word at the smallest memory address and the least significant byte at the largest.
- A little-endian system, in contrast, stores the least-significant byte at the smallest address.
Reference : https://en.wikipedia.org/wiki/Endianness#:~:text=A%20big%2Dendian%20system%20stores,sized%20groups%20of%20binary%20bits.
Question 10
The most appropriate matching for the following pairs
X: Indirect Addressing         1. Loop
Y: Immediate Addressing	       2. Pointers
Z: Auto Decrement Addressing   3. Constants
is
A
X − 3, Y − 2, Z −1
B
X − 2, Y − 3, Z −1
C
X − 3, Y −1, Z − 2
D
X − 2, Y −1, Z − 3
Question 10 Explanation: 
X: Indirect Addressing - Pointers
Y: Immediate Addressing - Constants
Z: Auto Decrement Addressing - Loop

Indirect  addressing mode the instruction does not have the address of the data to be operated on, but the instruction points where the address is stored(it is indirectly specifying the address of memory location where the data is stored or to be stored)

 immediate addressing mode the data is to be used is immediately given in instruction itself;so it deals with constant data.

Autodecrement addressing mode,  Before determining the effective address, the value in the base register is decremented by the size of the data item which is to be accessed.

Within a loop, this addressing mode can be used to step backwards through all the elements of an array or vector.
Question 11
Which interrupt in 8085 Microprocessor is unmaskable?
A
RST 5.5
B
RST 7.5
C
TRAP
D
Both (a) and (b)
Question 11 Explanation: 
There are five interrupt  signals TRAP,RST 7.5,RST 6.5,RST 5.5 and INTR.

Maskable Interrupts are those which can be disabled or ignored by the microprocessor. These interrupts are either edge-triggered or level-triggered, so they can be disabled. INTR, RST 7.5, RST 6.5, RST 5.5 are maskable interrupts in 8085 microprocessor.

Non-Maskable Interrupts are those which cannot be disabled or ignored by microprocessor. TRAP is a non-maskable interrupt. It consists of both level as well as edge triggering and is used in critical power failure conditions.
Question 12
A cache memory needs an access time of 30 ns and main memory 150 ns, what is the average access time of CPU (assume hit ratio = 80%)?
A
60
B
30
C
150
D
70
Question 12 Explanation: 
Given
Hit ratio of cache = 0.8
Cache Access Time = 30 ns
Memory Access Time = 150 ns
CPU Access Time = Cache Hit * Cache Access Time + (1 – Cache Hit)(Cache Access Time+ Memory Access Time)
CPU Access Time= 0.8 * 30 + 0.2 * (30 + 150) = 60 ns

Note : Effective Memory Access Time and Average Access Time both are same
Question 13
Which one of these is characteristic of RAID 5?
A
Dedicated Parity
B
Double Parity
C
Hamming code Parity
D
Distributed Parity
Question 13 Explanation: 
Raid level 5 is very similar to raid 0. The data is striped across all disks. Remember raid level 0 is not redundant. If you lose a disk, you lose your data. With raid level 5, things are a little different.

This level uses a concept called, distributed parity, to protect against a disk failure. If you lose any disk in a raid level 5 configuration, the surviving disks can continue to operate because of the parity. In raid 5 the the parity is distributed across all disks in the raid group.
Reference : https://www.what-is-my-computer.com/raid-5.html
Question 14
Consider a disk system with 100 cylinders. The request to access the cylinders occur in the following sequences
4, 34, 10, 7, 19, 73, 2, 15, 6, 20
Assuming the head is currently at cylinder 50, what is the time taken to satisfy all requests if it takes 1 ms to move from one cylinder to adjacent one and shortest seek time first algorithm is used.
A
95 msec
B
119 msec
C
233 msec
D
276 msec
Question 14 Explanation: 
Given Sequence:
4, 34, 10, 7, 19, 73, 2, 15, 6, 20

reload
Since shortest seek time first policy is used, head will first move to 34. This move will cause 16*1 ms. After 34, head will move to 20 which will cause 14*1 ms. And so on....
Head starts from cylinder 50, the order followed is : 34, 20, 19, 15, 10, 7, 6, 4, 2, 73
Total head movements incurred while servicing these requests
= (50 – 34) + (34 – 20) + (20 – 19) + (19 – 15) + (15 – 10) + (10 – 7) + (7 – 6) + (6 – 4) + (4 – 2) + (73 – 2)
= 16 + 14 + 1 + 4 + 5 + 3 + 1 + 2 + 2 + 71
= 119
Time taken for one head movement = 1 msec. So,
Time taken for 119 head movements = 119 x 1 msec = 119 msec
Question 15
The address space of 8086 CPU is
A
One Megabyte
B
256 Kilobytes
C
1 K Megabytes
D
64 Kilobytes
Question 15 Explanation: 
8086 Microprocessor is an enhanced version of 8085 Microprocessor that was designed by Intel in 1976. It is a 16-bit Microprocessor having 20 address lines and 16 data lines that provides up to 1MB storage
All internal registers, as well as internal and external data buses, are 16 bits wide, which firmly established the "16-bit microprocessor" identity of the 8086. A 20-bit external address bus provides a 1 MB physical address space (2^20 = 1,048,576).

Therefore 16 bit data lines and 20 address lines.
20 lines means 220 byte = 1 mega byte
Question 16
The performance of a pipelined processor suffers if
A
The pipeline stages have different delays
B
Consecutive instructions are dependent on each other
C
The pipeline stages share hardware resources
D
All of the above
Question 16 Explanation: 
Pipelining is a method to execute a program breaking it in several independent sequence of stages
  • Option(A) True
    Total delay will be Max (All delays) + Register Delay.
  • Option(B) True
    If data forwarding is not there then
    Example:
    SUB R9,R4,R5
    ADD R6,R9,R4 //Register R9 result will be dependent on first instruction.
  • Option(C) True
    ID and EX shares ID/EX register.
Question 17
More than one word are put in one cache block to
A
Exploit the temporal locality of reference in a program
B
Exploit the spatial locality of reference in a program
C
Reduce the miss penalty
D
None of these
Question 17 Explanation: 
Temporal locality refers to the reuse of specific data and/or resources within relatively small time durations.
Spatial locality refers to the use of data elements within relatively close storage locations.
To exploit the spatial locality, more than one word are put into cache block.
References: http://en.wikipedia.org/wiki/Locality_of_reference

The Principle of Locality of Reference justifies the use of cache Memory.
In other words, Locality of Reference refers to the tendency of the computer program to access instructions whose addresses are near one another.

locality of reference. There are two ways with which data or instruction is fetched from main memory and get stored in cache memory. These two ways are the following:

Temporal Locality :
Temporal locality means current data or instruction that is being fetched may be needed soon.
In Temporal Locality The Least Recently Algorithm is Used (LRU)
Clustering in time: items referenced in the immediate past have a high probability of being re-referenced in the immediate future

Spatial Locality:
Spatial locality means instruction or data near to the current memory location that is being fetched, may be needed soon in the near future.
Increasing the block size of the cache comes under this
Clustering in space: items located physically near an item referenced in the immediate past have a high probability of being re-referenced in the immediate future  

Refer : https://www.cs.usask.ca/faculty/bunt/presentations/Locality.ppt 
Question 18
An interrupt in which the external device supplies its address as well as the interrupt requests is known as
A
Vectored interrupt
B
Maskable interrupt
C
Non-maskable interrupt
D
Designated interrupt
Question 18 Explanation: 
A vectored interrupt is an I/O interrupt that tells the computer that handles I/O interrupts at the hardware level that a request for attention from an I/O device has been received and and also identifies the device that sent the request.
I/O interruption that informs the portion of the machine that manages device-level I/O interrupts that such a demand for action has already been provided from a device as well as defines the machine that sent the application.
Reference : https://en.wikipedia.org/wiki/Vectored_Interrupt
Question 19
Consider the following Assembly language program
MVI A   30 H
ACI 30 H
XRA A
POP H
After the execution of the above program, the contents of the accumulator will
A
30 H
B
60 H
C
00 H
D
Contents of stack
Question 19 Explanation: 
Assume Accumulator is 8 bit
MVI : Move Immediate data to a register or memory location.
ACI : Add immediate to accumulator with carry.
XRA : The content of accumulator are exclusive OR with specified register or memory location

In 1st instruction execution then the value of Accumulator is
A = 30H = 0011 0000
In 2nd instruction execution then the value of Accumulator is
A = 30+30 = 60H = 0110 0000
In 3rd instruction execution then the value of Accumulator is
A = A⊕A = 0110 0000 ⊕ 0110 0000 = 0000 0000 = 00H

Execution of the last instruction has no effect on the contents of Accumulator. Thereby, the answer remains the same because
In 8085 microprocessor, POP H is interpreted as:
Content at the memory location pointed stack pointer is copied into register pair specified in instruction operand field i.e, HL pair in this case.
Question 20
Which of the following architecture is/are not suitable for realising SIMD ?
A
Vector processor
B
Array processor
C
Von Neumann
D
All of the above
Question 20 Explanation: 
Single Instruction, Multiple Data (SIMD) units refer to hardware components that perform the same operation on multiple data operands concurrently. Typically, a SIMD unit receives as input two vectors (each one with a set of operands), performs the same operation on both sets of operands (one operand from each vector), and outputs a vector with the results.

Reference : https://www.sciencedirect.com/topics/computer-science/single-instruction-multiple-data

See Why : https://www.quora.com/What-computers-do-not-use-a-von-Neumann-architecture

What is SIMD : https://www.quora.com/What-is-SIMD
Question 21
The device which is used to connect a peripheral to bus is known as
A
Control register
B
Interface
C
Communication protocol
D
None of these
Question 21 Explanation: 
--A control register is a processor register which changes or controls the general behavior of a CPU or other digital device. Common tasks performed by control registers include interrupt control, switching the addressing mode, paging control, and coprocessor control.
Reference : https://en.wikipedia.org/wiki/Control_register

--Interface is a device which is used to connect a peripheral devices to bus.


--A communication protocol is a system of rules that allow two or more entities of a communications system to transmit information via any kind of variation of a physical quantity. The protocol defines the rules, syntax, semantics and synchronization of communication and possible error recovery methods. Protocols may be implemented by hardware, software, or a combination of both.
Reference : https://en.wikipedia.org/wiki/Communication_protocol#:~:text=A%20communication%20protocol%20is%20a,and%20possible%20error%20recovery%20methods.
Question 22
The TRAP is one of the interrupts available in INTEL 8085. Which one of the following statements is true of TRAP ?
A
It is level triggered
B
It is negative edge triggered
C
It is +ve edge triggered
D
It is both +ve and -ve edges triggered
Question 22 Explanation: 
There are five interrupt  signals TRAP,RST 7.5,RST 6.5,RST 5.5 and INTR.

Maskable Interrupts are those which can be disabled or ignored by the microprocessor. These interrupts are either edge-triggered or level-triggered, so they can be disabled. INTR, RST 7.5, RST 6.5, RST 5.5 are maskable interrupts in 8085 microprocessor.

Non-Maskable Interrupts are those which cannot be disabled or ignored by microprocessor. TRAP is a non-maskable interrupt. It consists of both level as well as edge triggering and is used in critical power failure conditions.
Question 23
The Memory Address Register
A
Is a hardware memory device which denotes the location of the current instruction being executed.
B
Is a group of electrical circuit, that performs the intent of instructions fetched from memory
C
Contains the address of the memory location that is to be read from or stored into
D
Contains a copy of the designated memory location specified by the MAR after a “read” or the new contents of the memory prior to a “write”
Question 23 Explanation: 
Memory Address Register (MAR) holds the memory location of data that needs to be accessed. When reading from memory, data addressed by MAR is fed into the MDR (memory data register) and then used by the CPU. When writing to memory, the CPU writes data from MDR to the memory location whose address is stored in MAR. MAR, which is found inside the CPU, goes either to the RAM (random access memory) or cache. The memory address register is half of a minimal interface between a microprogram and computer storage; the other half is a memory data register. In general, MAR is a parallel load register that contains the next memory address to be manipulated. For example, the next address to be read or written.

Reference : https://en.wikipedia.org/wiki/Memory_address_register
Question 24
Which of the following is/are true of the auto-increment addressing mode?
I. It is useful in creating self-relocating code
II. If it is included in an Instruction Set Architecture, then an additional ALU is required for effective address calculation
III. The amount of increment depends on the size of the data item accessed
A
I only
B
II only
C
III only
D
II and III only
Question 24 Explanation: 
  • Self reallocating code required for Displacement Addressing Mode. Auto Increment is useful for Array implementation
  • In Auto increment/decrement Addressing Mode , Register will be automatically incremented or decremented So, ALU is required. But additional ALU is not required.
  • For incrementing the data, the auto-increment addressing mode is used which purely depends on the size of the data.  In Auto increment mode automatically increments the contents of a register by a value that corresponds to the size of the accessed operand. Thus , the increment is 1 for byte-sized operands, 2 for 16-bit operands, and 4 for 32-bit operands. The size of the operand is usually specified as part of the operation code of an instruction.
Question 25
In which addressing mode, the effective address of the operand is generated by adding a constant value to the content of a register?
A
Absolute mode
B
Indirect mode
C
Immediate mode
D
Index mode
Question 25 Explanation: 
In Index mode addressing mode, the effective address of the operand is generated by adding a constant value to the contents of a register. The address of the operand is obtained by adding to the contents of the general register (called index register) a constant value. The number of the index register and the constant value are included in the instruction code. Index Mode is used to access an array whose elements are in successive memory locations. The content of the instruction code, represents the starting address of the array and the value of the index register, and the index value of the current element. By incrementing or decrementing index register different element of the array can be accessed. The term addressing modes refers to the way in which the operand of an instruction is specified. Information contained in the instruction code is the value of the operand or the address of the result/operand.
Question 26
A certain microprocessor requires 4.5 microseconds to respond to an interrupt. Assuming that the three interrupts I1, I2 and I3 require the following execution time after the interrupt is recognized:
i. I1 requires 25 microseconds
ii. I2 requires 35 microseconds
iii. I3 requires 20 microseconds

I1 has the highest priority and I3 has the lowest. What is the possible range of time for I3 to be executed assuming that it may or may not occur simultaneously with other interrupts?
A
24.5 microseconds to 39.5 microseconds
B
24.5 microseconds to 93.5 microseconds
C
4.5 microseconds to 24.5 microseconds
D
29.5 microseconds 93.5 microseconds
Question 26 Explanation: 
Case 1 : If I3 is executed assuming without other interrupts(Min Time required ):
Time interval = Interrupt Response time + Execution time
Time interval= 4.5 + 20 = 24.5 microseconds

Case 2 : If I3 is executed simultaneously with other interrupts(Max Time required):
All instructions are present.
Time interval = Interrupt Response time + Execution time for I1, I2, I3
Time interval=I1+I2+I3 ={(4.5+25) +(4.5+35) +(4.5+20) } =93.5
So possible range of I3 24.5 microsecond to 93.5 microsecond .
Question 27
The process of organizing the memory into two banks to allow 8 and 16-bit data operation is called
A
Bank switching
B
Indexed mapping
C
Two Way memory interleaving
D
Memory segmentation
Question 27 Explanation: 
It is a technique for compensating the relatively slow speed of DRAM(Dynamic RAM). In this technique, the main memory is divided into memory banks which can be accessed individually without any dependency on the other.

In interleaved memory, memory addresses are allocated to separate memory banks. In an interleaved system with two memory banks (assuming word-addressable memory), if some logical address belongs to bank 0, then the consecutive logical address would belong to bank 1, next logical would again belong to bank 0, and so on.

An interleaved memory is said to be n-way interleaved when there are n banks and memory location i resides in bank i mod n.

2-Way Interleaved
Two memory blocks are accessed at same time for writing and reading operations. So, organizing the memory into two banks would be termed as Two-way memory interleaving.
Question 28
The Microinstructions stored in the control memory of a processor have a width of 26 bits. Each micro instruction is divided into three fields. a micro operation field of 13 bits, a next address field (X), and a MUX select field (Y). There are 8 status bits in the inputs of the MUX. How many bits are there in the X and Y fields, and what is the size of the control memory in number of words
A
10, 3, 1024
B
8, 5, 256
C
5, 8, 2048
D
10, 3, 512
Question 28 Explanation: 
It means that we have 8 inputs to the MUX so it is 8:1 MUX and therefore it require 3 select inputs.
Which makes Y = 3.
Number  of bits in control memory =26
Number  of bits in control memory next address field=26-13-3 =10
10 bit addressing .we have 210=1024 memory size
So X,Y size=10,3
Question 29
A CPU has 24-bit instructions. A program starts at address 300 (in decimal). Which one of the following is a legal program counter (all values in decimal)?
A
400
B
500
C
600
D
700
Question 29 Explanation: 
Each address is multiple of 3 as the starting address is 300 and is each instruction consists of 24 bit, i.e., 3 byte.

Size of instruction = 24/8 = 3 bytes.

Program Counter can shift 3 bytes at a time to jump to next instruction.

Thus, in the given options the valid counter will be the one which is the multiple of 3.only 600 is satisfied.
Question 30
Consider a disk pack with 16 surfaces, 128 tracks per surface and 256 sectors per track. 512 bytes of data are stored in a bit serial manner in a sector. The capacity of the disk pack and the number of bits required to specify a particular sector in the disk are respectively
A
256 Mbyte, 19 bits
B
256 Mbyte, 28 bit
C
512 Mbyte, 20 bits
D
64 Gbyte, 28 bits
Question 30 Explanation: 
Given
N.o of surfaces = 16
N.o of tracks per surface = 128
N.o of sectors per track = 256
N.o of bytes per sector = 512 bytes

Capacity of disk pack = (Total number of surfaces * Number of tracks per surface * Number of sectors per track * Number of bytes per sector)
= 16 * 128 * 256 * 512 bytes
= 228 bytes
= 28 * 220 bytes
= 256 MB

  Total number of sectors = (Total number of surfaces * Number of tracks per surface * Number of sectors per track)
= 16 * 128 * 256 sectors
= 219 sectors
So, We require 19 bits to address the sector
Question 31
Which of the following statements about relative addressing mode is FALSE?
A
It enables reduced instruction size
B
It allows indexing of array element with same instruction
C
It enables easy relocation of data
D
It enables faster address calculation than absolute addressing
Question 31 Explanation: 
  • Relative addressing cannot be faster than absolute addressing as absolute address must be calculated from relative address.
  • Absolute addresses are directly available in the Instruction address field itself so there is no need to calculate the Effective Address of operand
  • Relative addressing mode we need to calculate the Effective Address by adding some relative value to the PC so it requires some calculation so it is slower than absolute addressing
Question 32
On receiving an interrupt from an I/O device,the CPU
A
Halts for a predetermined time
B
Branches off to the interrupt service routine after completion of the current instruction
C
Branches off to the interrupt service routine immediately
D
Hands over control of address bus and data bus to the interrupting device
Question 32 Explanation: 
  • CPU continuously checks the status bit of interrupt at the completion of each current instruction running when there is a interrupt it service the interrupt using Interrupt Service Routine (ISR)
  • An interrupt service routine (ISR) is a software routine that hardware invokes in response to an interrupt. ISR examines an interrupt and determines how to handle it executes the handling, and then returns a logical interrupt value. If no further handling is required the ISR notifies the kernel with a return value. An ISR must perform very quickly to avoid slowing down the operation of the device and the operation of all lower-priority ISRs.
Question 33
Compared to CISC processors,RISC processors contain:
A
More registers and smaller instruction set
B
Larger instruction set
C
Less registers and smaller instruction set
D
More transistor elements
Question 33 Explanation: 
CISC RISC
Focus on software Focus on hardware
Uses only Hardwired control unit Uses both hardwired and micro programmed control unit
Transistors are used for more registers Transistors are used for storing complex Instructions
Fixed sized instructions Variable sized instructions
Can perform only Register to Register Arthmetic operations Can perform REG to REG or REG to MEM or MEM to MEM
Requires more number of registers Requires less number of registers
Code size is large Code size is small
A instruction execute in single clock cycle Instruction take more than one clock cycle
A instruction fit in one word Instruction are larger than size of one word
A large number of instructions are present in the architecture. Very fewer instructions are present. The number of instructions are generally less than 100.
Some instructions with long execution times. These include instructions that copy an entire block from one part of memory to another and others that copy multiple registers to and from memory. No instruction with a long execution time due to very simple instruction set. Some early RISC machines did not even have an integer multiply instruction, requiring compilers to implement multiplication as a sequence of additions.
Variable-length encodings of the instructions. Example: IA32 instruction size can range from 1 to 15 bytes. Fixed-length encodings of the instructions are used. Example: In IA32, generally all instructions are encoded as 4 bytes.
Multiple formats are supported for specifying operands. A memory operand specifier can have many different combinations of displacement, base and index registers. Simple addressing formats are supported. Only base and displacement addressing is allowed.
CISC supports array. RISC does not supports array.
Arithmetic and logical operations can be applied to both memory and register operands. Arithmetic and logical operations only use register operands. Memory referencing is only allowed by load and store instructions, i.e. reading from memory into a register and writing from a register to memory respectively.
Implementation programs are hidden from machine level programs. The ISA provides a clean abstraction between programs and how they get executed. Implementation programs exposed to machine level programs. Few RISC machines do not allow specific instruction sequences.
Condition codes are used. No condition codes are used.
The stack is being used for procedure arguments and return addresses. Registers are being used for procedure arguments and return addresses. Memory references can be avoided by some procedures.  
Question 34
Which of the following statements about synchronous and asynchronous I/O is NOT true?
A
An ISR is invoked on completion of I/O in synchronous I/O but not in asynchronous I/O
B
In both synchronous and asynchronous I/O, an ISR (Interrupt Service Routine) is invoked after completion of the I/O
C
A process making a synchronous I/O call waits until I/O is complete, but a process making an asynchronous I/O call does not wait for completion of the I/O
D
In the case of synchronous I/O, the process waiting for the completion of I/O is woken up by the ISR that is invoked after the completion of I/O
Question 34 Explanation: 
In synchronous I/O process performing I/O operation will be placed in blocked state till the I/O operation is completed. An ISR will be invoked after the completion of I/O operation and it will place process from block state to ready state.

In asynchronous I/O, a process need not stay in the blocked state until the I/O is complete. It can place a request for I/O to the kernel, and resume with the execution. After the I/O operation is completed, a signal is directed to the process notifying the completion.
Question 35
Consider a pipelined processor with the following four stages:
IF: Instruction Fetch
ID: Instruction Decode and Operand Fetch
EX: Execute
WB: Write Back

The IF, ID and WB stages take one clock cycle each to complete the operation. The number of clock cycles for the EX stage depends on the instruction. The ADD and SUB instructions need 1 clock cycle and the MUL instruction needs 3 clock cycles in the EX stage. Operand forwarding is used in the pipelined processor. What is the number of clock cycles taken to complete the following sequence of instructions?
ADD   R2, R1, R0    R2 ← R1 + R0
MUL   R4, R3, R2    R4 ← R3 * R2
SUB   R6, R5, R4    R6 ← R5 - R4

A
7
B
8
C
10
D
14
Question 35 Explanation: 
Order of instruction cycle phases
IF ID EX WB
There will be operand forwarding between first and second instructions and 2nd and 3rd instructions
reload
Total No. of cycles required =8
Question 36
Consider a non-pipelined processor with a clock rate of 2.5 gigahertz and average cycles per instruction of 4. The same processor is upgraded to a pipelined processor with five stages; but due to the internal pipeline delay, the clock speed is reduced to 2 gigahertz. Assume that there are no stalls in the pipeline. The speedup achieved in this pipelined processor is
A
3.2
B
3.0
C
2.2
D
2.0
Question 36 Explanation: 
Cycle Time in Non-Pipelined Processor 
Frequency of the clock = 2.5 gigahertz
Cycle time = 1 / frequency
Cycle time= 1 / (2.5 gigahertz)
Cycle time= 1 / (2.5 x 109 hertz)
Cycle time= 0.4 ns

Non-pipeline execution time to process 1 instruction = Number of clock cycles taken to execute one instruction
1 Instruction Execution Time = 4 clock cycles
1 Instruction Execution Time = 4 x 0.4 ns
1 Instruction Execution Time = 1.6 ns

  Cycle Time in Pipelined Processor :  
Frequency of the clock = 2 gigahertz
Cycle time Cycle time= 1 / frequency
Cycle time= 1 / (2 gigahertz)
Cycle time= 1 / (2 x 109 hertz)
Cycle time= 0.5 ns

  Pipeline Execution Time : Since there are no stalls in the pipeline, so ideally one instruction is executed per clock cycle. So,
Pipeline execution time
= 1 clock cycle
= 0.5 ns
Speed up  = ( Non-pipeline execution time / Pipeline execution time )
= 1.6 ns / 0.5 ns
= 3.2
Question 37
Consider a disk pack with 16 surfaces, 128 tracks per surface and 256 sectors per track. 512 bytes of data are stored in a bit serial manner in a sector. The capacity of the disk pack and the number of bits required to specify a particular sector in the disk are respectively:
A
256 Mbyte, 19 bits
B
256 Mbyte, 21 bits
C
512 Mbyte, 20 bits
D
64 GB, 28 bits
Question 37 Explanation: 
Given
N.o of surfaces = 16
N.o of tracks per surface = 128
N.o of sectors per track = 256
N.o of bytes per sector = 512 bytes

Capacity of disk pack = (Total number of surfaces * Number of tracks per surface * Number of sectors per track * Number of bytes per sector)
= 16 * 128 * 256 * 512 bytes
= 228 bytes
= 28 * 220 bytes
= 256 MB

  Total number of sectors = (Total number of surfaces * Number of tracks per surface * Number of sectors per track)
= 16 * 128 * 256 sectors
= 219 sectors
So, We require 19 bits to address the sector
Question 38
Register renaming is done in pipelined processors
A
As an alternative to register allocation at compile time
B
For efficient access to function parameters and local variables
C
To handle certain kinds of hazards
D
As part of address translation
Question 38 Explanation: 
Register renaming is done to avoid WAR (Write after Read) and WAW (Write after Write) data hazards.
Refer this link for more information : https://en.wikipedia.org/wiki/Register_renaming
Question 39
In which class of Flynn’s taxonomy, Von Neumann architecture belongs to?
A
SISD
B
SIMD
C
MIMD
D
MISD
Question 39 Explanation: 
SISD (single instruction stream, single data stream) is a computer architecture in which a single uni-core processor executes a single instruction stream, to operate on data stored in a single memory. This corresponds to the von Neumann architecture.

SISD is one of the four main classifications as defined in Flynn's taxonomy.

Reference : https://en.wikipedia.org/wiki/SISD#:~:text=This%20corresponds%20to%20the%20von,present%20in%20the%20computer%20architecture.
Question 40
Relative mode of addressing is most relevant to writing
A
Coroutines
B
Position-independent code
C
Shareable code
D
Interrupt Handlers
Question 40 Explanation: 
Relative Addressing Mode
  • Relative mode addressing is most relevant to writing a position-independent code i.e. Program Relocation at run time
  • To change the normal sequence of execution of instructions
  • For branch type instructions since it directly updates the program counter
Question 41
Consider a system with 2 level cache. Access times of Level 1 cache, Level 2 cache and main memory are 1 ns, 10 ns, and 500 ns, respectively. The hit rates of Level 1 and Level 2 caches are 0.8 and 0.9, respectively. What is the average access time of the system ignoring the search time within the cache?
A
13.0
B
12.8
C
12.6
D
12.4
Question 41 Explanation: 
Average access time = [ H1*T1]+[(1-H1)*H2*T2]+[ (1-H1)(1-H2)*Hm*Tm ]

where,

H1 = Hit rate of level 1 cache = 0.8
T1 = Access time for level 1 cache = 1 ns
H2 = Hit rate of level 2 cache = 0.9
T2 = Access time for level 2 cache = 10 ns
Hm = Hit rate of Main Memory = 1
Tm = Access time for Main Memory = 500 ns

Average Access Time   = ( 0.8 * 1 ) + ( 0.2 * 0.9 * 10 ) + ( 0.2 * 0.1 * 1 * 500) = 0.8 + 1.8 + 10

So, Average Access Time= 12.6 ns
Question 42
MOV [BX], AL type of data addressing is called ?
A
Register
B
Immediate
C
Register indirect
D
Register relative
Question 42 Explanation: 
We have to transfer contents of AL to memory location whose address is in BX

Let Register BX content is 202020 // Memory Location

Register AL content is 20

Effective Address EA =[BX] = 202020 // Content of Register BX

so AL contents 20 is moved to memory location 202020

This is an example of Register Indirect Addressing Mode
Question 43
Two control signals in microprocessor which are related to Direct Memory Access (DMA) are
A
INTR & INTA
B
RD & WR
C
S0 & S1
D
HOLD & HLDA
Question 43 Explanation: 

Basic DMA operation
  • The direct memory access (DMA) I/O technique provides direct access to the memory while the microprocessor is temporarily disabled.
  • A DMA controller temporarily borrows the address bus, data bus, and control bus from the microprocessor and transfers the data bytes directly between an I/O port and a series of memory locations.
  •  The DMA transfer is also used to do high-speed memory-to memory transfers.
  • Two control signals are used to request and acknowledge  a DMA transfer in the microprocessor-based system.
  • The HOLD signal is a bus request signal which asks the microprocessor to release control of the buses after the current bus cycle.
  •  The HLDA signal is a bus grant signal which indicates that the microprocessor has indeed released control of its buses by placing the buses at their high-impedance states.
  •  The HOLD input has a higher priority than the INTR or NMI interrupt inputs.

Refer : http://www.unife.it/ing/lm.infoauto/sistemi-elaborazione/dispense/csf04_12.pdf
Question 44
If a microcomputer operates at 5 MHz with an 8-bit bus and a newer version operates at 20 MHz with a 32-bit bus, the maximum speed-up possible approximately will be
A
2
B
4
C
8
D
16
Question 44 Explanation: 
First version: 5Mhz processor and 8-bit bus.

Second version: 20Mhz processor and 32-bit bus.

The second version is the best as compared to first version because second version has both high bandwidth as well as increased CPU speed
Increasing the bandwidth aids in achieving the maximum speed up.

max(20/5, 32/8) = 4

Hence we will take the maximum of these speedups which is 4.
Question 45
The search concept used in associative memory is
A
Parallel search
B
Sequential search
C
Binary search
D
Selection search
Question 45 Explanation: 
  • Associative memory is suitable for parallel searches and is used where search time needs to be minimized
  • In  K-way associativity we have k comparators which compares the tag bits of 'k' blocks in parallel.
Question 46
In a DMA transfer scheme, the transfer scheme other than burst mode is
A
Cycle technique
B
Stealing technique
C
Cycle stealing technique
D
Cycle bypass technique
Question 46 Explanation: 
DMA performs data transfer operation. The different DMA transfer modes are as follows:
1) Burst or block transfer DMA
2) Cycle steal or single byte transfer DMA.
3) Transparent or hidden DMA.

1) Burst or block transfer DMA
  • It is the fastest DMA mode. In this two or more data bytes are transferred continuously.
  • Processor is disconnected from system bus during DMA transfer. N number of machine cycles are adopted into the machine cycles of the processor where N is the number of bytes to be transferred.
  • DMA sends HOLD signal to processor to request for system bus and waits for HLDA signal.
  • After receiving HLDA signal, DMA gains control of system bus and transfers one byte. After transferring one byte, it increments memory address, decrements counter and transfers next byte.
  • In this way, it transfer all data bytes between memory and I/O devices. After transferring all data bytes, the DMA controller disables HOLD signal & enters into slave mode.
2) Cycle steal or single byte transfer DMA.
  • In this mode only one byte is transferred at a time. This is slower than burst DMA.
  • DMA sends HOLD signal to processor and waits for HLDA signal on receiving HLDA signal, it gains control of system bus and executes only one DMA cycle.
  • After transfer one byte, it disables HOLD signal and enters into slave mode.
  • Processor gains control of system bus and executes next machine cycle. If count is not zero and data is available then the DMA controller sends HOLD signal to the processor and transfer next byte of data block.
3) Transparent or Hidden DMA transfer
  • Processor executes some states during which is floats the address and data buses. During this process, processor is isolated from the system bus.
  • DMA transfers data between memory and I/O devices during these states. This operation is transparent to the processor.
  • This is slowest DMA transfer. In this mode, the instruction execution speed of processor is not reduced. But, the transparent DMA requires logic to detect the states when the processor is floating the buses
Reference : https://www.ques10.com/p/11180/explain-various-dma-transfer-modes-in-brief-with-1/
Question 47
Consider a direct mapped cache with 64 blocks and a block size of 16 bytes. To what block number does the byte address 1206 map to
A
Does not map
B
6
C
11
D
54
Question 47 Explanation: 
Given
Total No of Block = 64
Block size = 16 B

Memory Block Number = Byte Address / Block size
= 1206/16 = 75
Given byte address 1206 is a part of 75th block in Main Memory.

Now we have to find a cache block number where it Map to memory block number.

Cache block number = (Memory block number) mod (number of blocks in cache)
= 75 mod 16
= 11
Question 48
A processor takes 12 cycles to complete an instruction I. The corresponding pipelined processor uses 6 stages with the execution times of 3, 2, 5, 4, 6 and 2 cycles respectively. What is the asymptotic speedup assuming that a very large number of instructions are to be executed?
A
1.83
B
2
C
3
D
6
Question 48 Explanation: 

Speed Up= Time without Pipeline / Time with Pipeline

For non pipeline processor,
It takes, 12 cycles to complete 1 instruction
So, for n instructions it will take 12n cycle

Time required in a pipelined processor = (k + n - 1) tp
where, k = number of stages in pipeline unit.
n = number of instructions
tp = execution time unit(take maximum time in all stages i.e, 6 will the maximum in this case )

So, Speed Up = Time without Pipeline / Time with Pipeline
= 12n / (6 + n - 1)6
= 12n /(n + 5)6
= 12n /6n
= 2
Question 49
Find the memory address of the next instruction executed by the microprocessor (8086), when operated in real mode for CS=1000 and IP=E000
A
10E00
B
1E000
C
F000
D
1000E
Question 49 Explanation: 
Given
   Segment base (CS) = 0x1000
   Offset (IP) = 0xE000

In 8086 the address bus is 20 bit, The address is generated by using segment base and offset.
it means Address = segment * 0x10 + Offset (Here segment is multiplied by 10h)

Address= segment*0x10+offset
Address=CS*0x10+IP =0x1000*0x10+0xe000
Thus Address =0x1E000

option(b) is the correct answer
Refer: https://books.google.co.in/books?id=t9
Question 50
How many number of times the instruction sequence below will loop before coming out of the loop?
A1:  MOV AL, 00H
     INC AL
     JNZ A1
A
1
B
255
C
256
D
Will not come out of the loop
Question 50 Explanation: 
JNZ instruction means Jump if ZF = 0  i.e. if accumulator is not empty. AL will contain 0000 0000, on incrementing it will be 0000 0001 and so on. It is a 8-bit register so maximum it can hold value = 28 = 256. After this accumulator will get overflow and it becomes 0. So, Loop will continue for 256 times.
Question 51
How much speed do we gain by using the cache, when cache is used 80% of the time? Assume cache is faster than main memory
A
5.27
B
2.00
C
4.16
D
6.09
Question 51 Explanation: 
Assumption : "Cache is faster than main memory" is not sufficient to answer this question precisely. It should be given that "Cache is how many times faster than the main memory".

So I am Assume Cache is faster than memory by at least 10 times

However with the given information we can guarantee that speed up has to be strictly less than 5.

We first access Cache memory and Main memory is accessed only on a cache miss

Speed Gain = [ (Memory Access Time without Cache) / (Memory Access Time with Cache) ]
where
Tm = Memory Access Time
Tc  = Cache Access Time

Speed Gain = (Tm) / (Tc + 0.20*Tm)
Speed Gain = [ (1) / ( (Tc/Tm) + 0.20 ) ]

Let (Tc/Tm) = x, 0 < x ≤ 0.1 ( Since cache (say last level cache) is faster than memory by at least 10 times (10 times because otherwise there is not much advantage of using a cache))

Speed Gain = [ (1) / ( (x) + 0.20 ) ]
3.33 ≤ Speed Gain < 5
Question 52
A pipeline P operating at 400 MHz has a speedup factor of 6 and operating at 70% efficiency. How many stages are there in the pipeline?
A
5
B
6
C
8
D
9
Question 52 Explanation: 
Given
Speedup factor = 6
Efficiency = 70% (0.7)

Efficiency Formula :
Efficiency = Speedup factor / Number of stages
0.7 = 6 / No. of stages
No. of stages = 8.56 = 9
Question 53
A processor is fetching instructions at the rate of 1 MIPS. A DMA module is used to transfer characters to RAM from a device transmitting at 9600 bps. How much time will the processor be slowed down due to DMA activity?
A
9.6 ms
B
4.8 ms
C
2.4 ms
D
1.2 ms
Question 53 Explanation: 
DMA usually operates in Cycle Stealing Mode, where it transfers 1 byte per cycle. // Default assumption.

Given DMA module transferring characters at = 9600 bps = 9600/8 Bps = 1200 Bytes per sec

Processor is fetching instructions at the rate = 1 MIPS (million instruction per second) = 106

So time will the processor be slowed down due to DMA activity =  = 1200/106 = 12*1000/104 ms  = 1.2 ms
Question 54
Consider a 33 MHz CPU based system. What is the number of wait states required if it is interfaced with a 60 ns memory? Assume a maximum of 10 ns delay for additional circuitry like buffering and decoding.
A
0
B
1
C
2
D
3
Question 54 Explanation: 
wait state is a delay experienced by a computer processor when accessing external memory or another device that is slow to respond.

Total Memory access time is 60 ns + 10ns = 70 ns

CPU frequency is 33 MHz means 1 clock time is 1 / (33*106) = .03030 * 10-6 sec = 30.30 ns

Number of wait states = No. of clocks to need = 70 ns / 30.30 ns = 2.31  ≈ 3

  So no. of wait states 3.

Reference: https://en.wikipedia.org/wiki/Wait_state
Question 55
There are 200 tracks on a disc platter and the pending requests have come in the order –
36, 69, 167, 76, 42, 51, 126, 12 and 199.
Assume the arm is located at the 100th track and moving towards track 199. If the sequence of disc access is 126, 167, 199, 12, 36, 42, 51, 69 and 76 then which disc access scheduling policy is used?
A
Elevator
B
Shortest seek-time first
C
C-SCAN
D
First Come First Served
Question 55 Explanation: 
C-SCAN because it has been started from 100th and serving all the right hand side request till the last point then reverse the direction and starts from track 0 to serve further request.


In above diagram starts from 100, 126,167, and after reaching 199, without servicing any request during return it will reach initially, then it start servicing requests on the way from 0 (12,36,42,51,69 and 76)
Question 56

CMOS is a Computer Chip on the motherboard, which is :

A
RAM
B
ROM
C
EPROM
D
Auxiliary storage
Question 56 Explanation: 
CMOS may refer to any of the following
Alternatively referred to as a RTC (real-time clock), NVRAM (non-volatile RAM) or CMOS RAM, CMOS is short for complementary metal-oxide semiconductor. CMOS is an onboard, battery powered semiconductor chip inside computers that stores information. This information ranges from the system time and date to system hardware settings for your computer.
Question 57

In RS flip-flop, the output of the flip-flop at time (t+1) is same as the output at time t, after the occurrence of a clock pulse if :

A
S=R=1
B
S=0, R=1
C
S=1, R=0
D
S=R=0
Question 57 Explanation: 
Question 58

Match the terms in List-I with the options given in List-II :

    List-I                      List-II 
(a) Decoder             (i) 1 line to 2n lines
(b) Multiplexer        (ii) n lines to 2n lines 
(c) De multiplexer    (iii) 2n lines to 1 line                        
                      (iv) 2n lines to 2n-1 lines
A
(a)-(ii), (b)-(i), (c)-(iii)
B
(a)-(ii), (b)-(iii), (c)-(i)
C
(a)-(ii), (b)-(i), (c)-(iv)
D
(a)-(iv), (b)-(ii), (c)-(i)
Question 58 Explanation: 
  • Decoder = N inputs  to  2N  outputs
  • Mux         = Many to One  i.e. 2N  Inputs  to  1 output
  • De-Mux = One to Many i.e. 1 to 2N output
Question 59

The hexadecimal equivalent of the binary integer number 110101101 is :

A
D 2 4
B
1 B D
C
1 A E
D
1 A D
Question 59 Explanation: 
Step 1: Given  binary number:

000110101101

Step 2: Group all the digits in sets of four starting from the LSB (far right). Add zeros to the left of the last digit if there aren't enough digits to make a set of four:

0001 1010 1101

Step 3: Use below information to convert  into an hexadecimal digit:

0001 = 1, 1010 = A, 1101 = D

So, 1AD is is the hexadecimal equivalent to the decimal number 110101101.

Information
(0-9) no difference from 10 onwards
1010 – A
1011 – B
1100 – C
1101 – D
1110 – E
1111 – F
Question 60
What does the following logic diagram represent ?
A
Synchronous Counter
B
Ripple Counter
C
Combinational Circuit
D
Mod 2 Counter
Question 60 Explanation: 

Asynchronous or ripple counters

2 bit ripple up counter: It contains two flip flops. A 2-bit ripple counter can count up to 4 states. It counts from 0 to 3.


2 bit ripple down counter: It contains two flip flops. A 2-bit ripple counter can count up to 4 states. It is known as down counter as it counts down from 3 to 0.
gate cse
Question 61
Match the items in List-I and List-II :
List - I List -II
(a) Interrupts which can be delayed when a much highest priority interrupt has occurblue (i) Normal
(b) Unplanned interrupts which occur while executing a program (ii) Synchronous
(c) Source of interrupt is in phase with the system clock (iii) Maskable
(iv) Exception
A
(a)-(ii), (b)-(i), (b)-(iv)
B
(a)-(ii), (b)-(iv), (b)-(iii)
C
(a)-(iii), (b)-(i), (b)-(ii)
D
(a)-(iii), (b)-(iv), (b)-(ii)
Question 61 Explanation: 
→  Maskable Interrupt: The hardware interrupts which can be delayed when a much highest priority interrupt has occurred to the processor.

Exception: unplanned interrupts while executing a program is called Exception. For example: while executing a program if we got a value which should be divided by zero is called a exception

Synchronous interrupt will happen every time an instruction executes (with a given program state)
Examples of Synchronous interrupt:
– Divide by zero
– System call
– Bad pointer dereference
Reference : https://www.cs.unc.edu/~porter/courses/comp530/f18
Reference : https://www.electronicshub.org/types-of-interrupts
Question 62
Which of the following mapping is not used for mapping process in cache memory?
A
Associative mapping
B
Direct mapping
C
Set-Associative mapping
D
Segmented - page mapping
Question 62 Explanation: 
Cache mapping is performed using following three different techniques :
  1. Direct Mapping
  2. Fully Associative Mapping
  3. K-way Set Associative Mapping
Question 63
In 8085 microprocessor, what is the output of following program ?
LDA 8000H
MVI B, 30H
ADD B
STA 8001H
A
Read a number from input port and store it in memory
B
Read a number from input device with address 8000H and store it in memory at location 8001H
C
Read a number from memory at location 8000H and store it in memory location 8001H
D
Load A with data from input device with address 8000H and display it on the output device with address 8001H
Question 63 Explanation: 
  • I/O devices are identified by 16-bit addresses
  • 8085 communicates with an I/O device as if it were one of the memory locations
  • Memory related instructions are used
        For e.g. LDA, STA
LDA 8000H
Loads A with data read from input device with 16-bit address 8000H
STA 8001H
Stores (Outputs) contents of A to output device with 16-bit address 8001H

Reading a number from input port (port address 8000H) and display it on ASCII display connected to output port (port address 8001H)
  • LDA 8000H  ; reads data value 03H (example)into ; Accumulator, A = 03H
  • MVI B, 30H  ;  loads register B with 30H
  • ADD B            ;   A = 33H, ASCII code for 3
  • STA 8001H   ;  display 3 on ASCII display


Option(D) is Most Appropriate
Question 64
The ALU uses ____ to store intermediate result.
A
Cache
B
Registers
C
Accumulators
D
Stack
Question 64 Explanation: 
  • ALU is the computational center of the CPU. It performs all mathematical and logical operations.
  • The accumulator is a register in which intermediate arithmetic and logic results are stored.
  • Without a register like an accumulator, it would be necessary to write the result of each calculation (addition, multiplication, shift, etc.) to main memory, perhaps only to be read right back again for use in the next operation. Access to main memory is slower than access to a register like the accumulator
Reference : https://en.wikipedia.org/wiki/Accumulator_(computing)
Question 65
How many address lines are needed to address each memory location in a 2048*4 memory chip?
A
10
B
11
C
8
D
12
Question 65 Explanation: 
2048*4 means that you have:
  • 2048 locations
  • 4 bits per location
It means that a memory of 2048 words, where each word is 4 bits.
So to address 2048 we need 11 bits (211=2048),
so 11 address lines.
Question 66
MIMD stands for
A
Multiple instruction multiple data
B
Multiple instruction memory data
C
Memory instruction multiple data
D
Multiple information memory data
Question 66 Explanation: 
MIMD stands for 'Multiple Instruction and Multiple Data Stream'.
  • Now a days ,All processors in a parallel computer can execute different instructions and operate on various data at the same time.
  • In MIMD, each processor has a separate program and an instruction stream is generated from each program
  • MIMD is a technique employed to achieve parallelism. Machines using MIMD have a number of processors that function asynchronously and independently. At any time, different processors may be executing different instructions on different pieces of data.
Reference
https://en.wikipedia.org/wiki/MIMD#:~:text=In%20computing%2C%20MIMD%20(multiple%20instruction,on%20different%20pieces%20of%20data.

Reference : https://www.javatpoint.com/mimd
Question 67
When a subroutine is called, then address of the instruction following the CAL instruction is stored in/on the
A
Stack pointer
B
Accumulator
C
Program Counter
D
Stack
Question 67 Explanation: 
 Subroutine 
A set of Instructions which are used repeatedly in a program can be referred to as Subroutine. Only one copy of this Instruction is stored in the memory. When a Subroutine is required it can be called many times during the Execution of a Particular program. A call Subroutine Instruction calls the Subroutine. Care Should be taken while returning a Subroutine as Subroutine can be called from a different place from the memory.

The content of the PC must be Saved by the call Subroutine Instruction to make a correct return to the calling program.

Refer : https://www.quora.com/How-did-the-call-instruction-work-in-the-8085-microprocessor

Refer : https://www.geeksforgeeks.org/subroutine-subroutine-nestin.
Question 68
Start and stop bits are used in serial communication for
A
Error detection
B
Error Correction
C
Synchronization
D
Slowing down the communication
Question 68 Explanation: 
  • Start and Stop bits are used in asynchronous communication as a means of timing or synchronizing the data characters being transmitted.
  • Start bit is used to signal the beginning of a frame.
  • Stop bit is used to signal the end of a frame.
Question 69
Micro programming is a technique for
A
Writing small programs effectively
B
Programming output/input routines
C
Programming the microprocessors
D
Programming the control steps of a computer
Question 69 Explanation: 
microprogramming is a systematic technique for implementing the control logic of a computer's central processing unit. It is a form of stored-program logic that substitutes for hardwired control circuitry.
Question 70
An instruction used to set the carry flag in a computer can be classified as
A
Data transfer
B
Process control
C
Logical
D
Program control
Question 70 Explanation: 
STC : It is logical instruction or logical instruction used to set the carry flag in a computer.

Data Transfer 
The data transfer instructions move data between registers or between memory and registers.
MOV , MVI,LDA,STA,LHLD,SHLD etc.

Logical 
The Instructions under this group perform logical operation such as AND, OR, compare, rotate etc.
Examples are: ANA, XRA, ORA, CMP,  RAL,STC etc.

Program control
instructions change or modify the flow of a program. The most basic kind of program control is the unconditional branch or unconditional jumpBranch is usually an indication of a short change relative to the current program counter. Jump is usually an indication of a change in program counter that is not directly related to the current program counter (such as a jump to an absolute memory location or a jump using a dynamic or static table), and is often free of distance limits from the current program counter.
LOOPNZ,RET,CALL,LOOPZ,IRET,JUMP,JUMPNZ etc.
Question 71
If a processor does not have any stack pointer register, then
A
If cannot have subroutine call instruction
B
It can have subroutine call instruction, but no nested subroutine calls are possible, but no nested subroutine calls
C
Nested subroutine calls are possible, but interrupts are not
D
All sequences of subroutine calls and also interrupts are possible
Question 71 Explanation: 
  • A subroutine can be implemented by using CALL and RET instructions.
  • CALL instruction when used decrements the stack pointer by two.
  • RET instruction increments the stack pointer register by two.
  • A processor with no stack pointer register cannot have a subroutine call instruction.
Question 72
In a microcomputer, WAIT states are used to
A
Make the processor wait during a DMA operation
B
Make the processor wait during a power interrupt processing
C
Make the processor wait during a power shutdown
D
Interface slow peripherals to the processor
Question 72 Explanation: 
  • A wait state is a situation in which the computer processor experiences a delay, mainly when accessing external memory or a device that is slow in its response.
  • program or processor is waiting for the completion of some event before resuming activity. A program or process in a wait state is inactive for the duration of the wait state
  • Computer microprocessors generally run much faster than the computer's other subsystems
  • When the processor needs to access external memory, it starts placing the address of the requested information on the address bus
  • It then must wait for the answer, each of the cycles spent waiting is called a wait state
  • Thus, wait states helps to interface slow peripherals to the memory
Question 73
The seek time of a disk is 30ms. It rotates at the rate of 30 rotations/second. The capacity of each track is 300 words. The access time is (approximately)
A
62ms
B
60ms
C
50ms
D
47ms
Question 73 Explanation: 
Access time of hard disk is defined as time to access one word from hard disk memory

It is given that 30 rotations per second.
  • 30 rotations = 1 sec
  • 1 rotation = 1/30 sec
It is given that Capacity of each track 300 words
It means in 1 rotation, we can access 300 words
  • 1 rotation = 300 words
  • 1 word = 1/300 rotations
So, 1 word transfer time = (1/300) *(1/30) sec

Rotational delay = Average taken to be the time to rotate by half = 1/2 x time for 1 rotation = 1/2 X 1/30 seconds = 1/60 s = 16.6667 ms

Avg access time= 30 ms(seek time)+ 1/60 sec (Rotational Delay)+ 1/9000 sec (transfer time)
Avg access time= 30 ms + 16.6667 ms + 0.1111 ms
Avg access time= 46.78 ms
Question 74

A Computer uses a memory unit with 256K word of 32 bits each. A binary instruction code is stored in one word of memory. The instruction has four parts: an indirect bit, an operation code and a register code part to specify one of 64 registers and an address part. How many bits are there in operation code, the register code part and the address part?

A
7, 7, 18
B
18, 7, 7
C
7, 6, 18
D
6, 7, 18
Question 74 Explanation: 
 
Indirect 1 bit
Address  Given Address 256kB    28 (256kB) * 210 (1024 bytes/kB) = 218 == 18 bits
Registers Total 64 registers = 26 = 6 bits
OP-code 32 - 1 - 18 - 6 bits = 7 bits
Question 75

Consider a system with 2 level cache. Access times of Level 1, Level 2 cache and main memory are 0.5 ns, 5 ns and 100 ns respectively. The hit rates of Level 1 and Level 2 caches are 0.7 and 0.8 respectively. What is the average access time of the system ignoring the search time within cache?

A
20.75 ns
B
7.55 ns
C
24.35 ns
D
35.20 ns
Question 75 Explanation: 
Average Access time = [H1*T1] + [ (1-H1) * H2*T2   ]  +  [  (1-H1)  (1-H2) *  Hm *  Tm ]

H1 = Hit rate of level 1 cache = 0.7
T1 = Access time for level 1 cache = 0.5 ns
H2 = Hit rate of level 2 cache = 0.8
T2 = Access time for level 2 cache = 5 ns
Hm = Hit rate of Main Memory = 1
Tm = Access time for Main Memory = 100 ns

Average Access time =0.7*0.5 + 0.3 *(0.8)*(5)+ 0.3*(0.2)*(100)
So, Average Access time 7.55 ns
Question 76
Consider the following x86 - assembly language instructions :
  • MOV AL, 153
  • NEG AL
The contents of the destination register AL (in 8-bit binary notation), the status of Carry Flag(CF) and Sign Flag(SF) after the execution of above instructions, are
A
AL = 0110 0110; CF = 0; SF = 0
B
AL = 0110 0111; CF = 0; SF = 1
C
AL = 0110 0110; CF = 1; SF = 1
D
AL = 0110 0111; CF = 1; SF = 0
Question 76 Explanation: 
  • The NEG instruction negates a value by finding 2's complement of its single operand.
  • This simply means multiply operand by -1.
  • When a positive value is negated the result is negative.
  • A negative value will become positive.
MOV AL, 153 // load 153 to accumulator
NEG AL   //  Now Accumulator have -153

153 = 1001 1001
its 2's compliment is 0110 0111
NEG(153) = -153(  1111 1111  0110 0111)

AL = 0110 0111  // -153
Status of Carry Flag (CF) = 0 // we don't have any carry
Sign Flag (SF) = 1 // -153 negative number

So, option(B) is the Correct Answer
Question 77

Consider the following statements :

    (i) Auto increment addressing mode is useful in creating self-relocating code.
    (ii) If auto addressing mode is included in an instruction set architecture, then
         an additional ALU is required for effective address calculation.
    (iii) In auto increment addressing mode, the amount of increment depends on
         the size of the data item accessed.

Which of the above statements is/are true ?

Choose the correct answer from the code given below :

Code :
A
(iii) only
B
(ii) and (iii) only
C
(i) and (ii) only
D
(ii) only
Question 77 Explanation: 
  • Self reallocating code required for Displacement Addressing Mode. Auto Increment is useful for Array implementation
  • In Auto increment/decrement Addressing Mode , Register will be automatically incremented or decremented So, ALU is required. But additional ALU is not required.
  • For incrementing the data, the auto-increment addressing mode is used which purely depends on the size of the data.  In Auto increment mode automatically increments the contents of a register by a value that corresponds to the size of the accessed operand. Thus , the increment is 1 for byte-sized operands, 2 for 16-bit operands, and 4 for 32-bit operands. The size of the operand is usually specified as part of the operation code of an instruction.
Question 78
What is the average access time for a Drum rotating at 4000 revolutions per minute?
A
2.5 milliseconds
B
5.0 milliseconds
C
7.5 milliseconds
D
4.0 milliseconds
Question 78 Explanation: 
Drum rotating at 4000 revolutions per minute
  • 4000 revolutions = 1 minute
  • 4000 revolutions = 60 seconds
1 revolution takes = 60/4000 seconds

Average Access Time is time to complete 1/2 revolution = 7.5 ms
Question 79
Comparing the time T1 taken for a single instruction on a pipelined CPU, with time T2 taken on a no-pipelined but identical CPU, we can say that___?
A
T1=T2
B
T1>=T2
C
T1
D
T1 is T2 plus time taken for one instruction fetch cycle
Question 79 Explanation: 
option(B) printing mistake : T1>=T2

  • Pipelining does not increase the execution time of a single instruction.
  • Pipelining is one way of improving the overall processing performance of a processor.
  • Pipelining increases the overall performance by splitting the execution to multiple pipeline stages so that the following instructions can use the finished stages of the previous instructions
  • Pipelining architectural approach allows the simultaneous execution of several instructions
Assume that each stage takes ‘T’ unit of time both in pipelined and non-pipelined CPU.
Let total stages in pipelined CPU = Total stages in non-pipelined CPU = K
Number of Instructions = N = 1
  • Pipelined CPU = Total time (T1) = (K + (N – 1)) * T = KT
  • Non-Pipelined CPU = Total time (T2) = KNT = KT
  • Considering buffer delays in pipelined CPU= T1 >= T2
Question 80
Which memory is difficult to interface with processor?
A
Static memory
B
Dynamic memory
C
ROM
D
None of the option
Question 80 Explanation: 
Dynamic memory refreshes periodically due to this refreshment it is difficult to interface processor
Question 81
For a memory system, the cycle time is
A
Same as the access time
B
Longer than the access time
C
Shorter than the access time
D
Multiple of the access time
Question 81 Explanation: 
Memory access time
  • Access time is the amount of time it takes the processor to read data, instructions, and information from memory.
Memory Cycle Time
  • It is the time that is measured in nanoseconds, the time between one Ram access of time when the next Random Access Memory RAM access starts
  • Cycle time representing the minimum time interval between two successive accesses
Question 82
If each address space represents one byte of storage space, how many address lines are needed to access RAM chips arranged in a 4 x 6 array, where each chip is 8K x 4 bits?
A
13
B
14
C
16
D
17
Question 82 Explanation: 
  • Size of each Ram chip = 8K x 4 bits = 23 x 210 x 2 = 215 bits
  • This is bye addressable each address space represents one byte of storage space  (215)/8 Byte =212  Bytes
  • Number of chips required = 6 x 4 = 24 = 5 bits required to represent 24 chips
  • So, Total number of bits required = 12 + 5 = 17 bits
Question 83
Consider data given in the above question. What is the minimum number of page colours needed to guarantee that no two synonyms map to different sets in the processor cache of this computer?
A
2
B
4
C
8
D
16
Question 83 Explanation: 
As the page size is 213 Bytes and page coloring is asked so we divide cache size by page
size and group 16 pages in one set.
Number of pages in cache = 1MB/8KB = 128 pages
Number of set in cache=128/16=8 sets
Take any page of LAS, it will be mapped with cache on any one of these 8 sets (set association mapping).
For any two synonym to map with same set they should be colored with same color of that respective set.
So minimum we need 8 colors for this mapping.
Question 84
A disk has 200 tracks(numbered 0 through 199). At a given time, it was servicing the request of reading data from track 120 and at the previous request, service was for track 90. The pending requests(in order of their arrival) are for track numbers
30 70 115 130 110 80 20 25.
How many times will the head change its direction for the disk scheduling policies SSTF(Shortest Seek Time First) and FCFS(First come first serve)?
A
2 and 3
B
3 and 3
C
3 and 4
D
4 and 4
Question 84 Explanation: 
SSTF : (90) 120 115 110 130 80 70 30 25 20
Direction changes at 120,110,130
Total 3 changes in SSTF

FCFS : (90) 120 30 70 115 130 110 80 20 25
Direction changes at 120,30,130,20
Total 4 changes in FCFS
Question 85
The part of machine level instruction, which tells the central processor what has to be done, is
A
Operation code
B
Address
C
Locator
D
Flip flop
Question 85 Explanation: 
The first element of a machine level instruction is almost always a fixed length collection of bits containing a code that identifies the specific operation to be performed While not all possible bit patterns that could appearin this operation code (or op code) field need necessarily be valid operation identifiers, the number of possible bit patterns provides an upper limit for the number of operations that the processor could support. For example, an 8-bit op code would limit a processor to a maximum of 256 different operations.
Question 86
Which of the following need not necessarily be saved on a context switch between processes?
A
Program counter
B
IO status information
C
CPU registers
D
Translation lookaside buffer
Question 86 Explanation: 
  • During context switch between processes , the state of the first process must be saved so that, when the scheduler gets back to the execution of the first process, it can restore this state and continue. PC, stack and registers must be saved as otherwise program cannot resume.
  •  Translation lookaside buffer (TLB) is a CPU cache that memory management hardware uses to improve virtual address translation speed. They are just bonus for ensuring better performance. We don’t need to save TLB to ensure correct program resumption.
Question 87
CPU register to perform storage of arithmetic and logic results is called:
A
Instruction register
B
Program counter
C
Accumulator
D
Instruction Decoder
Question 87 Explanation: 
In 8085  Accumulator is an 8-bit register i.e,. it can store 8-bit of data. Accumulator is the part of the arithmetic and logical unit (ALU). After performing arithmetical or logical operations, the result is stored in accumulator.
Accumulator is also defined as register A .
In other word Accumulator is a register in which intermediate arithmetic and logic results are stored
Question 88
The quantity of very long word is:
A
32 bits
B
64 bits
C
128 bits
D
256 bits
Question 88 Explanation: 
64 bits
Question 89
Suppose the pipelined stages take {15,8,25,4,8} nanoseconds(ns) respectively. With a buffering delay of 5ns. Two pipelined implementation of the processor are used?
(i) A naive pipeline implementation(NP) and

(ii) An efficient pipeline(EP) where the third stage is splitted into {12ns, 5ns and 8ns} respectively.

The speedup achieved by EP over NP in executing 100 independent instructions with no hazards is:
A
1.471
B
1.517
C
1.638
D
1.567
Question 89 Explanation: 
Given, total number of instructions (n) = 100

For naive pipeline (NP):
Number of stages(k) = 5
Clock time (Tp) = max { (stage delay+buffer delay) } = {15 , 8, 25, 4, 8} + 5 = 30 nsec
Execution time (Enp) = ( k + n - 1 )*Tp = ( 5 + 100 - 1 )*30 = 3120 nsec

For efficient pipeline (EP):
Number of stages(k) = 7 ( delay with 25 nsec stage is divided into 12 nsec,5 nsec and 8 nsec )
Clock time (Tp) = max { (stage delay+buffer delay) } = {15 , 8, 12, 5, 8, 4, 8} + 5 = 20 nsec
Execution time (Eep) = ( k + n - 1 )*Tp = ( 7 + 100 - 1 )*20 = 2120 nsec

Speedup = (Enp) / (Eep) = 3120 / 2120 = 1.471
Question 90
When we move from the outermost track to the innermost track in a magnetic disk, then density(bits per linear inch)
A
Increases
B
Decreases
C
Remains the same
D
Either remains constant or decreases
Question 90 Explanation: 
There used to be a time, when every track of a hard disk had the same number of sectors with the same number of bits in them. Which meant, that the bit density in the inner tracks was much higher than in the outer sectors.

(Bits Per Inch) The measurement of the number of bits stored in one linear inch of a track (storage channel) on a disk or tape.
Question 91
A certain processor supports only the immediate and the direct addressing modes. Which of the following programming language features cannot be implemented on this processor?
A
Pointers
B
Arrays
C
Records
D
All of these
Question 91 Explanation: 
  • Pointers require indirect addressing mode.
  • Arrays required indexing modes.
  • An array and record access needs a pointer access. So, options (A), (B) and (C) cannot be implemented on such a processor
Question 92
The number of address lines in a memory chip of size 8192*8 is
A
8
B
12
C
13
D
16
Question 92 Explanation: 
8192*8 means that you have:
  • 8192 locations
  • 8 bits per location
It means that a memory of 8192 words, where each word is 8 bits.
So to address 8192   we need 13 bits (213=8192),
so 13 address lines.
Question 93
The register which keeps track of the execution of a program and which contains the memory address of the instruction currently being execution is called
A
Index register
B
Memory address register
C
Program counter
D
Instruction register
Question 93 Explanation: 
The Program Counter (PC) register keeps track of the execution of the program. It contains the memory address of the instruction currently being executed . During the execution of the current instruction, the contents of the PC are updated to correspond to the address of the next instructions to be executed.
Question 94
The register which holds the address of the location to or from which data are to be transferred is called
A
Index register
B
Instruction register
C
Memory address register
D
Memory data register
Question 94 Explanation: 
MAR holds the memory location of data that needs to be accessed. When reading from memory, data addressed by MAR is fed into the MDR (memory data register) and then used by the CPU. When writing to memory, the CPU writes data from MDR to the memory location whose address is stored in MAR. MAR, which is found inside the CPU, goes either to the RAM (random access memory) or cache.

The memory address register is half of a minimal interface between a microprogram and computer storage; the other half is a memory data register.

In general, MAR is a parallel load register that contains the next memory address to be manipulated. For example, the next address to be read or written.

Reference : https://en.wikipedia.org/wiki/Memory_address_register
Question 95
The addressing mode used in the instruction PUSH B is
A
Direct
B
Register
C
Register indirect
D
Immediate
Question 95 Explanation: 
In register addressing mode the operand is held in memory. The address of the operand location is held in a register which is specified in instruction.
Point To Note : Generally 4 types of Instructions are there
PUSH A : Direct
PUSH B : Register
Add : Register Indirect
Pop.C : Immediate
Question 96
Consider the following x86 - assembly language instructions :
MOV AL, 153
NEG AL

The contents of the destination register AL (in 8-bit binary notation), the status of Carry Flag(CF) and Sign Flag(SF) after the execution of above instructions, are
A
AL = 0110 0110; CF = 0; SF =0
B
AL = 0110 0111; CF = 0; SF =1
C
AL = 0110 0110; CF = 1; SF =1
D
AL = 0110 0111; CF = 1; SF =0
Question 96 Explanation: 
  • The NEG instruction negates a value by finding 2's complement of its single operand.
  • This simply means multiply operand by -1.
  • When a positive value is negated the result is negative.
  • A negative value will become positive.
MOV AL, 153 // load 153 to accumulator
NEG AL   //  Now Accumulator have -153

153 = 1001 1001
its 2's compliment is 0110 0111
NEG(153) = -153(  1111 1111  0110 0111)

AL = 0110 0111  // -153
Status of Carry Flag (CF) = 0 // we don't have any carry
Sign Flag (SF) = 1 // -153 negative number

So, option(B) is the Correct Answer
Question 97
Consider the following statements :
(i) Auto increment addressing mode is useful in creating self-relocating code.
(ii) If auto addressing mode is included in an instruction set architecture, then an additional ALU is required for effective address calculation.
(iii) In auto increment addressing mode, the amount of increment depends on the size of the data item accessed.
Which of the above statements is/are true ?
A
(iii) only
B
(ii) and (iii) only
C
(i) and (ii) only
D
(ii) only
Question 97 Explanation: 
  • Self reallocating code required for Displacement Addressing Mode. Auto Increment is useful for Array implementation
  • In Auto increment/decrement Addressing Mode , Register will be automatically incremented or decremented So, ALU is required. But additional ALU is not required.
  • For incrementing the data, the auto-increment addressing mode is used which purely depends on the size of the data.  In Auto increment mode automatically increments the contents of a register by a value that corresponds to the size of the accessed operand. Thus , the increment is 1 for byte-sized operands, 2 for 16-bit operands, and 4 for 32-bit operands. The size of the operand is usually specified as part of the operation code of an instruction.
Question 98
A nonpipelined system taken 50ns to process a task. the same task can be processed in a six-segment pipeline with a clock cycle of 10ns.
Determinant the speedup ration of the pipeline for 100 tasks. What is the maximum speedup that can be achieved?
A
4.90,5
B
4.76,5
C
3.90,5
D
4.30,5
Question 98 Explanation: 
Total Number of tasks  n = 100
Time taken by non pipeline Tn to process a task = 50 ns

NON-Pipeline
Time period of 100 tasks  =  (Number of tasks)  * (Time taken for process each task)
Time period of 100 tasks  = n*Tn
Time period of 100 tasks  = 100 x 50 = 5000 ns

With PipeLined
Number of segment pipeline "K" = 6
Time period of 1 clock cycle  = 10 ns
Total time required = ( k + n - 1)tp
Total time required= ( 6 + 100 - 1)10
Total time required= 1050 ns

Speed up ratio " S" = 5000/1050
Speed up ratio " S"= 4.76
Question 99
The principle of locality of reference justifies the use of:
A
Non reusable
B
Cache memory
C
Virtual memory
D
None of the above
Question 99 Explanation: 
The Principle of Locality of Reference justifies the use of cache Memory.
In other words, Locality of Reference refers to the tendency of the computer program to access instructions whose addresses are near one another.

locality of reference. There are two ways with which data or instruction is fetched from main memory and get stored in cache memory. These two ways are the following:

Temporal Locality :
Temporal locality means current data or instruction that is being fetched may be needed soon.
In Temporal Locality The Least Recently Algorithm is Used (LRU)
Clustering in time: items referenced in the immediate past have a high probability of being re-referenced in the immediate future

Spatial Locality:
Spatial locality means instruction or data near to the current memory location that is being fetched, may be needed soon in the near future.
Clustering in space: items located physically near an item referenced in the immediate past have a high probability of being re-referenced in the immediate future  

Refer : https://www.cs.usask.ca/faculty/bunt/presentations/Locality.ppt 
Question 100
External Interrupt may not arise because of:
A
Illegal or erroneous use of an instruction
B
A timing devices
C
External sources
D
I/O devices
Question 100 Explanation: 
  • Internal Interrupt :- Interrupt which arises from illegal or erroneous use of an instruction or data. Eg. :- Register overflow, stack overflow, Protection violation.
  • External Interrupt :- Hardware error like power failure, memory parity error, I/O controller, Timer( internal processor timer is used in pre-emptive multi-tasking)
  • Hardware Interrupt :- Interrupt generated by hardware. Eg. :- temperature sensor etc.
  • Software Interrupt :- System calls intentionally written by programmer
  • Asynchronous Interrupt :- If the interrupts are independent or not in phase to the system clock is called asynchronous interrupt.
  • Periodic Interrupt :- If the interrupts occurred at fixed interval in timeline then that interrupts are called periodic interrupts.
  • Synchronous Interrupt :- The interrupt which are dependent on the system clock. Eg. :- Timer service
  • Nested Interrupt :- If an interrupt occurs while executing a program, and the processor is executing the interrupt, if one more interrupt occurs again, then it is called a nested interrupt.
Question 101
Where does the swap reside?
A
RAM
B
ROM
C
DISK
D
On-chip cache
Question 101 Explanation: 
  • Swap space  is used when the amount of physical memory (RAM) is full. If the system needs more memory resources and the RAM is full, inactive pages in memory are moved to the swap space.
  • While swap space can help machines with a small amount of RAM, it should not be considered a replacement for more RAM.
  • Swap space is located on hard drives(Disk or any)
Question 102
The addressing mode used in an instruction of the form ADD X Y, is___
A
Direct
B
Absolute
C
Indirect
D
Indexed
Question 102 Explanation: 
  • Direct Addressing Mode Effective address of operand is present in instruction itself.
  • Single memory reference to access data.
  • No additional calculations to find the effective address of the operand.
  • Usually indicated by variable names
Refer for More information : 
https://www.studytonight.com/computer-architecture/addressingmodes-instructioncycle#:~:text=Direct%20Addressing%20Mode&text=For%20Example%3A%20ADD%20R1%2C%204000,location%20where%20operand%20is%20present.
Question 103
Process that periodically checks status of an I/O devices, is known as:
A
Cold swapping
B
I/O instructions
C
Polling
D
Dealing
Question 103 Explanation: 
Polling vs Interrupts I/O
A computer must have a way of detecting the arrival of any type of input. There are two ways that this can happen, known as polling and interrupts. Both of these techniques allow the processor to deal with events that can happen at any time and that are not related to the process it is currently running.

Polling I/O
Polling is the simplest way for an I/O device to communicate with the processor. The process of periodically checking status of the device to see if it is time for the next I/O operation, is called polling. The I/O device simply puts the information in a Status register, and the processor must come and get the information.

Most of the time, devices will not require attention and when one does it will have to wait until it is next interrogated by the polling program. This is an inefficient method and much of the processors time is wasted on unnecessary polls.

Compare this method to a teacher continually asking every student in a class, one after another, if they need help. Obviously the more efficient method would be for a student to inform the teacher whenever they require assistance.
Reference :
https://www.tutorialspoint.com/operating_system/os_io_hardware.htm#:~:text=The%20process%20of%20periodically%20checking,O%20operation%2C%20is%20called%20polling.
Question 104
CPU consists of __
A
ALU and Control Unit
B
ALU, Control Unit and Monitor
C
ALU, Control Unit and Hard disk
D
ALU, Control Unit and register
Question 104 Explanation: 
Central processing unit (CPU), principal part of any digital computer system, generally composed of the main memory, control unit, and arithmetic-logic unit.
Question 105
A hard disk system has the following parameters :
  • Number of tracks = 500
  • Number of sectors/track = 100
  • Number of bytes /sector = 500
  • Time taken by the head to move from one track to adjacent track = 1 ms
  • Rotation speed = 600 rpm.
What is the average time taken for transferring 250 bytes from the disk ?
A
300.5 ms
B
255.5 ms
C
255 ms
D
300 ms
Question 105 Explanation: 
The time to transfer 250 bytes from the disk equals =
Average seek time + the average rotational latency + the transfer time for 250 bytes

The Average seek time equals:
Given that :
time to move between successive tracks is 1 ms
time to move from track 1 to track 1: 0ms
time to move from track 1 to track 2: 1ms
time to move from track 1 to track 3: 2ms
..
..
time to move from track 1 to track 500 :  499m
Avg Seek time = ( ∑0+1+2+3+…+499)/500 = 249.5 ms

Avg Rotational Delay
  • Rotation speed = 600 RPM.
  • 600 rotations  =   60 sec
  • 1 rotation   =  60/600  sec= 0.1 sec
So, Avg Rotational Delay = 0.1/2=  =0.05 sec = 50 ms

Data Transfer Time: 
In 1 Rotation we can read data on 1 complete track  =
100×500 = 50,000 Bytes data is read in one complete rotation
1 complete rotation takes 0.1 s
0.1 → 50,000 bytes.
250 bytes →0.1×250 / 50,000 = 0.5 ms
Data Transfer Time = 0.5 ms

Avg. time to transfer = Avg. seek time + Avg. rotational delay + Data transfer time
Avg. time to transfer= 249.5+50+0.5
Avg. time to transfer= 300 ms
Question 106
How many characters per sec (7 bits + 1 parity) can be transmitted over a 2400 bps line if the transfer is synchronous ( 1 start and 1 stop bit)?
A
300
B
240
C
250
D
275
Question 106 Explanation: 
In synchronous mode of transfer we don’t require start and stop bits
  • Total number of bits per character while transmitting is (7+1)=8 bits
  • No of character transmitted 2400/8=300 bps
In Asynchronous transfer, we need start and stop bits in order to synchronize these bits are added to the number of bits in each character.
  • Total number of bits per character while transmitting is (7+1+1+1)=10 bits
  • No of character transmitted 2400/10=240 bps
 
Question 107
In X = (M + N x O)/(P x Q), how many one-address instructions are required to evaluate it?
A
4
B
6
C
8
D
10
Question 107 Explanation: 
In One-address instructions, an accumulator register is required
  • Accumulator CPU is  an example of One Address Instruction
  • Load and store operations are performed to fetch the values of operands from registers or memory to accumulators and to store the value of accumulator to a memory location.
X = (M + N * O) / (P * Q)
  1. Load A : ACC <-- M[M]                 //Load M value from memory  to ACCUMULATOR
  2. Add N : ACC <-- ACC + M[N]     //ADD N value  to ACCUMULATOR and store Results in ACCUMULATOR
  3. Mul O : ACC <-- ACC x M[O]      // Multiply O value  to ACCUMULATOR and store Results in ACCUMULATOR
  4. Store T : M[T] <-- ACC              //  Now Store Results in Memory
  5. Load P : ACC <-- M[P]                // Load P value from memory  to ACCUMULATOR
  6. Mul Q : ACC <-- ACC x M[Q]   // Multiply Q value  to ACCUMULATOR and store Results in ACCUMULATOR
  7. Div T : ACC <-- M[T] / ACC     // devide memory value(step4) with ACCUMULATOR and store Results in Acc
  8. Store X : M[X] <-- ACC           // store Accumulator results in Memory
Question 108
The minimum time delay between the initiation of two independent memory operations is called
A
Access time
B
Cycle time
C
Rotational time
D
Latency time
Question 108 Explanation: 
  • Cycle time is the minimum time delay between the initiations of two independent memory operations.
  • The Time taken by the cpu to end one read operation and to start one more is cycle time.
Question 109
The contents of the flag register after execution of the following program by 8085 microprocessor will be
Program :
SUB A
MVI B,(01)H
DCR B
HLT
A
(54)H
B
(00)H
C
(01)H
D
(45)H
Question 109 Explanation: 
Contribute your solution in Discussion Forum
Discussion Forum     
Question 110
In a Big-Endian machine, a 32 bit word is stored at address 0 in a memory that is byte addressable. What byte of the word will be stored at address 0?
A
Byte 3
B
Byte 2
C
Byte 1
D
Byte 0
Question 110 Explanation: 
A load word or store word instruction uses only one memory address. The lowest address of the four bytes is used for the address of a block of four contiguous bytes.

How is a 32-bit pattern held in the four bytes of memory? There are 32 bits in the four bytes and 32 bits in the pattern, but a choice has to be made about which byte of memory gets what part of the pattern. There are two ways that computers commonly do this:
Big Endian Byte Order: The most significant byte (the "big end") of the data is placed at the byte with the lowest address. The rest of the data is placed in order in the next three bytes in memory.

Little Endian Byte Order: The least significant byte (the "little end") of the data is placed at the byte with the lowest address. The rest of the data is placed in order in the next three bytes in memory.
In these definitions, the data, a 32-bit pattern, is regarded as a 32-bit unsigned integer. The "most significant" byte is the one for the largest powers of two: 231, ..., 224. The "least significant" byte is the one for the smallest powers of two: 27, ..., 20.

For example, say that the 32-bit pattern 0x12345678 is stored at address 0x00400000. The most significant byte is 0x12; the least significant is 0x78.

Within a byte the order of the bits is the same for all computers (no matter how the bytes themselves are arranged).



Source :  https://chortle.ccsu.edu/AssemblyTutorial/Chapter-15/ass15_3.html#:~:text=The%20%22least%20significant%22%20byte%20is,the%20least%20significant%20is%200x78. 
Question 111
Considering every instruction and address as one word long, how many memory access are required for the following instruction, where R1, R2 and R3 are registers, and (R3) represents that R3 contains a memory address where some value (operand) is stored?
ADD R1, R2, (R3)
A
4
B
1
C
3
D
2
Question 111 Explanation: 
ADD r1, r2, (r3)
Require two memory accesses, the first to read the instruction and the other
one to read the value from memory location(s), whose address is in r3

Question 112
Which of the following is not a form of main memory?
A
Instruction cache
B
Instruction register
C
Instruction Opcode
D
Translation lookaside buffer
Question 112 Explanation: 
  • Instruction Cache  :  Used for storing frequently used instructions
  • Instruction Register  :  Part of CPU’s control unit that stores the instruction currently being executed
  • Instruction Opcode : The instruction opcode is a part of the instruction which tells the processor what operation is to be performed so it is not a form of memory while the others are instruction cache, instruction register and translation look a side buffer are the forms of memory
  • Translation Lookaside Buffer : It is a memory cache that stores recent translations of virtual memory to physical addresses for faster access.
Question 113
A pipeline is having speed up factor as 10 and operating with efficiency of 80%. what will be the number of stages in the pipeline?
A
10
B
8
C
13
D
None
Question 113 Explanation: 
Speedup factor S=10
Efficiency e= 80%= 0.8

Efficiency e= (Speedup factor s) / (Number of stages k)
  • e= S/k
  • k= S/e
  • K=S/e=10/0.8=12.5  ≏ 13 stages
No of Stages  = 13
Question 114
Which level of RAID refers to disk mirroring with block striping?
A
RAID level 1
B
RAID level 2
C
RAID level 0
D
RAID level 3
Question 114 Explanation: 
RAID level 1 refers to disk mirroring with block striping.
  • RAID 0 (also known as a stripe set or striped volume) splits ("stripes") data evenly across two or more disks, without parity information, redundancy, or fault tolerance.
  • RAID 1 consists of an exact copy (or mirror) of a set of data on two or more disks; a classic RAID 1 mirrored pair contains two disks
  • RAID 2, which is rarely used in practice, stripes data at the bit (rather than block) level, and uses a Hamming code for error correction.
  • RAID 3, which is rarely used in practice, consists of byte-level striping with a dedicated parity disk.
  • RAID 4 consists of block-level striping with a dedicated parity disk.
  • RAID 5 consists of block-level striping with distributed parity. Unlike in RAID 4, parity information is distributed among the drives. It requires that all drives but one be present to operate
  • RAID 6 extends RAID 5 by adding another parity block; thus, it uses block-level striping with two parity blocks distributed across all member disks
Question 115
In a 10 bit computer instruction format, the size of address field is 3 bits. The computer uses expanding OP-code technique
and has 4 two address instructions and 16  one address instructions.
The number of zero address instructions it can support is
A
256
B
356
C
640
D
56
Question 115 Explanation: 
  • Number of possible instruction encoding =210=1024
  • Number of encoding taken by Two-address instructions = 4×23×23=4*8*8= 256
  • Number of encoding taken by One-address instructions =16×23=16*8=128
  • So, Number of possible Zero-address instructions =1024− (256 + 128)=640
Question 116
Match list I with list II and select the correct answer using the codes given below the lists.
A
1 2 3 4
B
3 2 4 1
C
2 3 1 4
D
1 4 2 3
Question 116 Explanation: 
  • zero-address instruction An instruction that contains no address fields; operand sources and destination are both implicit. It may for example enable stack processing: a zero-address instruction implies that the absolute address of the operand is held in a special register that is automatically incremented (or decremented) to point to the location of the top
  • One-address instructions use an implied accumulator (AC) register for all data manipulation. For multiplication and division there is a need for a second register. However, here we will neglect the second and assume that the AC contains the result of tall operations.
  • In Two address instruction each address field can specify either a processor register or a memory word.
  • In three-address instruction each address field to specify either a processor register or a memory operand.
Question 117
In a cache memory if total number of sets are 's', then the set offset is:
A
28
B
Log2s
C
S2
D
S
Question 117 Explanation: 
They are asking about SET INDEX
"SET INDEX" is referred as SET OFFSET.
  • In fully Associative only 1 set so SET INDEX not exit
  • In Set-Associative if you have s sets then SET INDEX will be log2 s
It means we require log2 s bits  in order to represent s sets in  K-way set Associative
Question 118
A stack organized computer has which of the following instructions?
A
Zero address
B
One address
C
Two address
D
Three address
Question 119
Consider a non pipelined machine with 6 stages. the length of each stage are
20ns, 10ns, 30ns, 25ns, 40ns, and 15ns respectively.
Suppose for implementing the pipelining the machine adds 5ns of overhead to each stage for clock skew and set up. What is the speed up factor of the pipelining system (ignoring any hazard impact) ?
A
7
B
14
C
3.11
D
6.22
Question 119 Explanation: 
Given
  •  Number of stages : 6
  • Time taken for each stage : 20ns, 10ns, 30ns,25ns, 40 ns 15ns
Without pipeline
Execution time  1 instruction = 20ns+10ns+30ns+25ns+40ns+15ns  =140ns

With pipeline
Implementing pipeline adds 5 ns of overhead to each stage
So Add 5 ns  to each stage
With ideal pipeline it will take 1 cycle time. Here 1 cycle time is max(25, 15, 35, 30, 45, 20) = 45ns

Speedup = ( Time without pipelining )  / ( Time with pipelining )
Speedup = 140/45= 3.11
Question 120
Which of the following is/are not features of RISC processor ?
i. Large number of addressing modes
ii. Uniform instruction set
A
I only
B
Ii only
C
Both i and ii
D
None of the options
Question 120 Explanation: 
CISC RISC
Focus on software Focus on hardware
Uses only Hardwired control unit Uses both hardwired and micro programmed control unit
Transistors are used for more registers Transistors are used for storing complex Instructions
Fixed sized instructions Variable sized instructions
Can perform only Register to Register Arthmetic operations Can perform REG to REG or REG to MEM or MEM to MEM
Requires more number of registers Requires less number of registers
Code size is large Code size is small
A instruction execute in single clock cycle Instruction take more than one clock cycle
A instruction fit in one word Instruction are larger than size of one word
A large number of instructions are present in the architecture. Very fewer instructions are present. The number of instructions are generally less than 100.
Some instructions with long execution times. These include instructions that copy an entire block from one part of memory to another and others that copy multiple registers to and from memory. No instruction with a long execution time due to very simple instruction set. Some early RISC machines did not even have an integer multiply instruction, requiring compilers to implement multiplication as a sequence of additions.
Variable-length encodings of the instructions. Example: IA32 instruction size can range from 1 to 15 bytes. Fixed-length encodings of the instructions are used. Example: In IA32, generally all instructions are encoded as 4 bytes.
Multiple formats are supported for specifying operands. A memory operand specifier can have many different combinations of displacement, base and index registers. Simple addressing formats are supported. Only base and displacement addressing is allowed.
CISC supports array. RISC does not supports array.
Arithmetic and logical operations can be applied to both memory and register operands. Arithmetic and logical operations only use register operands. Memory referencing is only allowed by load and store instructions, i.e. reading from memory into a register and writing from a register to memory respectively.
Implementation programs are hidden from machine level programs. The ISA provides a clean abstraction between programs and how they get executed. Implementation programs exposed to machine level programs. Few RISC machines do not allow specific instruction sequences.
Condition codes are used. No condition codes are used.
The stack is being used for procedure arguments and return addresses. Registers are being used for procedure arguments and return addresses. Memory references can be avoided by some procedures.  
Question 121
INCA (Increase register A by 1) is an example of which of the following addressing mode ?
A
Immediate addressing
B
Indirect addressing
C
Implied addressing
D
Relative addressing
Question 122
Which of the following statement(S) is/are true in the context of interpreters ?
  • S1: Interpreters process program according to the logical flow of control through the program
  • S2: Interpreter translates and executes the error free instruction before it goes to the second
  • S3: Interpreter processing time is less compared with compiler
  • S4. LISP and Prolog are interpreted languages
A
Only S1
B
Only S3
C
Only S1,S2 and S3
D
Only S1, S2 and S4
Question 122 Explanation: 
  • S1: Interpreters process program according to the logical flow of control through the program.  TRUE
  • S2: Interpreters translates and executes the error-free first instruction before it goes to the second. TRUE Interpreter goes line-by-line of the program & executes line by line.
  • S3: Interpreter processing time is less compared with compiler. FALSE
    Because Compiler processing time is FASTER than Interpreter.
  • S4: LISP and Prolog are interpreted languages. TRUE Prolog is written to work with Microsoft Windows and is a Compiler version; however, they offer a sample program called ‘PIE', which is a simplified Prolog Interpreter
  •  So, option (D) Only S1, S2 and S4 is CORRECT
Question 123
Which of the following is false?
A
Interrupts which are initially by an instruction are software interrupts
B
When a subordinate is called, the address of the instruction following the CALL instruction is stored in the stack pointer
C
A micro program which is written as 0's and 1's is a binary micro program
D
None of the options
Question 123 Explanation: 
Software interrupts: It is initiated by executing an instruction. These are special call instructions that behaves like an interrupt rather than subroutine call. These can be used by the programmer to initiate an interrupt procedure at any designed point of the program. These interrupts arc usually used for switching to supervisor made from user mode.

CALL instruction is used whenever we need to make a call to some procedure or a subprogram. Whenever a CALL is made, the following process takes place inside the microprocessor:
  • The address of the next instruction that exists in the caller program (after the program CALL instruction) is stored in the stack.
  • The instruction queue is emptied for accommodating the instructions of the procedure.

microprogram
The computer understands only binary language. So, the microprogram should have instructions which are in the form of 0s and 1s. Each output line of the micro-program corresponds to one control signal.

Reference : https://www.includehelp.com/embedded-system/the-call-and-ret-instruction-in-the-8086-microprocessor.aspx#:~:text=The%20CALL%20instruction%20in%20the%208086%20microprocessor&text=The%20address%20of%20the%20next,the%20instructions%20of%20the%20procedure.
Question 124
We have 10 stage pipeline, where the branch target conditions are resolved at stage 5.
How many stalls are there for an incorrect predicted branch?
A
5
B
6
C
7
D
4
Question 124 Explanation: 
  • In General, if the branch instruction is known at Nth stage then the number of stalls would be =  (N - 1)
  • Here Given  N =5
  • Number of stalls = (N-1)=(5-1) = 4 Stall Cycles
Question 125
A RAM chip has 7 address lines, 8 data lines and 2 chips select lines. Then the number of memory locations is___
A
212
B
210
C
219
D
213
Question 125 Explanation: 
Number of data lines (word size) = 8
Number of address lines = 7
Total number of addressable memory locations/number of memory words = 27 = 128
The number of data lines just gives the word size.
Thus, the answer should be 27
Although, if the question. was size of the chip, it is given by 128∗8=210
Question 126
A two word instruction is stored in a location A. The operand part of instruction holds B. if the addressing mode is relative, the operand is available in location
A
A+B+2
B
A+B+1
C
B+1
D
A+B
Question 126 Explanation: 
Relative Addressing Mode :
Effective address of the operand is obtained by adding the content of program counter with the address part of the instruction.

Effective Address (EA) = (Content of Program Counter ) + (Address part of the instruction)
EA = PC + operand part
After fetching instruction PC will be incremented by 2
  • Now , PC = A+2
  • operand part = B.
Therefore Effective Address = A+B+2.
Question 127
In a particular system it is observed that, The cache performance gets improved as a result of increasing the block size of The cache.
The primary reason behind this is:
A
Programs exhibits temporal locality
B
Programs have small working set
C
Read operation is frequently required rather than write operation
D
Programs exhibits spatial locality
Question 127 Explanation: 
Temporal locality refers to the reuse of specific data and/or resources within relatively small time durations.
Spatial locality refers to the use of data elements within relatively close storage locations.
To exploit the spatial locality, more than one word are put into cache block.
References: http://en.wikipedia.org/wiki/Locality_of_reference

The Principle of Locality of Reference justifies the use of cache Memory.
In other words, Locality of Reference refers to the tendency of the computer program to access instructions whose addresses are near one another.

locality of reference. There are two ways with which data or instruction is fetched from main memory and get stored in cache memory. These two ways are the following:

Temporal Locality :
Temporal locality means current data or instruction that is being fetched may be needed soon.
In Temporal Locality The Least Recently Algorithm is Used (LRU)
Clustering in time: items referenced in the immediate past have a high probability of being re-referenced in the immediate future

Spatial Locality:
Spatial locality means instruction or data near to the current memory location that is being fetched, may be needed soon in the near future.
Increasing the block size of the cache comes under this
Clustering in space: items located physically near an item referenced in the immediate past have a high probability of being re-referenced in the immediate future  

Refer : https://www.cs.usask.ca/faculty/bunt/presentations/Locality.ppt 
Question 128
Action implementing instruction's meaning are actually carried out by____
A
Instruction fetch
B
Instruction decode
C
Instruction execution
D
Instruction program
Question 128 Explanation: 
  • The basic function performed by a computer is the execution of a program. The program which is to be executed is a set of instructions which are stored in memory. The central processing unit (CPU) executes the instructions of the program to complete a task.
  • The major responsibility of the instruction execution is with the CPU. The instruction execution takes place in the CPU registers
Reference : https://webservices.ignou.ac.in/virtualcampus/adit/course/cst101/block1/unit1/cst101-bl1-u1-18.htm#:~:text=The%20program%20which%20is%20to,place%20in%20the%20CPU%20registers.
Question 129
The operation executed on data stored in registers is called____
A
Macro operation
B
Micro operation
C
Bit operation
D
Byte operation
Question 129 Explanation: 
Micro Operations
  • The operations executed on data stored in registers are called micro-operations.
  • Micro operation is an elementary operation performed (during one clock pulse), on the information stored in one or more registers.
Examples of microoperation include : shift, load, clear, increment, count, etc.

Types of Micro Operations
Micro-operations are of 4 types:
  • Register transfer micro - operations transfer binary information from one register to another.
  • Arithmetic micro - operations perform arithmetic operations on numeric data stored in registers.
  • Logic micro - operations perform bit manipulation operation on non-numeric data stored in registers.
  • Shift micro - operations perform shift micro-operations performed on data.
Question 130
Hardware mechanism that enables a device to notify the CPU is called:
A
Busy-waiting
B
Interrupt
C
Polling
D
DMA
Question 130 Explanation: 
Interrupt: the hardware mechanism that enables a device to notify the CPU when it is ready for service.
Question 131
How many characters per second (7 bits+1 parity) can be transmitted over a 2400 bps line if the transfer is asynchronous(1 start and 1 stop bit)?
A
240
B
250
C
275
D
300
Question 131 Explanation: 
In synchronous mode of transfer we don’t require start and stop bits
  • Total number of bits per character while transmitting is (7+1)=8 bits
  • No of character transmitted 2400/8=300 bps
In Asynchronous transfer, we need start and stop bits in order to synchronize these bits are added to the number of bits in each character.
  • Total number of bits per character while transmitting is (7+1+1+1)=10 bits
  • No of character transmitted 2400/10=240 bps
 
Question 132
Von neumann computer architecture is____
A
SISD
B
SIMD
C
MIMD
D
MISD
Question 132 Explanation: 
SISD (single instruction stream, single data stream) is a computer architecture in which a single uni-core processor executes a single instruction stream, to operate on data stored in a single memory. This corresponds to the von Neumann architecture.

SISD is one of the four main classifications as defined in Flynn's taxonomy.

Reference : https://en.wikipedia.org/wiki/SISD#:~:text=This%20corresponds%20to%20the%20von,present%20in%20the%20computer%20architecture.
Question 133
The Communication between the components in a microcomputer takes place via the address and ____
A
I/O bus
B
Data bus
C
Address bus
D
Control lines
Question 133 Explanation: 
In isolation, the microprocessor, the memory and the input/output ports are interesting components, but they cannot do anything useful. In combination, they can form a complete system if they can communicate with each other. This communication is accomplished over bundles of signal wires (known as buses) that connect the parts of the system together.

There are normally three types of bus in any processor system:
    • An address bus: this determines the location in memory that the processor will read data from or write data to.
    • A data bus: this contains the contents that have been read from the memory location or are to be written into the memory location.
    • A control bus: this manages the information flow between components indicating whether the operation is a read or a write and ensuring that the operation happens at the right time.
reoad
Question 134
An interface that provides I/o transfer of data directly to and from the memory unit and the peripheral is termed as_____
A
DDA
B
Serial Interface
C
BR
D
DMA
Question 134 Explanation: 
  • In the Direct Memory Access (DMA) the interface transfer the data into and out of the memory unit through the memory bus.
  • The transfer of data between a fast storage device such as magnetic disk and memory is often limited by the speed of the CPU.
  • Removing the CPU from the path and letting the peripheral device manage the memory buses directly would improve the speed of transfer.
  • This transfer technique is called Direct Memory Access (DMA)
Question 135
Match list I with list II and select the correct answer using the codes given below the lists.
A
1 2 3 4
B
3 2 4 1
C
2 3 1 4
D
1 4 2 3
Question 135 Explanation: 
  • zero-address instruction An instruction that contains no address fields; operand sources and destination are both implicit. It may for example enable stack processing: a zero-address instruction implies that the absolute address of the operand is held in a special register that is automatically incremented (or decremented) to point to the location of the top
  • One-address instructions use an implied accumulator (AC) register for all data manipulation. For multiplication and division there is a need for a second register. However, here we will neglect the second and assume that the AC contains the result of tall operations.
  • In Two address instruction each address field can specify either a processor register or a memory word.
  • In three-address instruction each address field to specify either a processor register or a memory operand.
Question 136
A microprogrammed control unit
A
Is faster than a hardwired unit
B
Facilitates easy implementation of a new instruction
C
Is useful when small programs are to be run
D
All of the above
Question 136 Explanation: 
Microprogrammed control unit facilitates easy implementation of new instructions is suitable answer because we can add new instruction by changing the content of control memory.
HARDWIRED CONTROL UNIT MICROPROGRAMMED CONTROL UNIT
Hardwired control unit generates the control signals needed for the processor using logic circuits Micrprogrammed control unit generates the control signals with the help of micro instructions stored in control memory
Hardwired control unit is faster when compared to microprogrammed control unit as the required control signals are generated with the help of hardwares This is slower than the other as micro instructions are used for generating signals here
Difficult to modify as the control signals that need to be generated are hard wired Easy to modify as the modification need to be done only at the instruction level
More costlier as everything has to be realized in terms of logic gates Less costlier than hardwired control as only micro instructions are used for generating control signals
It cannot handle complex instructions as the circuit design for it becomes complex It can handle complex instructions
Only limited number of instructions are used due to the hardware implementation Control signals for many instructions can be generated
Used in computer that makes use of Reduced Instruction Set Computers(RISC) Used in computer that makes use of Complex Instruction Set Computers(CISC)
 
ATTRIBUTES HARDWIRED CONTROL UNIT MICROPROGRAMMED CONTROL UNIT
1. Speed Speed is fast Speed is slow
2. Cost of Imlementation More costlier. Cheaper.
3. Flexibility Not flexible to accommodate new system specification or new instruction redesign is required. More flexible to accommodate new system specification or new instruction sets.
4. Ability to Handle Complex Instructions Difficult to handle complex intruction sets. Easier to handle complex intruction sets.
5. Decoding Complex decoding and sequencing logic. Easier decoding and sequencing logic.
6. Applications RISC Microprocessor CISC Microprocessor
7. Instruction set of Size Small Large
8. Control Memory Absent Present
9. Chip Area Required Less More
10. Occurrence Occurrence of error is more Occurrence of error is less
Question 137
Which level of RAID refers to disk mirroring with block striping?
A
RAID level 1
B
RAID level 2
C
RAID level 0
D
RAID level 3
Question 137 Explanation: 
RAID level 1 refers to disk mirroring with block striping.
  • RAID 0 (also known as a stripe set or striped volume) splits ("stripes") data evenly across two or more disks, without parity information, redundancy, or fault tolerance.
  • RAID 1 consists of an exact copy (or mirror) of a set of data on two or more disks; a classic RAID 1 mirrored pair contains two disks
  • RAID 2, which is rarely used in practice, stripes data at the bit (rather than block) level, and uses a Hamming code for error correction.
  • RAID 3, which is rarely used in practice, consists of byte-level striping with a dedicated parity disk.
  • RAID 4 consists of block-level striping with a dedicated parity disk.
  • RAID 5 consists of block-level striping with distributed parity. Unlike in RAID 4, parity information is distributed among the drives. It requires that all drives but one be present to operate
  • RAID 6 extends RAID 5 by adding another parity block; thus, it uses block-level striping with two parity blocks distributed across all member disks
Question 138
Which of the following is not a form of main memory?
A
Instruction cache
B
Instruction register
C
Instruction Opcode
D
Translation lookaside buffer
Question 138 Explanation: 
  • Instruction Cache  :  Used for storing frequently used instructions
  • Instruction Register  :  Part of CPU’s control unit that stores the instruction currently being executed
  • Instruction Opcode : The instruction opcode is a part of the instruction which tells the processor what operation is to be performed so it is not a form of memory while the others are instruction cache, instruction register and translation look a side buffer are the forms of memory
  • Translation Lookaside Buffer : It is a memory cache that stores recent translations of virtual memory to physical addresses for faster access.
Question 139
____refers to these attributes of a system visible to a programmer or, put another way, those attributes that have a direct impact on the logical execution of a program
A
Computer organization
B
Computer architecture
C
Microprocessor
D
Bus
Question 139 Explanation: 
Computer architecture refers to those attributes of a system visible to a programmer, or put another way, those attributes that have a direct impact on the logical execution of a program.

Computer organization refers to the operational units and their interconnection that realize the architecture specification.

Examples of architecture attributes include the instruction set, the number of bit to represent various data types (e.g.., numbers, and characters), I/O mechanisms, and technique for addressing memory. Organization attributes include those hardware details transparent to the programmer, such as control signals, interfaces between the computer and peripherals, and the memory technology used.

As an example, it is an architectural design issue whether a computer will have a multiply instruction. It is an organizational issue whether that instruction will be implemented by a special multiply unit or by a mechanism that makes repeated use of the add unit of the system. The organization decision may be bases on the anticipated frequency of use of the multiply instruction, the relative speed of the two approaches, and the cost and physical size of a special multiply unit.

  Refer : https://voer.edu.vn/c/introduction-to-organization-and-architecture-of-computer/c5bb8246/94a52c13#:~:text=Organization%20and%20Architecture,-In%20describing%20computer&text=Computer%20architecture%20refers%20to%20those,logical%20execution%20of%20a%20program.
Question 140
_____ is the first Intel x86 microprocessor with a dual core, referring to the implementation of two processors on a single chip
A
Core
B
Core 2 duo
C
Dual core
D
Centrino
Question 140 Explanation: 
  1. Core : It is the first Intel microprocessor with dual core that is the implementation of 2 processors on a single chip. There is an addition of Visualizing Technology.
  2. Core 2 : It extends the architecture to 64-bits and core 2 Quad provides four processors on a single chip. The register set as well as addressing modes are of 64-bits.
  3. Dual-Core : A dual-core processor is a CPU with two processors or "execution cores" in the same integrated circuit. Each processor has its own cache and controller, which enables it to function as efficiently as a single processor.
Question 141
_____chips are high speed processor that are known for their small die size and low power requirements. They are widely used in PDAs and other handheld devices, including games and phones as well as a large variety of consumer products. It is probably the most widely used embedded processor architecture and indeed the most widely used processor architecture of any kind in the world.
A
HAND
B
LEG
C
ARM
D
SUN
Question 141 Explanation: 
  • An ARM processor is one of a family of CPUs based on the RISC (reduced instruction set computer) architecture developed by Advanced RISC Machines (ARM)
  • ARM makes 32-bit and 64-bit RISC multi-core processors.
  • ARM processors are extensively used in consumer electronic devices such as smartphones, tablets, multimedia players and other mobile devices, such as wearables. Because of their reduced instruction set, they require fewer transistors, which enables a smaller die size for the integrated circuitry (IC). The ARM processor’s smaller size, reduced complexity and lower power consumption makes them suitable for increasingly miniaturized devices.
Refer : https://whatis.techtarget.com/definition/ARM-processor#:~:text=An%20ARM%20processor%20is%20one,bit%20RISC%20multi%2Dcore%20processors.
Question 142
_____ memory is intended to give memory speed approaching that of the fastest memories available, and at the same time provide a large memory size at the price of less expensive types of semiconductor memories
A
Register
B
Counter
C
Flip flop
D
Cache
Question 142 Explanation: 
Cache memory is intended to give memory speed approaching that of the fastest memories available, and at the same time provide a large memory size at the price of less expensive types of semiconductor memories. The concept is illustrated in figure below. reload gatee cse image
  • Cache contains a copy of portions of main memory. When the processor attempts to read a word of memory, a check is made to determine if the word is in the cache. If so, the word is delivered to the processor. If not, a block of main memory, consisting of some fixed number of words, is read into the cache and then the word is delivered to the processor.
  • Because of the phenomenon of locality of reference, when a block of data is fetched into the cache to satisfy a single memory reference, it is likely that there will be future references to that same memory location or to other words in the block
Question 143
____ are used to access data on secondary, sequential access stores, such as disks and tapes.
A
Sequences
B
Arrays
C
Records
D
Registers
Question 143 Explanation: 
  • File consists of records. There are typically several records per block.
  • Records are used to access data on secondary, sequential access stores, such as disks and tapes.
Question 144
The positioning time or random access time, consists of two parts: The time necessary to move the disk arm to the desired cylinder, called
A
Seek time
B
Rotational latency
C
Flash drives
D
Transfer rate
Question 144 Explanation: 
The positioning time, or random-access time, consists of two parts: the time necessary to move the disk arm to the desired cylinder, called the seek time, and the time necessary for the desired sector to rotate to the disk head, called the Rotational latency.

Seek latency is not linearly proportional to the seek distance due to arm starting and stopping inertia.

Seek Time :
  • The time taken by the read / write head to reach the desired track is called as seek time.
  • It is the component which contributes the largest percentage of the disk service time.
  • The lower the seek time, the faster the I/O operation
Rotational Latency :
  • The time taken by the desired sector to come under the read / write head is called as rotational latency.
  • It depends on the rotation speed of the spindle.
Average rotational latency = 1 / 2 * Time taken for full rotation
Question 145
The term ___ is used for the larger, more powerful computers other than supercomputers. It supports a large database, has elaborate I/O hardware, and is used in a central data processing facility
A
Minicomputer
B
Supercomputer
C
Mainframe
D
Microcomputer
Question 145 Explanation: 
  • Mainframe computers or mainframes are computers used primarily by large organizations for critical applications; bulk data processing,
  • Mainframe computers are larger and have more processing power than some other classes of computers: minicomputers, servers, workstations, and personal computers.
Reference :  https://en.wikipedia.org/wiki/Mainframe_computer
Question 146
This was the first general purpose microprocessor. It was designed to be the CPU of a general purpose micro computer. It was faster, had a richer instruction set and a larger addressing capability. Which microprocessor are we discussing?
A
4004
B
8008
C
8080
D
All of the these
Question 146 Explanation: 
  •  8080 is  first single-chip microprocessor, began in 1972
  • 4-bit 4004 released in 1971, and the first 8-bit processor, the 8008, in 1972.
  • Both devices – released within five months of each other – had been breakthroughs.
  •  Both the 4004 and 8008 operated as components in four-chip sets, and their practical applications were limited.
  • Single-chip microprocessor with speed and usability.
Reference : https://newsroom.intel.com/articles/intel-50-8080-microprocessor/#gs.fb2ze3
Question 147
The____ is popular high bandwidth, processor independent bus that can function as a mezzanine or peripheral bus
A
Peripheral component interconnect(PCI)
B
Peripheral component disconnect(PCD)
C
Input output connect
D
Array connect
Question 147 Explanation: 
PCI Bus
  • Peripheral Component Interconnection
  • Intel released to public domain, in 1990.
  • 32 or 64 bit
  •  50 lines
  • PCI is a high bandwidth processor-independent bus that function as a mezzanine or peripheral bus.
  • Better system performance for high speed I/O subsystems (e.g graphic display adaptor network controllers, disk controllers, etc.)
  • Currently allows: 64 data bus, 66 MHz and Transfer rate of 528 Mbyte/s, or 4.224 Gbps.
Question 148
The following data refers to a hard disk ;
  • Number of tracks per side=600;
  • Number of sides=2;
  • Number of bytes per sector=512;
  • Storage capacity in bytes=21 504 000
Determine the number of sectors per track for this hard disk
A
35
B
40
C
45
D
50
Question 148 Explanation: 
Given data
  • Number of tracks per side=600;
  • Number of sides=2;
  • Number of bytes per sector=512;
  • Storage capacity in bytes=21 504 000
Total Storage Capacity = ( Number of sides)  * (Number of Tracks per side)  * (Number of Sectors per Track) * (Number of Bytes per Sector)

In this question we have to find Number of Sectors per Track

Number of Sectors per Track = [ (Total Storage Capacity) / ( Number of sides)  * (Number of Tracks per side)  *  (Number of Bytes per Sector) ]

Number of Sectors per Track = (21 504 000) / 2 * 600 * 512
Number of Sectors per Track = 35
Question 149
The technology that stores only the essential instructions on a microprocessor chip and thus enhances its speed is referred to as
A
MIMD
B
CISC
C
RISC
D
SIMD
Question 149 Explanation: 
CISC RISC
Focus on software Focus on hardware
Uses only Hardwired control unit Uses both hardwired and micro programmed control unit
Transistors are used for more registers Transistors are used for storing complex Instructions
Fixed sized instructions Variable sized instructions
Can perform only Register to Register Arthmetic operations Can perform REG to REG or REG to MEM or MEM to MEM
Requires more number of registers Requires less number of registers
Code size is large Code size is small
A instruction execute in single clock cycle Instruction take more than one clock cycle
A instruction fit in one word Instruction are larger than size of one word
A large number of instructions are present in the architecture. Very fewer instructions are present. The number of instructions are generally less than 100.
Some instructions with long execution times. These include instructions that copy an entire block from one part of memory to another and others that copy multiple registers to and from memory. No instruction with a long execution time due to very simple instruction set. Some early RISC machines did not even have an integer multiply instruction, requiring compilers to implement multiplication as a sequence of additions.
Variable-length encodings of the instructions. Example: IA32 instruction size can range from 1 to 15 bytes. Fixed-length encodings of the instructions are used. Example: In IA32, generally all instructions are encoded as 4 bytes.
Multiple formats are supported for specifying operands. A memory operand specifier can have many different combinations of displacement, base and index registers. Simple addressing formats are supported. Only base and displacement addressing is allowed.
CISC supports array. RISC does not supports array.
Arithmetic and logical operations can be applied to both memory and register operands. Arithmetic and logical operations only use register operands. Memory referencing is only allowed by load and store instructions, i.e. reading from memory into a register and writing from a register to memory respectively.
Implementation programs are hidden from machine level programs. The ISA provides a clean abstraction between programs and how they get executed. Implementation programs exposed to machine level programs. Few RISC machines do not allow specific instruction sequences.
Condition codes are used. No condition codes are used.
The stack is being used for procedure arguments and return addresses. Registers are being used for procedure arguments and return addresses. Memory references can be avoided by some procedures.  
Question 150
When a subroutine is called, the address of the instruction following the CALL instruction stored in/on the____
A
Program counter
B
Stack
C
Stack pointer
D
Accumulator
Question 150 Explanation: 
 Subroutine 
A set of Instructions which are used repeatedly in a program can be referred to as Subroutine. Only one copy of this Instruction is stored in the memory. When a Subroutine is required it can be called many times during the Execution of a Particular program. A call Subroutine Instruction calls the Subroutine. Care Should be taken while returning a Subroutine as Subroutine can be called from a different place from the memory.

The content of the PC must be Saved by the call Subroutine Instruction to make a correct return to the calling program.

Refer : https://www.quora.com/How-did-the-call-instruction-work-in-the-8085-microprocessor

Refer : https://www.geeksforgeeks.org/subroutine-subroutine-nestin.
Question 151
A register in the microprocessor that keeps track of the answer or resulting of any arithmetic or logic operation is the___
A
Accumulator
B
Stack pointer
C
Program Counter
D
Instruction pointer
Question 151 Explanation: 
  • ALU is the computational center of the CPU. It performs all mathematical and logical operations.
  • The accumulator is a register in which intermediate arithmetic and logic results are stored.
  • Without a register like an accumulator, it would be necessary to write the result of each calculation (addition, multiplication, shift, etc.) to main memory, perhaps only to be read right back again for use in the next operation. Access to main memory is slower than access to a register like the accumulator
Reference : https://en.wikipedia.org/wiki/Accumulator_(computing)
Question 152
On which of the following storage media, storage of information is organized as a single continuous spiral groove?
A
CD-ROM
B
RAM
C
Hard disk
D
Floppy disk
Question 153
Which of the following memory improves the speed of execution of a program?
A
Virtual memory
B
Primary memory
C
Secondary memory
D
Cache memory
Question 153 Explanation: 
  • Program which is to be executed is loaded in the main memory. Processor then fetches the code and data from the main memory to execute the program.
  • DRAM's (main memory ) are slower devices. So it is necessary to insert wait states in memory read / write cycles. This reduces the speed of execution.
  • To speed up the process, high speed memories such as SRAMs(cache) are introduced
  • In the memory system small sections of SRAM is added along with main memory, is referred to as cache memory
Question 154
In which addressing mode, the operand is given explicitly in the instruction (Example instruction: ADD R4,#3) ?
A
Based indexed mode
B
Absolute mode
C
Immediate mode
D
Register indirect mode
Question 154 Explanation: 
The instruction is using immediate addressing mode hence the value is stored in the location 3 is added.

Immediate addressing mode
In immediate addressing mode  when the instruction is assembled, the operand comes immediately after the opcode.
Notice that the immediate data must be preceded by the pound sign, “#”.
This addressing mode can be used to load information into any of the registers, including the DPTR register.
Examples follow :
MOV AL, 35H (move the data 35H into AL register)
Question 155
Which of the following is not a program instruction?
A
CMP
B
MOV
C
JMP
D
CALL
Question 155 Explanation: 
  • Direct Addressing Mode Effective address of operand is present in instruction itself.
  • Single memory reference to access data.
  • No additional calculations to find the effective address of the operand.
  • Usually indicated by variable names
Refer for More information : 
https://www.studytonight.com/computer-architecture/addressingmodes-instructioncycle#:~:text=Direct%20Addressing%20Mode&text=For%20Example%3A%20ADD%20R1%2C%204000,location%20where%20operand%20is%20present.
Question 156
The addressing mode used in an instruction of the form ADD X,Y is:
A
Index
B
Absolute
C
Immediate
D
Indirect
Question 156 Explanation: 
  • Direct Addressing Mode Effective address of operand is present in instruction itself.
  • Single memory reference to access data.
  • No additional calculations to find the effective address of the operand.
  • Usually indicated by variable names
Refer for More information : 
https://www.studytonight.com/computer-architecture/addressingmodes-instructioncycle#:~:text=Direct%20Addressing%20Mode&text=For%20Example%3A%20ADD%20R1%2C%204000,location%20where%20operand%20is%20present.
Question 157
Program counter contents indicate
A
The time needed to execute a program
B
The time elapsed since execution begins
C
The address where next instruction is stored
D
The count of programs being executed after switching the power ON
Question 157 Explanation: 
The Program Counter (PC) register keeps track of the execution of the program. It contains the memory address of the instruction currently being executed . During the execution of the current instruction, the contents of the PC are updated to correspond to the address of the next instructions to be executed.
Question 158
____ refers to the amount of time required to position the read write head of a hard disk on appropriate sector
A
Load Time
B
Seek time
C
Access time
D
Rotational latency
Question 158 Explanation: 
The positioning time, or random-access time, consists of two parts: the time necessary to move the disk arm to the desired cylinder, called the seek time, and the time necessary for the desired sector to rotate to the disk head, called the Rotational latency.

Seek latency is not linearly proportional to the seek distance due to arm starting and stopping inertia.

Seek Time :
  • The time taken by the read / write head to reach the desired track is called as seek time.
  • It is the component which contributes the largest percentage of the disk service time.
  • The lower the seek time, the faster the I/O operation
Rotational Latency :
  • The time taken by the desired sector to come under the read / write head is called as rotational latency.
  • It depends on the rotation speed of the spindle.
Average rotational latency = 1 / 2 * Time taken for full rotation
Question 159
A digital computer has a memory unit of 64k x 16 and a cache memory of 210 words. The cache uses Direct mapping with a block size of four words. How many bits are there in the tag, index and block Fields of address format?
A
1, 6, 16
B
28
C
6, 8, 2
D
24
Question 159 Explanation: 
Given,
Main Memory Size = 64K * 16
We can write 64k as 216 * 16
∴ Main Memory has 216 words
direct mapping on co
Number of blocks in cache = (Cache size / Block size) = 210/22=28=256
∴ 8 bits for block

Block size = 4 words = 22 words
∴ 2 bits for offset

Tag size = 16 - 8 - 2 = 6 bits
∴ 6 bits for Tag

Tag = 6 bits,
Index = Block = 8 bits,
Offset = Word = 2 bits
Question 160
A computer employs RAM chips of 256x8 ROM chip of 1024x8. The computer system needs 2k bytes of RAM, 4k bytes of ROM and 4 interface units each with four registers. A memory mapped I/O configuration is used. How many RAM and ROM chips are used?
A
4, 16
B
16, 4
C
4, 8
D
8, 4
Question 160 Explanation: 
 RAM and ROM chips
Question 161
EEPROM is
A
Efficiently erasable programmable read only memory
B
Electrically erasable programmable read only memory
C
Electronically erasable programmable read only memory
D
Electrically and Electronically programmable read only memory
Question 161 Explanation: 
  • EEPROM stands for Electrically Erasable Programmable Read-Only Memory.
  • It is a non-volatile ROM chip which used for storing a small amount of data in computers or some other electronic devices.
  • Through EEPROM, an individual byte of data can erase and reprogrammed entirety, not selectively by the electrical voltage
Question 162
A group of bits that tells the computer to perform a specific operation is known as
A
Instruction code
B
Micro operation
C
Accumulator
D
Register
Question 162 Explanation: 
  • Instruction code :The instruction code contains a group of bits that instruct computer to perform operations such as addition, Shift, Subtractions, complement etc. The instruction codes given to computer can also be explained as commands.
  • Op code : op code which is also called operation code contains a group of bits that defines the operations such as addition, Shift, Subtractions, complement etc.
  • Micro operation : micro-operations (also known as micro-ops) are the functional or atomic, operations of a processor. These are low level instructions used in some designs to implement complex machine instructions
  • Accumulator : Accumulator is a register in which intermediate arithmetic and logic results are stored
  • Register : A processor register is a quickly accessible location available to a computer's processor.
Question 163
If a value V(x) of the target operand is contained in the field itself, the addressing mode is called
A
Immediate
B
Direct
C
Indirect
D
Implied
Question 163 Explanation: 
Mentioned in the question "target operand is contained in the address field itself" Then it should be consider as Immediate Addressing Mode.
Question 164
Arrange the following in the order of decreasing access time:
A
Disk,tape,Cache,RAM
B
Tape,Disk,RAM,Cache
C
Cache,RAM,Disk,tape
D
Tape,Disk,cache,RAM
Question 164 Explanation: 
Magnetic tapes > optical disks > magnetic disks > electronic disks > main memory > cache > registers
Question 165
Which of the following is INCORRECT?
A
Non Maskable interrupts are reserved for unrecoverable memory error
B
Vectored interrupt mechanism reduces the need for searching all possible sources of interrupt
C
Priority interrupt mechanism enables preemption of high priority interrupt
D
System calls are implemented using software interrupts
Question 165 Explanation: 
A priority interrupt is a system which decides the priority at which various devices, which generates the interrupt signal at the same time, will be serviced by the CPU. The system has authority to decide which conditions are allowed to interrupt the CPU, while some other interrupt is being serviced. Generally, devices with high speed transfer such as magnetic disks are given high priority and slow devices such as keyboards are given low priority.

When two or more devices interrupt the computer simultaneously, the computer services the device with the higher priority first.
Question 166
Consider the following program fragment in assembly language :
  • mov ax, 0h
  • mov cx, 0A h
  • do loop:
  • dec ax
  • loop do loop
What is the value of ax and cx registers after the completion of the do loop ?
A
Ax=FFF5 h and cx=0 h
B
Ax=FFF6 h and cx=0 h
C
Ax=FFF7 h and cx=0A h
D
Ax=FFF5 h and cx=0A h
Question 166 Explanation: 
Given
ax = 0;
cx = 0Ah = 10 (A=10 in hex;)

loop instruction in 8086 works by decrementing the value of cx register by 1 until it becomes 0h
Do loop will decrement ax and cx value by 1
  • 1st iteration : ax=ax-1 ∴ ax=-1 and cx=cx-1 ∴cx=9
  • 2nd iteration : ax=ax-1 ∴ ax=-2 and cx=cx-1 ∴cx=8
  • 3rd iteration : ax=ax-1 ∴ ax=-3 and cx=cx-1 ∴cx=7
  • 4th iteration : ax=ax-1 ∴ ax=-4 and cx=cx-1 ∴cx=6
  • 5th iteration : ax=ax-1 ∴ ax=-5 and cx=cx-1 ∴cx=5
  • 6th iteration : ax=ax-1 ∴ ax=-6 and cx=cx-1 ∴cx=4
  • 7th iteration : ax=ax-1 ∴ ax=-7 and cx=cx-1 ∴cx=3
  • 8th iteration : ax=ax-1 ∴ ax=-8 and cx=cx-1 ∴cx=2
  • 9th iteration : ax=ax-1 ∴ ax=-9 and cx=cx-1 ∴cx=1
  • 10th iteration : ax=ax-1 ∴ ax=-10 and cx=cx-1 ∴cx=0
  • Now loop breaks because cx became 0
Finally ax=-10(FFF6H) and cx=0h
Question 167
Consider the following assembly program fragment :
  • stc
  • mov al, 11010110b
  • mov cl, 2
  • rcl al, 3
  • rol al, 4
  • shr al, cl
  • mul cl
The contents of the destination register ax (in hexadecimal) and the status of Carry Flag (CF) after the execution of above instructions, are:
A
Ax=003CH; CF=0
B
Ax=001EH; CF=0
C
Ax=007BH; CF=1
D
Ax=00B7H; CF=1
Question 167 Explanation: 
Refer : 169th question in computer organization subject wise for clear explanation
Question 168
Match the following Layers and Protocols for a user browsing with SSL : ugc net

a. Application of layer i. TCP
b. Transport layer ii. IP
c. Network layer iii. PPP
d. Datalink layer iv. HTTP
A
A-(iv), b-(i), c-(ii), d-(iii)
B
A-(iii), b-(ii), c-(i), d-(iv)
C
A-(ii), b-(iii), c-(iv), d-(i)
D
A-(iii), b-(i), c-(iv), d-(ii)
Question 168 Explanation: 
a. Application of layer uses HTTP b. Transport layer uses. TCP c. Network layer uses IP ​​​​​​​ d. Datalink layer uses PPP


Application Layer Protocols : (DNS, SMTP, POP, FTP, HTTP,IMAP,POP3,HTML)

Transport layer uses : TCP,UDP,DTAP,WDP,BSSMAP

Network layer Protocols :
  • CLNS, Connectionless-mode Network Service
  • DDP, Datagram Delivery Protocol
  • EGP, Exterior Gateway Protocol
  • EIGRP, Enhanced Interior Gateway Routing Protocol
  • ICMP, Internet Control Message Protocol
  • IGMP, Internet Group Management Protocol
  • IPsec, Internet Protocol Security
  • IPv4/IPv6, Internet Protocol
  • IPX, Internetwork Packet Exchange
  • OSPF, Open Shortest Path First
  • PIM, Protocol Independent Multicast
  • RIP, Routing Information Protocol
  • WireGuard, WireGuard
  Datalink Layer Protocols
  • Synchronous Data Link Protocol (SDLC)
  • High-Level Data Link Protocol (HDLC) –
  • Serial Line Interface Protocol (SLIP) –
  • Point to Point Protocol (PPP) –
  • Link Control Protocol (LCP) –
  • Network Control Protocol (NCP) –
  • Link Access Procedure (LAP) –
Question 169
Consider the following assembly language instructions :
  • mov al, 15
  • mov ah, 15
  • xor al, al
  • mov cl, 3
  • shr ax, cl
  • add al, 90H
  • adc ah, 0
What is the value in ax register after execution of above instructions ?
A
0270H
B
0170H
C
01E0H
D
0370H
Question 169 Explanation: 
IN  x86 registers say that
  • EAX is the full 32-bit value
  • AX is the lower 16-bits
  • AL is the lower 8 bits
  • AH is the bits 8 through 15 (zero-based)
Example (Hexadecimal digits):
  • EAX: 12 34 56 78
  • AX: 56 78
  • AH: 56
  • AL: 78
  Given problem
In assembly AX=AH+AL
mov al, 15
It means move 15 to lower part of 'ax' register

mov ah, 15
It means move 15 to higher part of 'ax' register
'ax' register = 00001111 00001111

Note : In ax register First 8 bits for ah and second 8 bits for al
AL and Ah both contains 15(F in hexa) so AX contains 0F0F or 00001111 00001111

xor al,al

It means 'XORing lower part of 'ax' register with its own content and storing result back in 'al' , now the 'ax' register content will be
00001111 XOR 00001111 =00000000
'ax' register content:: 0000111100000000

move cl,3
It means move cl = 3
'c' register content = 00000000 00000011

shr ax,cl
ax =00001111 00000000
cl =3
It will take the bit values that are in AX and Shifting those bits to the right 3 places then ax=00000001 11100000 or 01E0 in hexadecimal

add al, 90H

Add hexadecimal 90 to al
0000000111100000
0000000010010000
+0000001001110000

adc ah,0
It means addition with carry which does not affect 'ax' register
So, content of ax register will be 0270H.

Note :
ax = 0000000111100000
90H=0000000010010000 --> (0090)
After addition result is
0000001001110000
Question 170
The contents of Register (BL) and Register (AL) of 8085 microprocessor are 49H and 3AH respectively. The contents of AL, the status of carry flag (CF) and sign flag (SF) after executing ‘SUB AL, BL’ assembly language instruction, are
A
AL = 0FH; CF = 1; SF = 1
B
AL = F0H; CF = 0; SF = 0
C
AL = F1H; CF = 1; SF = 1
D
AL = 1FH; CF = 1; SF = 1
Question 170 Explanation: 
Given (BL) => 49H => 01001001
(AL) => 3AH => 00111010

sub AL - BL

(AL) => 3AH => 00111010
(BL) => 49H => 01001001
-----------------------------------
                        11110001


(AL) => F1H
(CF) => 1
(Sign flag) => 1
Question 171
Match the following w.r.t. Input/Output management :
a. Device controller i. Extracts information from the controller register and store it in data buffer
b. Device driver ii. I/O scheduling
c. Interrupt handler iii. Performs data transfer
d. Kernel I/O subsystem iv. Processing of I/O request
A
A-iii, b-iv, c-i, d-ii
B
A-ii, b-i, c-iv, d-iii
C
A-iv, b-i, c-ii, d-iii
D
A-i, b-iii, c-iv, d-ii
Question 171 Explanation: 
  • Device controller performs data transfer.
  • Device driver process I/O request.
  • Inturrupt handler Extracts information from the controller register and store it in data buffer
  • Kernel I/O subsystem performs I/O scheduling.
Question 172
The content of the accumulator after the execution of the following 8085 assembly language program, is
MVI A, 35H
MOV B, A
STC
CMC
RAR
XRA B
A
00H
B
35H
C
EFH
D
2FH
Question 172 Explanation: 
  • MVI A, 35H  
    move 35H to Accumulator  = 35H = 0011 0101
  • MOV B, A  
    move B to A now register B = 35H
  • STC   
    set carry flag c = 1.
  • CMC 
    complement carry flag  c = not( 1) = 0 now c=0.
  • RAR  
    Each binary bit of the accumulator is rotated right by one position through the Carry flag. And modify carry = D0.
    D7 = previous carry.
    Accumulator = 0001 1010  , carry = 1. (After Rotation)
  • XRA B 
    A= A XOR B
    (0011 0101 ) xor ( 0001 1010 )
    = 0010 1111
     = 2F H 
Question 173
The content of the accumulator after the execution of the following 8085 assembly language program, is:
  • MVI A, 42H
  • MVI B, 05H
  • UGC :
  • ADD B
  • DCR B
  • JNZ UGC
  • ADI 25H
  • HLT
A
82 H
B
78 H
C
76 H
D
47 H
Question 173 Explanation: 
  • MVI A, 42H 
    MOVE 42H to Accumulator Now A = 42H (42H(in hexa) = 66 in decimal by A= 4 * 16 + 2 = 66 in decimal)
  • MVI B, 05H
    MOVE 05H to B Register Now B = 05H ( 05H(in Hexa) = 5 in decimal
  • UGC : Loop runs from B=5 to 1
  • ADD B :
    Register B will be added to Accumulator A ∴ A=66+5=71
  • DCR B :
    Now B value Decremented by 1
  • JNZ UGC :
    means JUMP not equals to zero
    loop will run until B=0
    ∴ mean while B will be added to A
    A=71+4=75
    A=75+3=78
    A=78+2=80
    A=80+1=81
    Now B=0 so loop fails
  • ADI 25H Add 25H to Accumulator (81 + 25H = 81 + 37 =118)
    25(in hexa) =37(in decimal)
    Finally 118 in hexa = 76 in decimal
    01110110 = 76H
  • HLT :
    Halt the problem
Question 174
Pipelining improves performance by:
A
Decreasing instruction latency
B
Eliminating data hazards
C
Exploiting instruction level parallelism
D
Decreasing the cache miss rate
Question 174 Explanation: 
Pipelining improves performance by exploiting instruction level parallelism. For detailed information on pipelining  provided below.

Pipelining : Each instruction is split up into a sequence of stages – different stages can be executed concurrently by different circuitry.

A basic pipeline in a RISC processor
  • IF – Instruction Fetch
  • ID – Instruction Decode
  • EX – Instruction Execution
  • MEM – Memory Access
  • WB – Register Write Back
Question 175
What will be the hexadecimal value in the register ax (32-bit) after executing the following instructions?
  • mov al, 15
  • mov ah, 15
  • xor al, al
  • mov cl, 3
  • shr ax, cl
A
0F00 h
B
0F0F h
C
01E0 h
D
FFFF h
Question 175 Explanation: 
IN  x86 registers say that
  • EAX is the full 32-bit value
  • AX is the lower 16-bits
  • AL is the lower 8 bits
  • AH is the bits 8 through 15 (zero-based)
Example (Hexadecimal digits):
  • EAX: 12 34 56 78
  • AX: 56 78
  • AH: 56
  • AL: 78
  Given problem
In assembly AX=AH+AL
mov al, 15
It means move 15 to lower part of 'ax' register

mov ah, 15
It means move 15 to higher part of 'ax' register
'ax' register = 00001111 00001111

Note : In ax register First 8 bits for ah and second 8 bits for al
AL and Ah both contains 15(F in hexa) so AX contains 0F0F or 00001111 00001111

xor al,al

It means 'XORing lower part of 'ax' register with its own content and storing result back in 'al' , now the 'ax' register content will be
00001111 XOR 00001111 =00000000
'ax' register content:: 0000111100000000

move cl,3
It means move cl = 3
'c' register content = 00000000 00000011

shr ax,cl
ax =00001111 00000000
cl =3
It will take the bit values that are in AX and Shifting those bits to the right 3 places then ax=00000001 11100000 or 01E0 in hexadecimal

Note :
ax = 00000001 11100000
Question 176
Which of the following statements is false?
A
Top-down parsers are LL parsers where first L stands for left - to - right scan and second L stands for a leftmost derivation.
B
(000)* is a regular expression that matches only strings containing an odd number of zeroes, including the empty string.
C
Bottom-up parsers are in the LR family, where L stands for left - to - right scan and R stands for rightmost derivation.
D
The class of context - free languages is closed under reversal. That is, if L is any context- free language, then the language L​ R​ = {w​ R​ : w∈L} is context - free.
Question 176 Explanation: 
  • Option(A) = True
  • Option(B) = False
    (000)* will generate( ε, 000, 000000, 000000000, …….. ) multiples of 3 which include odd and even strings, String contain 6, 12, 18, 24 which are even so this is incorrect.
  • Option(C) = True
  • Option(D) = True
Question 177
In the case of parallelization, Amdahl’s law states that if P is the proportion of a program that can be made parallel and (1 -P) is the proportion that cannot be parallelized, then the maximum speed-up that can be achieved by using N processors is:
A
1/((1−p)+ N .P)
B
1/((N −1)P +P)
C
1/((1−P )+ P /N)
D
1/((P)+(1-P)/N)
Question 177 Explanation: 
troad reload
  • shows that the theoretical speedup of the execution of the whole task increases with the improvement of the resources of the system and that regardless of the magnitude of the improvement, the theoretical speedup is always limited by the part of the task that cannot benefit from the improvement.
  • Amdahl's law applies only to the cases where the problem size is fixed. In practice, as more computing resources become available, they tend to get used on larger problems (larger datasets), and the time spent in the parallelizable part often grows much faster than the inherently serial work. In this case, Gustafson's law gives a less pessimistic and more realistic assessment of the parallel performance
Refer : https://en.wikipedia.org/wiki/Amdahl%27s_law
Question 178
The Register or main memory location which contains the effective address of the operand is known as :
A
Pointer
B
Indexed register
C
Special Locations
D
Scratch Pad
Question 178 Explanation: 
  • Effective address of the operand is the contents of a register or main memory location, location whose address appears in the instruction.
  • The register or memory location that contains the address of the operand is a pointer.
  • When an execution takes place in such mode, instruction may be told to go to a specific address. Once it's there, instead of finding an operand, it finds an address where the operand is located.
Question 179
The principle of Locality of reference justifies the use of :
A
Virtual memory
B
Interrupts
C
Cache memory
D
Secondary memory
Question 179 Explanation: 
The Principle of Locality of Reference justifies the use of cache Memory.
In other words, Locality of Reference refers to the tendency of the computer program to access instructions whose addresses are near one another.

locality of reference. There are two ways with which data or instruction is fetched from main memory and get stored in cache memory. These two ways are the following:

Temporal Locality :
Temporal locality means current data or instruction that is being fetched may be needed soon.
In Temporal Locality The Least Recently Algorithm is Used (LRU)
Clustering in time: items referenced in the immediate past have a high probability of being re-referenced in the immediate future

Spatial Locality:
Spatial locality means instruction or data near to the current memory location that is being fetched, may be needed soon in the near future.
Clustering in space: items located physically near an item referenced in the immediate past have a high probability of being re-referenced in the immediate future  

Refer : https://www.cs.usask.ca/faculty/bunt/presentations/Locality.ppt 
Question 180
The first operating system of Microprocessor is __________ .
A
ATLAS
B
CP/M
C
SAGE
D
T.H.E.
Question 180 Explanation: 
In 1976, the first operating system for these Intel-based personal computers was written by a system programmer named Gary Kildall. As a consultant for Intel, he developed an operating system called CP/M (Contro Program for Micros) for Intel 8080.
Question 181
The size of the ROM required to build an 8-bit adder/subtractor with mode control, carry input, carry output and two’s complement overflow output is given as
A
2​ 16​ * 8
B
2​ 18​ * 10
C
2​ 16​ * 10
D
2​ 18​ * 8
Question 181 Explanation: 
  • Total input to the ROM decoder will be (8+8 ( two 8 bit number ) +1( mode ) +1( carry in))
  • Total number of words out of decoder will be 218 .
  • Result will be 8 bit so 8 vertical lines +( 1 for carry ) +1 ( for saying underflow) .
Question 182
The speed up of a pipeline processing over an equivalent non-pipeline processing is defined by the ratio :
Where
n → no. of tasks
tn→ time of completion of each task
k → no. of segments of pipeline
tp → clock cycle time
S → speed up ratio
A
S =n tn/(k + n – 1)tp
B
S =n tn/(k + n + 1)tp
C
S =n tn/(k – n + 1)tp
D
S =(k + n – 1)tp/n tn
Question 182 Explanation: 
Without pipeline 1st task takes tn time. Then N tasks need N*tn time.

With pipeline
  • 1st task takes  k cycles to finish then time will be k * tp
  • Remaining (n-1) tasks needs tp time only to finish.
  • Total time will be Time for first + remaining (n-1 task's) *  tp time
  • ∴ Total time = (k+ n -1 ) tp
Speed up = T pipeline / T without pipeline Speed up  = n t n / (k+n-1) t p
Question 183
In which addressing mode, the effective address of the operand is generated by adding a constant value to the contents of register ?
A
Absolute
B
Indirect
C
Immediate
D
Index
Question 183 Explanation: 
In Index mode addressing mode, the effective address of the operand is generated by adding a constant value to the contents of a register. The address of the operand is obtained by adding to the contents of the general register (called index register) a constant value. The number of the index register and the constant value are included in the instruction code. Index Mode is used to access an array whose elements are in successive memory locations. The content of the instruction code, represents the starting address of the array and the value of the index register, and the index value of the current element. By incrementing or decrementing index register different element of the array can be accessed. The term addressing modes refers to the way in which the operand of an instruction is specified. Information contained in the instruction code is the value of the operand or the address of the result/operand.
Question 184
A graphic display system has a frame buffer that is 640 pixels wide, 480 pixels high and 1 bit of color depth. If the access time for each pixel on the average is 200 nanoseconds, then the refresh rate of this frame buffer is approximately :
A
16 frames per second
B
19 frames per second
C
21 frames per second
D
23 frames per second
Question 184 Explanation: 
Framebuffer is the size of the maximum image that can be displayed. Screen forms a Matrix of pixels with width of 640 and height of 480.
Refer : https://en.wikipedia.org/wiki/Linux_framebuffer

Given :
Width = 640 px
height = 480 px
color depth = 1 bit / px

No of total pixels in the frame buffer = (width  * height)= 640 px * 480 px = 307200
Memory required by frame buffer = Memory required for total pixel = ( Total pixels in the frame buffer ) * (Color depth) = 307200 * 1

1 pixel takes 200 nano second to refresh
To refresh the whole "screen" or "frame buffer" = Memory required by frame buffer x 200 ns = 640 x 480 x 200 ns = 61440000 nano second = 61440000 x 10−9 second

Then, refresh rate of frame buffer =
number of frame changes per second = 1 / 61440000 x 10−9 second = 100,00,00,000 / 61440000 = 100,000 / 6144 = 16.2760 = 16 
Question 185
Which of the following statements is/are True regarding the solution to the visibility problem in 3D graphics ?
S1 : The Painter’s algorithm sorts polygons by depth and then paints (scan - converts) each Polygon onto the screen starting with the most nearest polygon.
S2 : Backface Culling refers to eliminating geometry with back facing normals.
A
S1 only
B
S2 only
C
Both S1 and S2
D
Neither S1 Nor S2
Question 185 Explanation: 
For S1 Statement :
The painter's algorithm, also known as a priority fill, is one of the simplest solutions to the visibility problem in 3D computer graphics. The name "painter's algorithm" refers to the technique employed by many painters for painting distant parts of a scene before parts which are nearer thereby covering some areas of distant parts. The painter's algorithm sorts all the polygons in a scene by their depth and then paints them in this order, farthest to closest. It will paint over the parts that are normally not visible which solving the visibility problem at the cost of having painted invisible areas of distant objects.
So according to above paragraph the option S1 is FALSE.

For S2 Statement :
Back-face culling is an important part of how a 3D engine performs visibility checks. Its purpose is to detect polygons that are invisible in a particular scene that is, polygons that face away from the viewer. The process is similar to clipping, which determines if polygons are within the camera's field of view at all, and if not, are not rendered.
Back-face culling is a method in computer graphics programming which determines whether a polygon of a graphical object is visible; if it is not, the polygon is "culled" from rendering process, which increases efficiency by reducing the number of polygons that the hardware has to draw.
The vertices of front-facing polygons wind in a clockwise fashion, so polygons that face away from the camera are in a counter-clockwise order relative to the current view. When back-faces are culled, these polygons are not drawn.
So according to above paragraph the option S2 is TRUE.

Statement S2 only true statement.

So, Option (2) is correct answer.

Reference : Painter’s Algorithm
Reference 1 : Painter’s Algorithm
Reference 2 : A Compact Method for Backface Culling
Question 186
Normally user programs are prevented from handling I/O directly by I/O instructions in them. For CPUs having explicit I/O instructions, such I/O protection is ensured by having the I/O instructions privileged. In a CPU with memory mapped I/O, there is no explicit I/O instruction. Which one of the following is true for a CPU with memory mapped I/O ?
A
I/O protection is ensured by operating system routines.
B
I/O protection is ensured by a hardware trap.
C
I/O protection is ensured during system configuration.
D
I/O protection is not possible.
Question 186 Explanation: 
  • Memory mapped I/O means, accessing I/O via general memory access as opposed to specialized IO instructions.
  • Programmer can directly access any memory location directly. To prevent such an access, the OS (kernel) will divide the address space into kernel space and user space. An user application can easily access user application. To access kernel space, we need system calls (traps)
  • User applications are not allowed to perform I/O in user mode – All I/O requests are handled through system calls that must be performed in kernel mode.
  • This means explicit I/O is done at kernel mode , it can not done in user mode.
  • In a CPU with memory mapped I/O, there is no explicit I/O instruction so protection is ensured by operating system routines only .
  • As in kernel mode only OS can handle the task . And Kernal mode deals with system calls.
So, IO protection is ensured by OS abstraction.
Question 187
Which of the following mapping is not used for mapping process in cache memory?
A
Associative mapping
B
Direct mapping
C
Set-Associative mapping
D
Segmented - page mapping
Question 187 Explanation: 
Cache mapping is performed using following three different techniques :
  1. Direct Mapping
  2. Fully Associative Mapping
  3. K-way Set Associative Mapping
Question 188
In 8085 microprocessor, what is the output of following program ?
LDA 8000H
MVI B, 30H
ADD B
STA 8001H
A
Read a number from input port and store it in memory
B
Read a number from input device with address 8000H and store it in memory at location 8001H
C
Read a number from memory at location 8000H and store it in memory location 8001H
D
Load A with data from input device with address 8000H and display it on the output device with address 8001H
Question 188 Explanation: 
  • I/O devices are identified by 16-bit addresses
  • 8085 communicates with an I/O device as if it were one of the memory locations
  • Memory related instructions are used
        For e.g. LDA, STA
LDA 8000H
Loads A with data read from input device with 16-bit address 8000H
STA 8001H
Stores (Outputs) contents of A to output device with 16-bit address 8001H

Reading a number from input port (port address 8000H) and display it on ASCII display connected to output port (port address 8001H)
  • LDA 8000H  ; reads data value 03H (example)into ; Accumulator, A = 03H
  • MVI B, 30H  ;  loads register B with 30H
  • ADD B            ;   A = 33H, ASCII code for 3
  • STA 8001H   ;  display 3 on ASCII display


Option(D) is Most Appropriate
Question 189
The branch logic that provides making capabilities in the control unit is known as
A
Controlled transfer
B
Conditional transfer
C
Unconditional transfer
D
None of the above
Question 189 Explanation: 
Question 190
Cached and interleaved memories are ways of speeding up memory access between CPU’s and slower RAM. Which memory models are best suited (i.e. improves the performance most) for which programs ?
(i) Cached memory is best suited for small loops.
(ii) Interleaved memory is best suited for small loops
(iii) Interleaved memory is best suited for large sequential code.
(iv) Cached memory is best suited for large sequential code.
A
(i) and (ii) are true.
B
(i) and (iii) are true.
C
(iv) and (ii) are true.
D
(iv) and (iii) are true.
Question 190 Explanation: 
  • Compared to the processor speed, the speed of the primary memory is slow. Cache memory is a small memory which sits in between the processor and primary memory and fetches information to the processor at a much higher speed or it makes it appear .
  • Caching can be effective based on a property of computer programs called locality of reference. Analysis of program show that the majority of the execution time is spent around a small part of the program may be a simple loop, nested loop or a few functions. The rest of the program is accessed infrequently.
The Principle of Locality of Reference justifies the use of cache Memory.
In other words, Locality of Reference refers to the tendency of the computer program to access instructions whose addresses are near one another.

locality of reference. There are two ways with which data or instruction is fetched from main memory and get stored in cache memory. These two ways are the following:

Temporal Locality :
Temporal locality means current data or instruction that is being fetched may be needed soon.
In Temporal Locality The Least Recently Algorithm is Used (LRU)
Clustering in time: items referenced in the immediate past have a high probability of being re-referenced in the immediate future

Spatial Locality:
Spatial locality means instruction or data near to the current memory location that is being fetched, may be needed soon in the near future.
Clustering in space: items located physically near an item referenced in the immediate past have a high probability of being re-referenced in the immediate future  

Refer : https://www.cs.usask.ca/faculty/bunt/presentations/Locality.ppt 

Interleaved memory
  • It is a technique for increasing the speed of RAM. Here multiple memory chips are grouped together to form what are known as banks. Each of them take turns for supplying data.
  • An interleaved memory with "n" banks is said to be n-way interleaved. Macintosh systems are considered to be one using memory interleaving.
So the answer for this question is option B.
Question 191
Interrupts which are initiated by an instruction are
A
Internal
B
External
C
Hardware
D
Software
Question 191 Explanation: 
  • A software interrupt is a type of interrupt that is caused either by a special instruction in the instruction set or by an exceptional condition in the processor itself.
  • A software interrupt is invoked by software, unlike a hardware interrupt, and is considered one of the ways to communicate with the kernel or to invoke system calls, especially during error or exception handling
Reference : http://www.cs.unc.edu/~dewan/242/s04/notes/ipc/node3.html

What is an Interrupt ?
Interrupt is a signal which has highest priority from hardware or software which processor should process its signal immediately.

Types of Interrupts:

Although interrupts have highest priority than other signals, there are many type of interrupts but basic type of interrupts are
  1. Hardware Interrupts: If the signal for the processor is from external device or hardware is called hardware interrupts. Example: from keyboard we will press the key to do some action this pressing of key in keyboard will generate a signal which is given to the processor to do action, such interrupts are called hardware interrupts. Hardware interrupts can be classified into two types they are
    • Maskable Interrupt: The hardware interrupts which can be delayed when a much highest priority interrupt has occurred to the processor.
    • Non Maskable Interrupt: The hardware which cannot be delayed and should process by the processor immediately.
  2. Software Interrupts: Software interrupt can also divided in to two types. They are
    • Normal Interrupts: the interrupts which are caused by the software instructions are called software instructions.
    • Exception: unplanned interrupts while executing a program is called Exception. For example: while executing a program if we got a value which should be divided by zero is called a exception.
Classification of Interrupts According to Periodicity of Occurrence:
  1. Periodic Interrupt: If the interrupts occurred at fixed interval in timeline then that interrupts are called periodic interrupts
  2. Aperiodic Interrupt: If the occurrence of interrupt cannot be predicted then that interrupt is called aperiodic interrupt.
Classification of Interrupts According to the Temporal Relationship with System Clock:
  1. Synchronous Interrupt: The source of interrupt is in phase to the system clock is called synchronous interrupt. In other words interrupts which are dependent on the system clock. Example: timer service that uses the system clock.
  2. Asynchronous Interrupts: If the interrupts are independent or not in phase to the system clock is called asynchronous interrupt
Refer : https://www.electronicshub.org/types-of-interrupts-and-how-to-handle-interrupts/#Types_of_Interrupts
Question 192
A complete microcomputer system consists of
A
Microprocessor
B
Memory
C
Peripheral equipment
D
All of the above
Question 192 Explanation: 
A microcomputer system is a microprocessor-based computer, consisting of an MPU, Internal semiconductor memory, Input and out and output sections, and System bus, all on one.it can also consist of several monolithic IC chips inserted into one or several PC boards.
Question 193
Pipelining strategy is called implement
A
Instruction execution
B
Instruction prefetch
C
Instruction decoding
D
Instruction manipulation
Question 193 Explanation: 
Instruction prefetch 
  • A technique which attempts to minimize the time a processor spends waiting for instructions to be fetched from memory. Instructions following the one currently being executed are loaded into a prefetch queue when the processor's external bus is otherwise idle. If the processor executes a branch instruction or receives an interrupt then the queue must be flushed and reloaded from the new address.
  • Instruction prefetch is often combined with pipelining in an attempt to keep the pipeline busy.
  • By 1995 most processors used prefetching, e.g. Motorola 680x0, Intel 80x86.
Question 194
Start and stop bits are used in serial communications for
A
Error detection
B
Error correction
C
Synchronization
D
Slowing down the communication
Question 194 Explanation: 
  • Start and Stop bits are used in asynchronous communication as a means of timing or synchronizing the data characters being transmitted.
  • Start bit is used to signal the beginning of a frame.
  • Stop bit is used to signal the end of a frame.
Question 195
On receiving an interrupt from an I/O device, the CPU
A
Halts for predetermined time.
B
Branches off to the interrupt service routine after completion of the current instruction.
C
Branches off to the interrupt service routine immediately.
D
Hands over control of address bus and data bus to the interrupting device.
Question 195 Explanation: 
  • CPU continuously checks the status bit of interrupt at the completion of each current instruction running when there is a interrupt it service the interrupt using Interrupt Service Routine (ISR)
  • An interrupt service routine (ISR) is a software routine that hardware invokes in response to an interrupt. ISR examines an interrupt and determines how to handle it executes the handling, and then returns a logical interrupt value. If no further handling is required the ISR notifies the kernel with a return value. An ISR must perform very quickly to avoid slowing down the operation of the device and the operation of all lower-priority ISRs.
Question 196
The maximum amount of information that is available in one portion of the disk access arm for a removal disk pack (without further movement of the arm with multiple heads)
A
A plate of data
B
A cylinder of data
C
A track of data
D
A block of data
Question 196 Explanation: 
Cylinder = all tracks at the same distance from the center (Disk head does not need to move when accessing (read/write) data in the same cylinder)
Question 197
CPU does not perform the operation
A
Data transfer
B
Logic operation
C
Arithmetic operation
D
All of the above
Question 197 Explanation: 
Central Processing Unit (CPU) is the electronic circuitry within a computer that carries out the instructions of a computer program by performing the basic arithmetic, logical, control and input/output (I/O) operations specified by the instructions.

Refer : https://en.wikipedia.org/wiki/Central_processing_unit
Question 198
The number of address lines in a memory chip of size 8192*8 is
A
8
B
12
C
13
D
16
Question 198 Explanation: 
8192*8 means that you have:
  • 8192 locations
  • 8 bits per location
It means that a memory of 8192 words, where each word is 8 bits.
So to address 8192   we need 13 bits (213=8192),
so 13 address lines.
Question 199
Intel 8086 is a
A
8 bit
B
16 bit
C
32 bit
D
64 bit
Question 199 Explanation: 
  • The 8086 (also called iAPX 86) is a 16-bit microprocessor chip designed by Intel between early 1976 and June 8, 1978, when it was released.
  • The 8086 gave rise to the x86 architecture, which eventually became Intel's most successful line of processors.
  • 8086, it is a 16-bit Integer processor in a 40 pin, Dual Inline Packaged IC
Question 200
The first operating system used in microprocessor is
A
Zenix
B
DOS
C
CP/M
D
Multics
Question 200 Explanation: 
In 1976, the first operating system for these Intel-based personal computers was written by a system programmer named Gary Kildall. As a consultant for Intel, he developed an operating system called CP/M (Contro Program for Micros) for Intel 8080.
Question 201
The sequence of events that happen during a typical fetch operation is
A
PC ⟶ Mar ⟶ Memory ⟶ MDR ⟶ IR
B
PC ⟶ Memory ⟶ MDR ⟶ IR
C
PC ⟶ Memory ⟶ IR
D
PC ⟶ MAR ⟶ Memory ⟶ IR
Question 201 Explanation: 
  • (PC) the contents of PC transferred to MAR)
  •  (MAR) (Address bus) Select a particular memory location
  • Issues RD control signals
  • Reads instruction present in memory and loaded into MDR
  • Will be placed in IR (Contents transferred from MDR to IR)
  • Instruction present in IR will be decoded by which processor understand what operation it has to perform.
  • Increments the contents of PC by 1, so that it points to the next instruction address.
  • If data required for operation is available in register, it performs the operation.
  • If data is present in memory following sequence is performed
  • Address of the data  to MAR
  • MAR  to Address bus  to select memory location where is issued RD signal
  • Reads data via data bus to MDR
  • From MDR data can be directly routed to ALU or it can be placed in register and then operation can be performed
  • Results of the operation can be directed towards output device, memory or register
  • Normal execution preempted (interrupt)

Two registers-MAR (Memory Address Register) and MDR (Memory Data Register) : To handle the data transfer between main memory and processor. MAR-Holds addresses, MDR-Holds data

Instruction register (IR) : Hold the Instructions that is currently being executed

Program counter: Points to the next instructions that is to be fetched from memory
Question 202
The addressing mode used in an instruction of the form ADD X Y, is
A
Absolute
B
Immediate
C
Indirect
D
Index
Question 202 Explanation: 
  • Direct Addressing Mode Effective address of operand is present in instruction itself.
  • Single memory reference to access data.
  • No additional calculations to find the effective address of the operand.
  • Usually indicated by variable names
Refer for More information : 
https://www.studytonight.com/computer-architecture/addressingmodes-instructioncycle#:~:text=Direct%20Addressing%20Mode&text=For%20Example%3A%20ADD%20R1%2C%204000,location%20where%20operand%20is%20present.
Question 203
The circumference of the two concentric disks are divided into 100 sections each. For the outer disk, 100 of the sections are painted red and 100 of the sections are painted blue.For the inner disk, the sections are painted red and blue in an arbitrary manner. It is possible to align the two disks so that____of the sections on the inner disks have their colours matched with the corresponding section on outer disk.
A
100 or more
B
125 or more
C
150 or more
D
175 or more
Question 203 Explanation: 
  • Let R be the total reds on inner disk.
  • Consider a half with r reds.
  • Half 1 = r reds and 100-r whites
  • Half 2 = R -r reds and 100-(R-r) = 100 - R +r whites.
  • If r > = R - r, match half1 with Red half of outer disk.
  • Total matching = r + 100 - R + r = 100 - R + 2r
  • Now r >= R - r => 2r - R >= 0
  • Total matching = 100 - R + 2r >= 100
Question 204
Block or Buffer caches are used to
A
Improve disk performance
B
Handle interrupts
C
Increase the capacity of main memory
D
Speed up main memory Read operations
Question 204 Explanation: 
  • Generally caches are used to speed up the whole process .more cache size include more frequent referred data so there will be the chance of improving the speed of the required operation .
  • The disk driver copies data from and back to the disk, The buffer cache manages these temporary copies of the disk blocks. Caching disk blocks has an obvious performance benefit: disk access is significantly slower than memory access, so keeping frequently-accessed disk blocks in memory reduces the number of disk accesses and makes the system faster
Question 205
An instruction used to set the carry flag in a computer can be classified as
A
Data transfer
B
Arithmetic
C
Logical
D
Program control
Question 205 Explanation: 
STC : It is logical instruction or logical instruction used to set the carry flag in a computer.

Data Transfer 
The data transfer instructions move data between registers or between memory and registers.
MOV , MVI,LDA,STA,LHLD,SHLD etc.

Logical 
The Instructions under this group perform logical operation such as AND, OR, compare, rotate etc.
Examples are: ANA, XRA, ORA, CMP,  RAL,STC etc.

Program control
instructions change or modify the flow of a program. The most basic kind of program control is the unconditional branch or unconditional jumpBranch is usually an indication of a short change relative to the current program counter. Jump is usually an indication of a change in program counter that is not directly related to the current program counter (such as a jump to an absolute memory location or a jump using a dynamic or static table), and is often free of distance limits from the current program counter.
LOOPNZ,RET,CALL,LOOPZ,IRET,JUMP,JUMPNZ etc.
Question 206
In a microprocessor, the address of next instruction to be executed is stored in
A
Stack pointer
B
Address latch
C
Program counter
D
Any general purpose register
Question 206 Explanation: 
The Program Counter (PC) register keeps track of the execution of the program. It contains the memory address of the instruction currently being executed . During the execution of the current instruction, the contents of the PC are updated to correspond to the address of the next instructions to be executed.
Question 207
Which of the following μP is a 8 bit processor ?
A
80286
B
8085
C
80386
D
8086
Question 207 Explanation: 
8088 and 8085 is 8 bit microprocessor.
  • Intel 8085 is an 8-bit microprocessor. Its data bus is 8-bit wide and hence, 8 bits of data can be transmitted in parallel from or to the microprocessor.
  • Intel 8088 microprocessor is a variant of the Intel 8086. Introduced on July 1, 1979, the 8088 had an eight-bit external data bus instead of the 16-bit bus of the 8086.
  • Intel 8086 (also called iAPX 86) is a 16-bit microprocessor chip designed by Intel between early 1976 and June 8, 1978
  • Intel 80286 (also marketed as the iAPX 286 and often called Intel 286) is a 16-bit microprocessor that was introduced on February 1, 1982. It was the first 8086-based CPU with separate, non-multiplexed address and data buses and also the first with memory management and wide protection abilities.
  • Intel 80386, also known as i386 or just 386, is a 32-bit microprocessor introduced in 1985.
Question 208
Start and stop bits are used in serial communication for
A
Error detection
B
Error correction
C
Synchronization
D
Slowing down the communication
Question 208 Explanation: 
  • Start and Stop bits are used in asynchronous communication as a means of timing or synchronizing the data characters being transmitted.
  • Start bit is used to signal the beginning of a frame.
  • Stop bit is used to signal the end of a frame.
Question 209
The register or main memory location which contains the effective address of the operand is known as
A
Pointer
B
Special location
C
Indexed register
D
None of the above
Question 209 Explanation: 
  • Effective address of the operand is the contents of a register or main memory location, location whose address appears in the instruction.
  • The register or memory location that contains the address of the operand is a pointer.
  • When an execution takes place in such mode, instruction may be told to go to a specific address. Once it's there, instead of finding an operand, it finds an address where the operand is located.
Question 210
In which addressing mode the operand is given explicitly in the instruction itself ?
A
Absolute mode
B
Immediate mode
C
Indirect mode
D
Index mode
Question 210 Explanation: 
Immediate addressing mode
In immediate addressing mode  when the instruction is assembled, the operand comes immediately after the opcode.
Notice that the immediate data must be preceded by the pound sign, “#”.
This addressing mode can be used to load information into any of the registers, including the DPTR register.
Examples follow :
MOV AL, 35H (move the data 35H into AL register)
Question 211
In which addressing mode, the effective address of the operand is generated by adding a constant value to the contents of register ?
A
Absolute mode
B
Immediate mode
C
Indirect mode
D
Index mode
Question 211 Explanation: 
In Index mode addressing mode, the effective address of the operand is generated by adding a constant value to the contents of a register. The address of the operand is obtained by adding to the contents of the general register (called index register) a constant value. The number of the index register and the constant value are included in the instruction code. Index Mode is used to access an array whose elements are in successive memory locations. The content of the instruction code, represents the starting address of the array and the value of the index register, and the index value of the current element. By incrementing or decrementing index register different element of the array can be accessed. The term addressing modes refers to the way in which the operand of an instruction is specified. Information contained in the instruction code is the value of the operand or the address of the result/operand.
Question 212
In the indirect addressing scheme, the second part of an instruction contains :
A
The operand in decimal form
B
The address of the location where the value of the operand is stored
C
The address of the location where the address of the operand is stored
D
The operand in an encoded form
Question 212 Explanation: 
Indirect Addressing Mode
  • The address field of the instruction specifies the address of memory location that contains the effective address of the operand.
  • Two references to memory are required to fetch the operand
Example :
ADD X will increment the value stored in the accumulator by the value stored at memory location specified by X.
AC ← AC + [[X]]
Question 213
Amdahl’s law states that the maximum speedup S achievable by a parallel computer with ‘p’ processors is given by :
A
S≤f+(1-f)/p
B
S≤f/p+(1-f)
C
S≤1/[f+(1-f)/p]
D
S≤1/[1-f+f/p]
Question 213 Explanation: 
troad reload
  • shows that the theoretical speedup of the execution of the whole task increases with the improvement of the resources of the system and that regardless of the magnitude of the improvement, the theoretical speedup is always limited by the part of the task that cannot benefit from the improvement.
  • Amdahl's law applies only to the cases where the problem size is fixed. In practice, as more computing resources become available, they tend to get used on larger problems (larger datasets), and the time spent in the parallelizable part often grows much faster than the inherently serial work. In this case, Gustafson's law gives a less pessimistic and more realistic assessment of the parallel performance
Refer : https://en.wikipedia.org/wiki/Amdahl%27s_law
Question 214
The performance of a file system depends upon the cache hit rate. If it takes 1 msec to satisfy a request from the cache but 10 msec to satisfy a request if a disk read is needed, then the mean time (ms) required for a hit rate ‘h’ is given by :
A
1
B
H + 10 (1 - h)
C
(1 - h) + 10 h
D
10
Question 214 Explanation: 
Let Cache Hit Rate =  h
Cache Miss Rate = (1- h)
Time for cache access = 1 ms
Time for hard disk access = 10ms
The mean time required to satisfy a request is
Mean time = (cache hit) * (cache access time) * + (cache miss rate)*(memory access time)
Mean time = h * 1 + (1 - h) * 10
Mean time = = h + 10 - 10h
mean time = h+10(1-h)
Question 215
Cache memory is :
A
High-Speed Register
B
Low-Speed RAM
C
Non-Volatile RAM
D
High-speed RAM
Question 215 Explanation: 
  • Volatile and Non-Volatile Memory are both types of computer memory.
  • Volatile Memory is used to store computer programs and data that CPU needs in real time and is erased once computer is switched off.
  • RAM and Cache memory are volatile memory. Where as Non-volatile memory is static and remains in the computer even if computer is switched off.
  • ROM and HDD are non-volatile memory.
Question 216
In 8085 microprocessor which of the following flag(s) is (are) affected by an arithmetic operation ?
A
AC flag Only
B
CY flag Only
C
Z flag Only
D
AC, CY, Z flags
Question 216 Explanation: 

ALU of 8085 have five flip flops whose states (set/reset) are determined by the result data of other registers and accumulator.

They are called as Zero, Carry, Sign, Parity and Auxiliary-Carry flags.

  • Zero Flag (Z): When an arithmetic operation results in zero , the flip-flop called the Zero flag - which is set to one.
  • Carry flag (CY): After an addition of two numbers, if the sum in the accumulator is larger than eight bits, then the flip-flop uses to indicate a carry called the Carry flag – which is set to one.
  • Sign (S): It is set to 1, if bit D7 of the result = 1; otherwise reset. D7 is the first digit of a binary number.
  • Parity (P): If the result has an even number of 1s, the flag is set to 1; for an odd number of 1s the flag is reset.
  • Auxiliary Carry (AC): In an arithmetic operation, when a carry is generated by digit D3 and passed to digit D4, the AC flag is set. Generally this flag is used internally for Binary Coded Decimals (BCD)

Figure shows a 8-bit flag register, adjacent to the accumulator. It is not used as a register. Out of eight bit-positions, five positions are used to store the outputs of five flip-flops.

Some of the arithmetic operations are -

  1. ADD : Add
  2. ADI : Add Immediate
  3. SUB : Subtract
  4. SUI : Subtract Immediate
Question 217
In 8085 microprocessor the address bus is of __________ bits.
A
4
B
8
C
16
D
32
Question 217 Explanation: 
  • Length of Address Bus of 8085 microprocessor is 16 Bit (That is, Four Hexadecimal Digits), ranging from 0000 H to FFFF H, (H denotes Hexadecimal).
  • The microprocessor 8085 can transfer maximum 16 bit address which means it can address 65, 536 different memory location.
  • The Length of the address bus determines the amount of memory a system can address.
Question 218
In the architecture of 8085 microprocessor match the following :
A
(a)-(iv), (b)-(i), (c)-(ii)
B
(a)-(iii), (b)-(iv), (c)-(ii)
C
(a)-(ii), (b)-(iii), (c)-(i)
D
(a)-(i), (b)-(ii), (c)-(iv)
Question 218 Explanation: 
  • 8-bit ALU of 8085 is capable of performing the following operations
    Arithmetic : Addition, Subtraction, Increment, Decrement, Compare.
    Logical : AND, OR, EXOR, NOT, SHIFT / ROTATE, CLEAR.
  • Timing and control instruction are covered in instruction unit of microprocessor.
  • General Purpose Register 
    General purpose registers are used to store temporary data within the microprocessor. It is a multipurpose register.
    They can be used either by programmer or by a user.
Question 219
Which of the following is correct statement ?
A
In memory - mapped I/O, the CPU can manipulate I/O data residing in interface registers that are not used to manipulate memory words.
B
The isolated I/O method isolates memory and I/O addresses so that memory address range is not affected by interface address assignment.
C
In asynchronous serial transfer of data the two units share a common clock.
D
In synchronous serial transmission of data the two units have different clocks.
Question 219 Explanation: 
MEMORY MAPPED I/O
  • The isolated I/O method isolates memory and I/O addresses so that memory address values are not affected by interface address assignment since each has its own address space.
  • The memory mapped I/O uses the same address space for both memory and I/O.
  • This is the case in computers that employ only one set of read and write signals and do not distinguish between memory and I/O addresses.
  • The computer treats an interface register as being part of the memory system.
  • The assigned addresses for interface registers cannot be used for memory words, which reduce the memory address( range available).
  • In memory mapped I/O organization, there are no specific inputs or output instructions. The CPU can manipulate I/O data residing in interface registers with the same instructions that are used to manipulate memory words.
  • Typically, a segment of the total address space is reserved for interface registers, but in general, they can be located at any address as long as there is not also a memory word that responds to the same address.
  • It allows the computer to use the same instructions for either input-output transfers or for memory transfers.
Option(c) : In asynchronous serial transfer of data the two units do not share a common clock.
Option(D) :In synchronous serial transfer of data the two units share a common clock.
Question 220
A microinstruction format has micro-ops field which is divided into three subfields F1, F2, F3 each having seven distinct micro-operations, condition field CD for four status bits, branch field BR having four options used in conjunction with address field ADF. The address space is of 128 memory locations. The size of micro-instruction is:
A
17
B
20
C
24
D
32
Question 220 Explanation: 
There are 3 fields in the microinstruction.
  1. Micro operation fields. F1,F2,F3 (each are having 7 microoperation)
  2. CD for status bits
  3. Branch field BR having four options used in conjunction with address field ADF.
Address space is of 128 memory locations.
Size of the micro operation = ?

Given Microinstruction Format
  • F1,F2,F3 each having seven distinct micro-operation
  • Number of bits to represent
  •  log27+ log27+ log27=3+3+3=9
  • 3 bits are required for each
Condition field have four status ∴ log24=2 so we need 2 bits to represent four different condition

Branch field have four option ∴ log24=2 so we needs 2 bits to represent four option

For ADP We 128 status bit ∴ log2128=7 so we needs 7 bits to represent128 different memory location,

Finally,
Size of micro operation = F1 + F2 + F3 + CD + BR + ADF
Size of micro operation = 3 + 3 + 3 + 2 + 2 + 7
Size of micro operation = 20
Question 221
Which of the following is an interrupt according to temporal relationship with system clock?
A
Maskable interrupt
B
Periodic interrupt
C
Division by zero
D
Synchronous interrupt
Question 221 Explanation: 
Synchronous Interrupt: The source of interrupt is in phase to the system clock is called synchronous interrupt. In other words interrupts which are dependent on the system clock.
Example: timer service that uses the system clock.

What is an Interrupt ?
Interrupt is a signal which has highest priority from hardware or software which processor should process its signal immediately.

Types of Interrupts:

Although interrupts have highest priority than other signals, there are many type of interrupts but basic type of interrupts are
  1. Hardware Interrupts: If the signal for the processor is from external device or hardware is called hardware interrupts. Example: from keyboard we will press the key to do some action this pressing of key in keyboard will generate a signal which is given to the processor to do action, such interrupts are called hardware interrupts. Hardware interrupts can be classified into two types they are
    • Maskable Interrupt: The hardware interrupts which can be delayed when a much highest priority interrupt has occurred to the processor.
    • Non Maskable Interrupt: The hardware which cannot be delayed and should process by the processor immediately.
  2. Software Interrupts: Software interrupt can also divided in to two types. They are
    • Normal Interrupts: the interrupts which are caused by the software instructions are called software instructions.
    • Exception: unplanned interrupts while executing a program is called Exception. For example: while executing a program if we got a value which should be divided by zero is called a exception.
Classification of Interrupts According to Periodicity of Occurrence:
  1. Periodic Interrupt: If the interrupts occurred at fixed interval in timeline then that interrupts are called periodic interrupts
  2. Aperiodic Interrupt: If the occurrence of interrupt cannot be predicted then that interrupt is called aperiodic interrupt.
Classification of Interrupts According to the Temporal Relationship with System Clock:
  1. Synchronous Interrupt: The source of interrupt is in phase to the system clock is called synchronous interrupt. In other words interrupts which are dependent on the system clock.
    Example: timer service that uses the system clock.
  2. Asynchronous Interrupts: If the interrupts are independent or not in phase to the system clock is called asynchronous interrupt
Refer : https://www.electronicshub.org/types-of-interrupts-and-how-to-handle-interrupts/#Types_of_Interrupts
Question 222
The general configuration of the micro-programmed control unit is given below: What are blocks B and C in the diagram respectively?
A
Block address register and cache memory
B
Control address register and control memory
C
Branch register and cache memory
D
Control address register and random access memory
Question 222 Explanation: 
Question 223
Match the following :
Addressing Mode Location of Operand
a. Implied i . Registers which are in CPU
b. Immediate ii. Register specifies the address of the operand
c. Register iii. Specified in the register
d. Register Indirect iv. Specified implicitly in the definition of instruction
A
A-(iv), b-(iii), c-(i), d-(ii)
B
A-(iv), b-(i), c-(iii), d-(ii)
C
A-(iv), b-(ii), c-(i), d-(iii)
D
A-(iv), b-(iii), c-(ii), d-(i)
Question 223 Explanation: 
  • In Implied Addressing Mode
    location of operand specified implicitly in the definition of instruction
    The instruction “Complement Accumulator” is an implied mode instruction.
  • In Immediate mode takes directly the value contained in a register in CPU...
  • In Register Addressing Mode
    The operand is contained in a register set.
    The address field of the instruction refers to a CPU register that contains the operand.
  • In Register Indirect Addressing Mode
    The address field of the instruction refers to a CPU register that contains the effective address of the operand.
    Only one reference to memory is required to fetch the operand.
Question 224
In 8085 microprocessor, the digit 5 indicates that the microprocessor needs:
A
–5 volts, +5 volts supply
B
+5 volts supply only
C
–5 volts supply only
D
5 MHz clock
Question 224 Explanation: 
The "5" in the part number highlighted the fact that the 8085 uses a single +5-volt (V) power supply rather than requiring the +5 V, −5 V and +12 V supplies needed by the 8080
Question 225
In 8085, which of the following performs : load register pair immediate operation?
A
LDAX rp
B
LHLD addr
C
LXI rp, data
D
INX rp
Question 225 Explanation: 
Option(C) is correct LXI rp, data
  • LDAX – Load accumulator indirect
    This instruction copies the contents of that memory location into the accumulator.
  • LHLD – Load H and L register direct
    This instruction loads the contents of the 16- bit memory location into the H and L register pair.
  • LXI – Load register pair immediate
    The instruction loads 16-bit data in the register pair designated in the operand.
  • INX – Increment register pair by 1.
    It will increment the register value by 1.
Question 226
8085 microprocessor has ____ bit ALU.
A
32
B
16
C
8
D
4
Question 226 Explanation: 
8085 microprocessor has 8 bit ALU. It can perform Arithmetical operations like addition, sub....etc
8086 microprocessor has 16 bit ALU.
Question 227
The register that stores the bits required to mask the interrupts is ______.
A
Status register
B
Interrupt service register
C
Interrupt mask register
D
Interrupt request register
Question 227 Explanation: 
  • Interrupt mask register: The register that stores the bits required to mask the interrupts
  • Status register :The register that stores the bits required for Status
  • Interrupt service register : The register that stores the bits required to service the interrupts
  • Interrupt request register :The register that stores the bits required to request the interrupts
Question 228
Which of the following in 8085 microprocessor performs 
HL = HL + HL?
A
DAD D
B
DAD H
C
DAD B
D
DAD SP
Question 228 Explanation: 
DAD is a mnemonic, which stands for Double ADd between HL pair and any other pair of register and also rp stands for any one of the following register pairs as mentioned below.
rp = BC, DE, or HL
In this instruction HL register pair works as Accumulator. Because the 16-bit content of rp will be added with HL register pair content and sum thus produced will be stored back on to HL again.
DAD B means BC + HL --> HL.
DAD D means DE + HL -- HL
  • DAD H will do HL = HL + HL;
  • DAD B will do HL = HL + BC;
  • DAD D will do HL = HL + DE;
SP is stack pointer and it is not a pair register, DAD SP will do HL = HL + SP;
Question 229
In ______ addressing mode, the operands are stored in the memory. The address of the corresponding memory location is given in a register which is specified in the instruction.
A
Register direct
B
Register indirect
C
Base indexed
D
Displacement
Question 229 Explanation: 
Register Indirect Addressing Mode :
  • The address field of the instruction refers to a CPU register that contains the effective address of the operand.
  • Only one reference to memory is required to fetch the operand.
Example :

ADD R will increment the value stored in the accumulator by the content of memory location specified in register R.
AC ← AC + [[R]]

NOTE
  • This addressing mode is similar to indirect addressing mode.
  • The only difference is address field of the instruction refers to a CPU register.
Question 230
8085 microprocessor has _____ hardware interrupts.
A
2
B
3
C
4
D
5
Question 230 Explanation: 
There are five interrupt  signals TRAP,RST 7.5,RST 6.5,RST 5.5 and INTR.

Maskable Interrupts are those which can be disabled or ignored by the microprocessor. These interrupts are either edge-triggered or level-triggered, so they can be disabled. INTR, RST 7.5, RST 6.5, RST 5.5 are maskable interrupts in 8085 microprocessor.

Non-Maskable Interrupts are those which cannot be disabled or ignored by microprocessor. TRAP is a non-maskable interrupt. It consists of both level as well as edge triggering and is used in critical power failure conditions.
Question 231
Which of the following in 8085 microprocessor performs HL = HL + DE ?
A
DAD D
B
DAD H
C
DAD B
D
DAD SP
Question 231 Explanation: 
DAD is a mnemonic, which stands for Double ADd between HL pair and any other pair of register and also rp stands for any one of the following register pairs as mentioned below.
rp = BC, DE, or HL
In this instruction HL register pair works as Accumulator. Because the 16-bit content of rp will be added with HL register pair content and sum thus produced will be stored back on to HL again.
DAD B means BC + HL --> HL.
DAD D means DE + HL -- HL
  • DAD H will do HL = HL + HL;
  • DAD B will do HL = HL + BC;
  • DAD D will do HL = HL + DE;
SP is stack pointer and it is not a pair register, DAD SP will do HL = HL + SP;
Question 232
The register that stores all interrupt requests is:
A
Interrupt mask register
B
Interrupt service register
C
Interrupt request register
D
Status register
Question 232 Explanation: 
  • Interrupt mask register: The register that stores the bits required to mask the interrupts
  • Status register :The register that stores the bits required for Status
  • Interrupt service register : The register that stores the bits required to service the interrupts
  • Interrupt request register :The register that stores the bits required to request the interrupts
Question 233
The _____ addressing mode is similar to register indirect addressing mode, except that an offset is added to the contents of the register. The offset and register are specified in the instruction.
A
Base indexed
B
Base indexed plus displacement
C
Indexed
D
Displacement
Question 233 Explanation: 
Displacement addressing mode is similar to register indirect addressing mode, except that an offset is added to the contents of the register. The offset and register are specified in the instruction.  
  • option(A) : Based Indexed Addressing: The operand’s offset is sum of the content of a base register BX or BP and an index register SI or DI.
  • option(B) : Based Indexed plus displacement addressing mode: In this mode of addressing the operand’s offset is given by offset=[BX or BP]+[SI or DI]+8 bit or 16 bit displacement.
  • option(C) : Indexed addressing mode: The operand’s offset is the sum of the content of an index register SI or DI and an 8 bit or 16 bit displacement.
  • option(D) : Displacement addressing mode : Similar to index mode, except instead of a index register a base register will be used. Base register contains a pointer to a memory location. An integer (constant) is also referred to as a displacement. The address of the operand is obtained by adding the contents of the base register plus the constant. The difference between index mode and displacement mode is in the number of bits used to represent the constant. When the constant is represented a number of bits to access the memory, then we have index mode. Index mode is more appropriate for array accessing; displacement mode is more appropriate for structure (records) accessing.
  • In this the contents of the indexed register is added to the Address part of the instruction, to obtain the effective address of operand. EA = A + (R),
  • In this the address field holds two values, A(which is the base value) and R(that holds the displacement), or vice versa.
Question 234
In _____ method, the word is written to the block in both the cache and main memory, in parallel.
A
Write through
B
Write back
C
Write protected
D
Direct mapping
Question 234 Explanation: 
We can update the value in the cache and avoid a expensive main memory access. But this results in Inconsistent Data

we solve this problem by using
  1. Write Through
  2. Write Back protocols
Write Through
  • In write through, data is simultaneously updated to cache and memory.
  • This process is simpler and more reliable.
  • This is used when there are no frequent writes to the cache(Number of write operation is less).
Write Back
  • The data is updated only in the cache and updated into the memory in later time
  • Write Back is also known as Write Deferred.
  • Write Back Uses Dirty Bity
Dirty Bit : Each Block in the cache needs a bit to indicate if the data present in the cache was modified(Dirty) or not modified(Clean).If it is clean there is no need to write it into the memory. It designed to reduce write operation to a memory.
Question 235
What will be the output at PORT1 if the following program is executed ?
MVI B, 82H 
MOV A, B 
MOV C, A 
MVI D, 37H 
OUT PORT1 
HLT
A
37H
B
82H
C
B9H
D
00H
Question 235 Explanation: 
Note : Out PORT command outputs the data whatever is present in Accumulator.
  • MVI B, 82H
    Move 82 value in hexadecimal to register B ∴ Now, B=82H
  • MOV A, B
    Move B value(82 in hexa) to Accumulator A ∴ Now, A=82H
  • MOV C, A
    Move Accumulator A value(82 in hexa) to Register C ∴ Now, C=82H
  • MVI D, 37H
    Move immediate the value 37 in hexa to Register D ∴ Now, D=37H
  • OUT PORT1
    Output the value of port1 i.e of Accumulator A Therefore 82 H will be the output
  • HLT Halt the computer
Question 236
Which of the following 8085 microprocessor hardware interrupt has the lowest priority?
A
RST 6.5
B
RST 7.5
C
TRAP
D
INTR
Question 236 Explanation: 
Priority Order
TRAP > RST 7.5 > RST 6.5 > RST 5.5 > INTR.
Question 237
A DMA controller transfers 32-bit words to memory using cycle stealing. The words are assembled from a device that transmits characters at a rate of 4800 characters per second. The CPU is fetching and executing instructions at an average rate of one million instructions per second. By how much will the CPU be slowed down because of the DMA transfer?
A
0.6%
B
0.12%
C
1.2%
D
2.5%
Question 237 Explanation: 
1 character=1 byte
Given Cycle stealing Mode
DMA controller transfers 32 bit words to memory
32 bit Word= 4 Bytes words

Device transmits 4800 character per second
4800 Bytes = 1 second(1 character=1 byte)
1 Byte = 1/4800 second
4 byte word it takes 4 * (1 / 4800) = 1 / 1200 sec.

So 1200 character will be transfered through cycle stealing mode
and it is given that CPU is fetching and executing instructions at an average rate of one million instructions per second.

% of slow down or cycle wasted % in DMA transfer = ( 1200 / 106) * 100
% of slow down or cycle wasted % in DMA transfer= ( 1200 / 1000000) * 100 = 0.12 %
Question 238
A CPU handles interrupt by executing interrupt service subroutine __________.
A
By checking interrupt register after execution of each instruction
B
By checking interrupt register at the end of the fetch cycle
C
Whenever an interrupt is registered
D
By checking interrupt register at regular time interval
Question 238 Explanation: 
CPU reads the interrupt pins to recognize the interrupts after finishing the execution of each instruction
  •  INTR =0 // Interrupt is not present.
    Ignore and go to next Instruction fetch from user program
  • INTR =1  // Interrupt is present.
    Service the Interrupt
Question 239
A computer uses 46-bit virtual address, 32-bit physical address, and a three-level paged page table organization. The page table base register stores the base address of the first - level table (T1 ) ,which occupies exactly one page. Each entry of T1 stores the base address of a page of the second-level table (T2). Each entry of T2 stores the base address of a page of the third-level table (T3) Each entry of T3 stores a page table entry (PTE). The PTE is 32 bits in size. The processor used in the computer has a 1 MB 16 way set associative virtually indexed physically tagged cache. The cache block size is 64 bytes.
What is the size of a page in KB in this computer?
A
2
B
4
C
8
D
16
Question 239 Explanation: 
memory management questions
Question 240
In 8086, the jump condition for the instruction JNBE is?
A
CF = 0 or ZF = 0
B
ZF = 0 and SF = 1
C
CF = 0 and ZF = 0
D
CF = 0
Question 240 Explanation: 
In 8086, the instruction JNBE means Jump not below neither equal. Thus, to execute JNBE instruction, The Zero flag should be false, i.e. ZF = 0 and Carry Flag should also be false, i.e. CF = 0.

8086 Conditional jumps

Opcode Description CPU Flags
JA Above CF = 0 and ZF = 0
JAE Above or equal CF = 0
JB Bellow CF
JBE Bellow or equal CF or ZF
JC Carry CF
JE Equality ZF
JG Greater(s) ZF = 0 and SF = OF
JGE Greater of equal(s) SF = OF
JL Less(s) SF ≠ OF
JLE Less equal(s) ZF or SF ≠ OF
JNA Not above CF or ZF
JNAE Neither above nor equal CF
JNB Not bellow CF = 0
JNBE Neither bellow nor equal CF = 0 and ZF = 0
JNC Not carry CF = 0
JNE Not equal ZF = 0
JNG Not greater ZF or SF ≠ OF
JNGE Neither greater nor equal SF ≠ OF
JNL Not less SF = OF
JNLE Not less nor equal ZF = 0 and SF = OF
JNO Not overflow OF = 0
JNP Not parity PF = 0
JNS Not negative SF = 0
JNZ Not zero ZF = 0
JO Overflow(s) OF
JP Parity PF
JPE Parity PF
JPO Not parity PF = 0
JS Negative(s) SF
JZ Null ZF
Question 241
In 8085 microprocessor, the ISR for handling trap interrupt is at which location?
A
3CH
B
34H
C
74H
D
24H
Question 241 Explanation: 
Trap
  • The trap is a non-maskable interrupt, having the highest priority among all interrupts. By default, it is enabled until it gets acknowledged i.e. whenever this pin gets activated, the 8085 always gets interrupted even if the state of 8085 is in DI. The input of Trap input is level sensitive and edge sensitive. Hence the Trapline always makes a transition from 0 to 1 and remains in state 1 until the end of the execution of an instruction for the interruption of 8085. In case of failure, it executes as ISR (Interrupt Service Routine) and sends the data to backup memory. This interrupt transfers the control to the location 0024H.
RST 7.5, 6.5 AND 5.5
  • These are maskable interrupts and are enabled under program control of two instructions:
  • EI and SIM(Set Interrupt Mask ) :
CPU 8085
There are 241 questions to complete.