MCQ Cdac
MCQ Cdac
MCQ Cdac
System bus
Definitions
1. The _______ is the communication channel that connects all computer system components.
L1 Cache
2. A(n) _______ cache is generally implemented on the same chip as the CPU.
bus master
3. The CPU is always capable of being a(n) _______, thus controlling access to the bus by all other devices in the computer system.
buffer
4. A(n) _______ is a small area of memory used to resolve differences in data transfer rate or data transfer unit size.
cache
5. A(n) _______ is an area of fast memory where data held in a storage device is prefeteched in anticipation of future requests for that data.
cache swap
6. A cache controller is a hardware device that initiates a(n) _______ when it detects a cache miss.
control bus
7. The _______ transmits command, timing, and status signals between devices in a computer system.
clock
8. If possible, the system bus _______ rate should equal the speed of the CPU.
9. The _______ is a register that always contains a pointer to the top of the _______. 10. The _______ calls an interrupt handler after it looks up its memory address in the _______. 11. The set of register values placed on the stack while processing an interrupt is also called the _______.
interrupt handler
12. A(n) _______ is a software program that is executed in response to a specific interrupt.
stack
13. During interrupt processing, register values of a suspended process are held on the ______.
interrupt
14. A(n) _______ is a signal to the CPU or operating system that some device or program requires processing services.
bus arbitration
unit
when two potential bus masters want control of the bus at the same time.
16. The initiator of a bus transfer assumes the role of a(n) _______. The recipient assumes the role of a(n) _______. 17. The CPU incurs one or more _______ if it is idle pending the completion of an I/O operation.
address bus, control bus, data bus push operation, pop operation
18. The system bus can be decomposed logically into three sets of transmission lines: the _______ bus, the _______ bus, and the _______ bus. 19. During a(n) ________, one or more register values are copied to the top of the stack. During a(n) _______, one or more values are copied from the top of the stack to registers.
algorithm
20. The relative size of a data set before and after data compression is described by the compression ______.
25. Primary storage receives a read command on the _______, the address to be accessed on the _______, and returns the accessed data on the _______. 26. The operating system normally views any storage device as a(n) _______, ignoring the device's physical storage organization.
logical accesses
27. Part of the function of a storage secondary device controller is to translate _______ into physical accesses.
28. _______ is used to transfer data directly between memory and secondary storage devices, without the assistance of the CPU.
channel
29. A(n) _______ is a high capacity device controller used in mainframe computers.
cache hit
30. An access to primary storage that is found within a cache is called a(n) _______.
bus protocol
32. A(n) _______ defines the control, signals, and other communication parameters of a bus.
1. 20. The relative size of a data set before and after data compression is described by the compression ______. INCORRECT: You gave no answer ANSWER: algorithm 2. 9. The _______ is a register that always contains a pointer to the top of the _______. INCORRECT: You gave no answer ANSWER: stack pointer, stack 3. 19. During a(n) ________, one or more register values are copied to the top of the stack. During a(n) _______, one or more values are copied from the top of the stack to registers. INCORRECT: You gave no answer ANSWER: push operation, pop operation 4. 10. The _______ calls an interrupt handler after it looks up its memory address in the _______. INCORRECT: You gave no answer ANSWER: supervisor, interrupt table 5. 8. If possible, the system bus _______ rate should equal the speed of the CPU. INCORRECT: You gave no answer ANSWER: clock
5 Matching Questions
1. cache INCORRECT: No answer given ANSWER: d 5. A(n) _______ is an area of fast memory where data held in a storage device is prefeteched in anticipation of future requests for that data. 2. Direct memory access INCORRECT: No answer given ANSWER: e 28. _______ is used to transfer data directly between memory and secondary storage devices, without the assistance of the CPU. 3. control bus INCORRECT: No answer given ANSWER: a 7. The _______ transmits command, timing, and status signals between devices in a computer system. 4. bus master INCORRECT: No answer given ANSWER: b 3. The CPU is always capable of being a(n) _______, thus controlling access to the bus by all other devices in the computer system. 5. channel INCORRECT: No answer given ANSWER: c 29. A(n) _______ is a high capacity device controller used in mainframe computers.
1.
a 7. The _______ transmits command, timing, and status signals between devices in a
computer system. 2. b 3. The CPU is always capable of being a(n) _______, thus controlling access to the bus by all other devices in the computer system. 3. c 29. A(n) _______ is a high capacity device controller used in mainframe computers. 4. d 5. A(n) _______ is an area of fast memory where data held in a storage device is prefeteched in anticipation of future requests for that data. 5. e 28. _______ is used to transfer data directly between memory and secondary storage devices, without the assistance of the CPU.
Answer)
. CORRECT: L1 Cache a. cache b. stack c. algorithm 5. 30. An access to primary storage that is found within a cache is called a(n) _______.(No
Answer)
. cache swap a. L1 Cache b. cache c. CORRECT: cache hit
5 True/False Questions
1. logical accesses 2. A(n) _______ cache is generally implemented on the same chip as the CPU. This is false. You gave no answer. It should be logical accesses 27. Part of the function of a storage secondary device controller is to translate _______ into physical accesses.. 2. stack 13. During interrupt processing, register values of a suspended process are held on the ______. This is true. You gave no answer. 3. linear address space 27. Part of the function of a storage secondary device controller is to translate _______ into physical accesses. This is false. You gave no answer. It should be linear address space 26. The operating system normally views any storage device as a(n) _______, ignoring the device's physical storage organization.. 4. interrupt 12. A(n) _______ is a software program that is executed in response to a specific interrupt. This is false. You gave no answer. It should be interrupt 14. A(n) _______ is a signal to the CPU or operating system that some device or program requires processing services.. 5. wait states 11. The set of register values placed on the stack while processing an interrupt is also called the _______. This is false. You gave no answer. It should be wait states 17. The CPU incurs one or more _______ if it is idle pending the completion of an I/O operation..
15 Written Questions
1. operating system program that is responsible for booting the computer system INCORRECT: You gave no answer ANSWER: BIOS 2. The technology that uses cables consisting of very thin filaments of glass fibers that can conduct the light generated by lasers for high-speed telecommunications. INCORRECT: You gave no answer ANSWER: fiber optics
3. (computing) a security system consisting of a combination of hardware and software that limits the exposure of a computer or computer network to attack from crackers INCORRECT: You gave no answer ANSWER: firewall 4. steals information for identity theft and more illegal; more mischievous than criminal INCORRECT: You gave no answer ANSWER: gray hat hacker 5. a unit of information equal to one billion (1,073,741,824) bytes or 1024 megabytes INCORRECT: You gave no answer ANSWER: gigabyte 6. Windows utility command to delete temporary files stored on your computer INCORRECT: You gave no answer ANSWER: disk cleanup 7. Someone who uncovers computer weaknesses without exploiting them. The goal of the white hat hacker is to improve system security. INCORRECT: You gave no answer ANSWER: white hat hacker 8. Bill Gates GUI operating system used for IBM clone computers INCORRECT: You gave no answer ANSWER: Windows 9. The distance in millimeters between each like-color pixel on a display. The smaller the distance between the pixels, the sharper the image. Dot pitch is one measurement of image clarity on a CRT monitor. Also called pixel pitch INCORRECT: You gave no answer ANSWER: dot pitch 10. an internet connection such as DSL or cable modem that offers higher bandwidth, and therefore faster transmission speed, than standard modem connections. INCORRECT: You gave no answer ANSWER: broadband connections 11. a computer program that detects viruses and repairs files. INCORRECT: You gave no answer ANSWER: antivirus 12. involves reducing the electricity consumed and environmental waste generated when using a computer INCORRECT: You gave no answer ANSWER: green computing 13. a computer criminal INCORRECT: You gave no answer ANSWER: black hat hacker 14. software that is available free of charge INCORRECT: You gave no answer ANSWER: shareware 15. a low-speed service that uses a phone line. Transfer rate a high of 56 Kbps per second. INCORRECT: You gave no answer ANSWER: dial-up
15 Matching Questions
1. url INCORRECT: No answer given ANSWER: n the address of a web page on the world wide web 2. application INCORRECT: No answer given ANSWER: k Word, Excel and Power Point can be classified as this type of software 3. 2nd generation INCORRECT: No answer given ANSWER: h this generation of computers used transistors 4. CPN INCORRECT: No answer given ANSWER: e brain of your computer 5. usenet group INCORRECT: No answer given ANSWER: f -exchange of comments among participants sometimes called a news group 6. MAN INCORRECT: No answer given ANSWER: i type of network which is city-wide (metropolitan) 7. plotter INCORRECT: No answer given ANSWER: b an instrument (usually driven by a computer) for drawing graphs or pictures 8. dock INCORRECT: No answer given ANSWER: o MS Word file name extension for Office 2010 9. phishing INCORRECT: No answer given ANSWER: d a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail 10. terabyte INCORRECT: No answer given ANSWER: j a unit of information equal to a trillion (1,099,511,627,776) bytes or 1024 gigabytes 11. freedom of information act INCORRECT: No answer given ANSWER: l citizens have the right to inspect all government records except those containing military, intelligence, or trade secrets or revealing private personnel actions 12. adware INCORRECT: No answer given ANSWER: a any software application in which advertising banners are displayed while the program is running 13. cookie
INCORRECT: No answer given ANSWER: c tracking program used by internet browsers to track visited websites 14. biometrics INCORRECT: No answer given ANSWER: m method of using fingerprints and retina scans for security measures 15. supercomputer INCORRECT: No answer given ANSWER: g most powerful and more expensive type of computer 1. a any software application in which advertising banners are displayed while the program is running 2. b an instrument (usually driven by a computer) for drawing graphs or pictures 3. 4. 5. 6. 7. 8. 9. c tracking program used by internet browsers to track visited websites d a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail e brain of your computer f -exchange of comments among participants sometimes called a news group g most powerful and more expensive type of computer h this generation of computers used transistors i type of network which is city-wide (metropolitan)
10. j a unit of information equal to a trillion (1,099,511,627,776) bytes or 1024 gigabytes 11. k Word, Excel and Power Point can be classified as this type of software 12. l citizens have the right to inspect all government records except those containing military, intelligence, or trade secrets or revealing private personnel actions 13. m method of using fingerprints and retina scans for security measures 14. n the address of a web page on the world wide web 15. o MS Word file name extension for Office 2010
4. Excel function used to insert the current date and time(No Answer) . url a. CPN b. USB c. CORRECT: NOW 5. term for illegal copying or distribution of software(No Answer) . spyware a. dot pitch b. CORRECT: software piracy c. shareware 6. computer software that is designed to collect personal info about users without their informed consent(No Answer) . CORRECT: spyware a. spam b. byte c. shareware 7. places on the outside of the computer where you plug in hardware(No Answer) . byte a. dock b. RAM c. CORRECT: ports 8. MS Word feature that automatically puts text at the top of a page (No Answer) . CORRECT: header a. CD-R b. browser c. RAM 9. network topology where 1 computer controls everything(No Answer) . CORRECT: client-server a. mail merge b. CD-R c. header 10. a semiconductor device capable of amplification(No Answer) . BIOS a. dot pitch b. browser c. CORRECT: transistor 11. is a feature that allows a user to create mass mailings of letters, mailing labels, and other documents and personalize the information in each on MS Word(No Answer) . CORRECT: mail merge a. biometrics b. adware c. internet 12. a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange(No Answer) . cookie
a. CORRECT: internet b. header c. MIN 13. Excel function which returns the smallest value in the range of selected cells(No
Answer)
. MAN a. CORRECT: MIN b. CPN c. USB 14. term for stealing fractions of cents from interest bearing financial accounts(No Answer) . phishing a. CORRECT: salami slicing b. transistor c. mosaic 15. The main circuit board of a microcomputer. The motherboard contains the connectors for attaching additional boards.(No Answer) . terabyte a. CORRECT: motherboard b. plotter c. shareware
15 True/False Questions
1. DVD a digital videodisc has more storage space than CD This is true. You gave no answer. 2. laptop type of network which is city-wide (metropolitan) This is false. You gave no answer. It should be laptop a portable computer small enough to use in your lap. 3. byte a sequence of 8 bits (enough to represent one character of alphanumeric data) processed as a single unit of information This is true. You gave no answer. 4. USB the address of a web page on the world wide web This is false. You gave no answer. It should be USB the newest type of port found on most computer systems. 5. trojan horse a semiconductor device capable of amplification This is false. You gave no answer. It should be trojan horse a program that appears desirable but actually contains something harmful. 6. e-commerce is a feature that allows a user to create mass mailings of letters, mailing labels, and other documents and personalize the information in each on MS Word
This is false. You gave no answer. It should be e-commerce term for conducting business on the internet. 7. RAM unwanted e-mail (usually of a commercial nature sent out in bulk) This is false. You gave no answer. It should be RAM the temporary memory on your computer system. 8. microprocessor method of using fingerprints and retina scans for security measures This is false. You gave no answer. It should be microprocessor integrated circuit semiconductor chip that performs the bulk of the processing and controls the parts of a system, used in 3rd and 4th generation of computers. 9. mosaic tracking program used by internet browsers to track visited websites This is false. You gave no answer. It should be mosaic first graphic web browser. 10. signature file term for salutation that is automatically added to the end of an email This is true. You gave no answer. 11. CD-R a digital videodisc has more storage space than CD This is false. You gave no answer. It should be CD-R A compact disk on which you can write only once and thereafter is read-only memory.. 12. ergonomics The study of workplace equipment design or how to arrange and design devices, machines, or workspace so that people and things interact safely and most efficiently. This is true. You gave no answer. 13. computer viruses programs that "infect" your computer and cause harm to your disk or programs This is true. You gave no answer. 14. legacy MS Word file name extension for Office 2010 This is false. You gave no answer. It should be legacy term for computer technology that is no longer being used. 15. spam the temporary memory on your computer system This is false. You gave no answer. It should be spam unwanted e-mail (usually of a commercial nature sent out in bulk).