Computer System Architecture MCQ Bank PDF
Computer System Architecture MCQ Bank PDF
Computer System Architecture MCQ Bank PDF
com/forum
c. Floppy disk
d. Optical disk
9. Data access time of optical disk varies from 200 to 350minutes with transfer rate of ________:
a. 130KB/s to 400KB/s
b. 130KB/s to 500KB/s
c. 150KB/s to 600KB/s
d. 150KB/s to 800KB/s
10. NAND type flash memory data storage devices integrated with a _______ interface:
a. ATM
b. LAN
c. USB
d. DBMS
11. Which disk is based on the same principle as the optical disk:
a. Optical disk
b. Magnetic disk
c. Magneto-optical disk
d. All of these
12. WAN stands for:
a. Wide area network
b. Word area network
c. World area network
d. Window area network
13. The human-interactive I/O devices can be further categorized as____:
a. Direct
b. Indirect
c. Both
d. None
14. I/O devices are categorized in 2 parts are:
a. Character devices
b. Block devices
c. Numeral devices
d. Both a & b
15. UART stands for:
a. Universal asynchronization receiver/transmitter
b. Universal asynchronous receiver/transmitter
c. United asynchronous receiver/transmitter
d. Universal automatic receiver/transmitter
16. Which are following pointing devices:
a. Light pen
b. Joystick
c. Mouse
d. All of these
17. Full form of LED:
a. Light emitting diode
b. Light encounter destination
File hosted by educationobserver.com/forum
c. 21-12 inch
d. 21-11 inch
36. Range of color depends on:
a. Number of bits code lines with each pixel
b. Number of bits associated with each pixel
c. Number of instructions associated with each pixel
d. Number of code associated with each pixel
37. Which parameter defines number of times electron beam scans screen in a second:
a. Refresh rate
b. Data transfer rate
c. Pitch rate
d. All of these
38. Refresh rate refresh screen up to:
a. 30 Hz per frame
b. 33 Hz per frame
c. 44 Hz per frame
d. 20 Hz per frame
39. Printer speed is ______pages per minute:
a. 13
b. 12
c. 11
d. 10
40. Printer is a:
a. Hardcopy
b. Softcopy
c. Both a & b
d. None of these
41. Laser printer is type of:
a. Impact printer
b. Non-impact printer
c. Both a & b
d. None of these
42. ______printer print 120 to 200 characters per second:
a. Dot-matrix
b. Laser
c. Line
d. None of these
43. In_______ printing, each character is printed on the paper by striking a pin or hammer against an inked
ribbon:
a. Non-impact printing
b. Impact printing
c. Both a & b
d. None of these
44. Dot matrix printer is 2 types is:
a. Daisy wheels
File hosted by educationobserver.com/forum
b. Matrix printer
c. High quality matrix printer
d. Both a & c
45. In daisy wheel printer can print 40 character/second and bold characters are achieved by overprinting the
text:
a. Four times
b. Double
c. Once
d. Thrice
46. _______printers spray tiny droplets of coloured inks on the paper and pattern depends on how nozzle
sprays the ink:
a. Inkjet printer
b. Laser printer
c. Daisy wheel
d. Dot matrix printer
47. Laser printer is a type of :
a. Impact printing
b. Non-impact printing
c. Both a & b
d. None of these
48. ______are used for printing big charts, drawings, maps and 3 dimensional illustrations specially for
architectural and designing purposes:
a. Printers
b. Plotters
c. Speakers
d. Mouse
49. DAC stands for:
a. Digital to analog converter
b. Analog to digital converter
c. Only digital converter
d. Only analog converter
50. In text to speech, speech is synthesized using lookup table of______ and these clubbed together to
form_______:
a. Phonemes, Words
b. Phonemes, Sentences
c. Character, Phonemes
d. Word, Character
51. ______interface is an entity that controls data transfer from external device, main memory and or CPU
registers:
a. I/O interface
b. CPU interface
c. Input interface
d. Output interface
52. The operating mode of I/O devices is_______ for different device:
a. Same
File hosted by educationobserver.com/forum
b. Different
c. Optimum
d. Medium
53. To resolve problems of I/O devices there is a special hardware component between CPU and_______ to
supervise and synchronize all input output transfers:
a. Software
b. Hardware
c. Peripheral
d. None of these
54. I/O modules are designed with aims to:
a. Achieve device independence
b. Handle errors
c. Speed up transfer of data
d. Handle deadlocks
e. Enable multi-user systems to use dedicated device
f. All of these
55. IDE is a_________ controller:
a. Disk
b. Floppy
c. Hard
d. None of these
56. In devices, controller is used for______:
a. Buffering the data
b. Manipulate the data
c. Calculate the data
d. Input the data
57. By which signal flow of traffic between internal and external devices is done:
a. Only control signal
b. Only timing signal
c. Control and timing signal
d. None of these
58. In devices 2 status reporting signals are:
a. BUSY
b. READY
c. Both a & b
d. None of these
59. I/O module must recognize a______ address for each peripheral it controls:
a. Long
b. Same
c. Unique
d. Bigger
60. Each interaction b/w CPU and I/O module involves:
a. Bus arbitration
b. Bus revolution
c. Data bus
File hosted by educationobserver.com/forum
d. Control signals
61. Which are 4 types of commands received by an interface:
a. Control, status, data output, data input
b. Only data input
c. Control, flag, data output, address arbitration
d. Data input, data output, status bit, decoder
62. Two ways in which computer buses can communicate with memory in case of I/O devices by using:
a. Separate buses for memory and I/O device
b. Common bus for memory and I/O device
c. both a & b
d. none of these
63. There are 2 ways in which addressing can be done in memory and I/O device:
a. Isolated I/O
b. Memory-mapped I/O
c. Both a & b
d. None of these
64. Advantages of isolated I/O are:
a. Commonly usable
b. Small number of I/O instructions
c. Both a & b
d. None of these
65. In _______ addressing technique separate address space is used for both memory and I/O device:
a. Memory-mapped I/O
b. Isolated I/O
c. Both a & b
d. None of these
66. _______is a single address space for storing both memory and I/O devices:
a. Memory-mapped I/O
b. Isolated I/O
c. Separate I/O
d. Optimum I/O
67. Following are the disadvantages of memory-mapped I/O are:
a. Valuable memory address space used up
b. I/O module register treated as memory addresses
c. Same machine intersection used to access both memory and I/O device
d. All of these
68. Who determine the address of I/O interface:
a. Register select
b. Chip select
c. Both a & b
d. None of these
69. 2 control lines in I/O interface is:
a. RD, WR
b. RD,DATA
c. WR, DATA
File hosted by educationobserver.com/forum
d. RD, MEMORY
70. In I/O interface RS1 and RS0 are used for selecting:
a. Memory
b. Register
c. CPU
d. Buffer
71. If CPU and I/O interface share a common bus than transfer of data b/w 2 units is said to be:
a. Synchronous
b. Asynchronous
c. Clock dependent
d. Decoder independent
72. All the operations in a digital system are synchronized by a clock that is generated by:
a. Clock
b. Pulse
c. Pulse generator
d. Bus
73. Asynchronous means:
a. Not in step with the elapse of address
b. Not in step with the elapse of control
c. Not in step with the elapse of data
d. Not in step with the elapse of time
74. ________is a single control line that informs destination unit that a valid is available on the bus:
a. Strobe
b. Handshaking
c. Synchronous
d. Asynchronous
75. What is disadvantage of strobe scheme:
a. No surety that destination received data before source removes it
b. Destination unit transfer without knowing whether source placed data on data bus
c. Cant said
d. Both a & b
76. In_______ technique has 1 or more control signal for acknowledgement that is used for intimation:
a. Handshaking
b. Strobe
c. Both a & b
d. None of these
77. The keyboard has a__________ asynchronous transfer mode:
a. Parallel
b. Serial
c. Optimum
d. None
78. In _______transfer each bit is sent one after the another in a sequence of event and requires just one line:
a. Serial
b. Parallel
c. Both a & b
File hosted by educationobserver.com/forum
d. None of these
79. Modes of transfer b/w computer and I/O device are:
a. Programmed I/O
b. Interrupt-initiated I/O
c. DMA
d. Dedicated processor such as IOP and DCP
e. All of these
80. ______operations are the results of I/O operations that are written in the computer program:
a. Programmed I/O
b. DMA
c. Handshaking
d. Strobe
81. _______is a dedicated processor that combines interface unit and DMA as one unit:
a. Input-Output Processor
b. Only input processor
c. Only output processor
d. None of these
82. ______is a special purpose dedicated processor that is designed specially designed for data transfer in
network:
a. Data Processor
b. Data Communication Processor
c. DMA Processor
d. Interrupt Processor
83. ______processor has to check continuously till device becomes ready for transferring the data:
a. Interrupt-initiated I/O
b. DMA
c. IOP
d. DCP
84. Interrupt-driven I/O data transfer technique is based on______ concept:
a. On demand processing
b. Off demand processing
c. Both a & b
d. None of these
85. Which technique helps processor to run a program concurrently with I/O operations:
a. Interrupt driven I/O
b. DMA
c. IOP
d. DCP
86. 3 types of exceptions are:
a. Interrupts
b. Traps
c. System calls
d. All of these
87. Which exception is also called software interrupt:
a. Interrupt
File hosted by educationobserver.com/forum
b. System calls
c. Traps
d. All of these
88. User programs interact with I/O devices through:
a. Operating system
b. Hardware
c. Cpu
d. Microprocessor
89. Which table handle store address of interrupt handling subroutine:
a. Interrupt vector table
b. Vector table
c. Symbol link table
d. None of these
90. Which technique is used that identifies the highest priority resource by means of software:
a. Daisy chaining
b. Polling
c. Priority
d. Chaining
91. ________interrupt establishes a priority over the various sources to determine which request should be
entertained first:
a. Priority interrupt
b. Polling
c. Daisy chaining
d. None of these
92. _____method is used to establish priority by serially connecting all devices that request an interrupt:
a. Polling
b. Daisy chaining
c. Priority
d. None of these
93. In daisy chaining device 0 will pass signal only if it has:
a. Interrupt request
b. No interrupt request
c. Both a & b
d. None of these
94. VAD stands for:
a. Vector address
b. Symbol address
c. Link address
d. None of these
95. _______interrupt method uses a register whose bits are set separately by interrupt signal for each device:
a. Parallel priority interrupt
b. Serial priority interrupt
c. Both a & b
d. None of these
96. ______register is used whose purpose is to control status of each interrupt request in parallel priority
File hosted by educationobserver.com/forum
interrupt:
a. Mass
b. Mark
c. Make
d. Mask
97. The ANDed output of bits of interrupt register and mask register are set as input of:
a. Priority decoder
b. Priority encoder
c. Priority decoder
d. Multiplexer
98. Which 2 output bits of priority encoder are the part of vector address for each interrupt source in parallel
priority interrupt:
a. A0 and A1
b. A0 and A2
c. A0 and A3
d. A1 and A2
99. What is the purpose
100. of A0 and A1 output bits of priority encoder in parallel priority:
a. Tell data bus which device is to entertained and stored in VAD
b. Tell subroutine which device is to entertained and stored in VAD
c. Tell subroutine which device is to entertained and stored in SAD
d. Tell program which device is to entertained and stored in VAD
101. When CPU invokes a subroutine it performs following functions:
a. Pushes updated PC content(return address) on stack
b. Loads PC with starting address of subroutine
c. Loads PC with starting address of ALU
d. Both a & b
102. DMAC stands for:
a. Direct memory access controller
b. Direct memory accumulator controller
c. Direct memory access content
d. Direct main access controller
103. IOP stands for:
a. Input output processor
104. DCP stands for:
a. Data communication processor
105. Which may be classified as a processor with the direct memory access capability that communicates
with I/O devices:
a. DCP
b. IOP
c. Both
d. None
106. The processor that communicates with remote terminals like telephone or any other serial
communication media in serial fashion is called ______:
a. DCP
File hosted by educationobserver.com/forum
b. IOP
c. Both
d. None
107. Instruction that are used for reading from memory by an IOP called _______:
a. Commands
b. Block diagram
c. Interrupt
d. None of these
108. Data communication with a remote device a special data communication is used_______:
a. Multiprocessor
b. Serial communication
c. DCP
d. IOP
109. CRC stands for:
a. Cyclic redundancy check
110. Which is used for synchronous data, PID is process ID, followed by message, CRC code and EOP
indicating end of block:
a. DCP
b. CRC
c. IOP
d. SYNC
111. Which is commonly used in high speed devices to realize full efficiency of communication link:
a. Transmission
b. Synchronous communication
c. Multiprocessor
d. All of these
112. Multiprocessor use ________ than two CPUs assembled in single system unit:
a. One or More
b. Two or More
c. One or One
d. Two or Two
113. Which refers the execution of various software process concurrently:
a. Multiprocessor
b. Serial communication
c. DCP
d. IOP
114. Which is used for this and known as high speed buffer exist with almost each process?
a. Primary
b. RAM
c. Cache
d. None of these
115. Data and instructions are accessed from local memory and global memory that is used by_____:
a. Internetworking facilities
b. Interconnection facilities
c. Both a & b
File hosted by educationobserver.com/forum
d. None of these
116. Multiprocessor uses large caches but limited process that shares________
a. Memory bus
b. Single memory bus
c. Double memory bus
d. None of these
117. Distributed are shares also referred to as tightly coupled and loosely coupled multiprocessor
respectively and hence called __________
a. Coupled multiprocessor
b. Shared multiprocessor
c. Distributed multiprocessor
d. None of these
118. Which consist if a numbers of processor can be accessed among various shared memory modules?
a. Coupled memory multiprocessor
b. Shared memory multiprocessor
c. Distributed memory multiprocessor
d. None of these
119. Which keeps a number of processors in which virtual storage space is assigned for redundant
execution:
a. Coupled memory multiprocessor
b. Shared memory multiprocessor
c. Distributed memory multiprocessor
d. None of these
120. The memory capacity in system is considered because the connecting processors are used______:
a. Network
b. Internet
c. Intranet
d. None of these
121. Intercrosses arbitration system for multiprocessor shares a _________:
a. Primary bus
b. Common bus
c. Domain bus
d. All of these
122. Which is used to decentralize the decision to avail greater flexibility to the system that makes
processor or microprocessor in a very short:
a. Arbitration
b. Centralized
c. Both a & b
d. None of these
123. Which is signal tells that an arbitration of the access bus is possible during interprocessing:
a. DBA
b. BAP
c. BNA
d. None of these
124. Which signal bus request :
File hosted by educationobserver.com/forum
a. BAP
b. BNA
c. BAL
d. DBA
125. Which signal on the bus indicates that request from process arbitration is to be processed:
a. BAL
b. BREQ
c. BM4
d. DBA
126. Which signal is exchange information by bus:
a. BECH
b. BM4
c. BAL
d. All of these
127. Which signal on bus applies +1 to the priority of resolution circuits of the arbitration designate a new
arbitration:
a. BM4
b. BAL
c. BNA
d. DBA
128. Which signal create 3 lines of bus in which signals from the encoded number of processors:
a. BM1 to BM3
b. BAL
c. Both
d. None of these
129. Which signal request the validation signal make active if its logic level is 0 and validate signals from
BM1 to BM3:
a. BAL
b. BM4
c. BNA
d. All of these
130. Which signal represents synchronization signal decided by interprocess arbitration with a certain
delay or signal DMA:
a. BAL
b. BNA
c. Both
d. None of these
131. In which condition only one process holds a resource at a given time:
a. Mutual exclusion
b. Hold and wait
c. Both
d. None of these
132. In which condition one process holds the allocated resources and other waits for it:
a. No preemption
b. Hold and wait
File hosted by educationobserver.com/forum
c. Mutual exclusion
d. All of these
133. In which condition resource is not removed from a process holding:
a. Synchronization problem
b. No preemption
c. Hold and wait
d. None of these
134. In which condition busy waiting, programmer error, deadlock or circular wait occurs in
interprocessing:
a. Synchronization problem
b. No preemption
c. Hold and wait
d. None of these
135. Mechanism can be referred to as adding a new facility to the system hence known as _______:
a. Process
b. Arbitration
c. Both a & b
d. None of these
136. Which is a mechanism used by the OS to ensure a systematic sharing of resources amongst
concurrent resources:
a. Process synchronous
b. Process system
c. Process synchronization
d. All of these
137. _________ is basically sequence of instructions with a clear indication of beginning and end for
updating shared variables
a. Critical section
b. Entry section
c. Remainder section
d. All of these
138. Which provides a direct hardware support to mutual exclusion
a. Test-and-set(TS)
b. Swap instruction
c. Wait instruction
d. Signal instruction
139. A process waiting to enter its critical section may have to wait for unduly_______:
a. Short time or may have to wait forever
b. Long time or may have to wait forever
c. Short time or may have to wait for long time
d. Long time or may have to wait for short time
140. Which is a modified version of the TS instruction which is designed to remove busy- waiting:
a. Swap instruction
b. Wait instruction
c. Signal instruction
d. Both b & c
File hosted by educationobserver.com/forum
151. ______ semaphore provides mutual exclusion for accesses to the buffer pool and is initialized to the
value:
a. Mutex
b. Mutual
c. Memory
d. All of these
152. Which processes access and manipulate the shared data concurrently:
a. Micro processes
b. Several processes
c. Both
d. None of these
153. Which section is basically a sequence of instruction with a clear indication of beginning and end for
updating shared variables:
a. Racing section
b. Critical section
c. Both
d. None of these
154. In which section only one process is allowed to access the shared variable and all other have to wait:
a. Critical section
b. Racing section
c. Entry section
d. Remainder section
155. Which are the problem of critical section:
a. Mutual exclusion
b. Progress
c. Bounded wait
d. All of these
156. Which section refer to the code segment of a process that is executed when the process intends to
enter its critical section:
a. Critical section
b. Entry section
c. Reminder section
d. None of these
157. Which section refer to the code segment where a shared resource is accessed by the process:
a. Reminder section
b. Entry section
c. Both
d. None of these
158. Which section is the remaining part of a processs code:
a. Racing section
b. Critical section
c. Entry section
d. Reminder section
159. How many conditions for controlling access to critical section:
a. 2
File hosted by educationobserver.com/forum
b. 4
c. 3
d. 5
160. Which instruction provides a direct hardware support to mutual exclusion:
a. SP instruction
b. TS instruction
c. Both
d. None of these
161. Which instruction also improves the efficiency of the system:
a. Swap instruction
b. TS instruction
c. Both
d. None of these
162. Which instruction allows only one concurrent process to enter the critical section:
a. RP instruction
b. SP instruction
c. TS instruction
d. None of these
163. Which section problem can be solved simply in a uniprocessor environment if the we are able to
prevent the occurrence of interrupt during the modification of a shared variable:
a. Entry section
b. Critical section
c. Non-critical section
d. None of these
e.
164. The problem of readers and writers was first formulated by ________:
a. P.J. Courtois
b. F.Heymans
c. D.L. Parnas
d. All of these
165. Which is a situation in which some process wait for each others actions indefinitely:
a. Operating system
b. Deadlock
c. Mutex
d. None of these
166. _________system handles only deadlocks caused by sharing of resources in the system:
a. Operating system
b. Deadlock
c. Mutex
d. None of these
167. A deadlocks occurs when the how many conditions are met:
a. 1
b. 2
c. 3
d. 4
File hosted by educationobserver.com/forum
hold:
a. 1
b. 2
c. 3
d. 4
178. Which state refers to a state that is not safe not necessarily a deadlocked state:
a. Safe state
b. Unsafe state
c. Both a & b
d. None of these
179. ________ a direct arrow is drawn from the process to the resource rectangle to represent each
pending resource request:
a. TS
b. SP
c. CCR
d. RAG
180. The attributes of a file are:
a. Name
b. Identifier
c. Types
d. Location
e. Size
f. Protection
g. Time, date and user identification
h. All of these
181. The various file operation are:
a. Crating a file
b. Writing a file
c. Reading a file
d. Repositioning within a file
e. Deleting a file truncating a file
f. All of these
182. Which operations are to be performed on a directory are:
a. Search for a file
b. Create a file
c. Delete a file
d. List a directory
e. Rename a file
f. Traverse the file system
g. All of these
183. Which memory is assembled between main memory and CPU:
a. Primary memory
b. Cache memory
c. Both a & b
d. None of these
File hosted by educationobserver.com/forum
1. A number system that uses only two digits, 0 and 1 is called the___________:
a. Octal number system
b. Binary number system
c. Decimal number system
d. Hexadecimal number system
2. In which computers, the binary number are represented by a set of binary storage device such as flip flop:
a. Microcomputer
b. Personal computer
c. Digital computer
File hosted by educationobserver.com/forum
d. All of these
3. A binary number can be converted into _________:
a. Binary number
b. Octal number
c. Decimal number
d. Hexadecimal number
4. Which system is used to refer amount of things:
a. Number system
b. Number words
c. Number symbols
d. All of these
5. _________are made with some part of body, usually the hands:
a. Number words
b. Number symbols
c. Number gestures
d. All of these
6. __________are marked or written down:
a. Number system
b. Number words
c. Number symbols
d. Number gestures
7. A number symbol is called a ___________:
a. Arabic numerals
b. Numerals
c. Both
d. None of these
8. 0,1,2 ,3 ,4,5,6 ,7,8 and 9 numerals are called:
a. Arabic numerals
b. String numerals
c. Digit numerals
d. None of these
9. How many system of arithmetic, which are often used in digital system:
a. 5
b. 6
c. 3
d. 4
10. Which are the system of arithmetic, which are often used in digital system:
a. Binary digit
b. Decimal digit
c. Hexadecimal digit
d. Octal digit
e. All of these
11. In any system, there is an ordered set of symbols also known as___________:
a. Digital
b. Digit
File hosted by educationobserver.com/forum
c. Both
d. None of these
12. Which is general has two parts in number system:
a. Integer
b. Fraction
c. Both
d. None of these
13. MSD stand for:
a. Most significant digit
b. Many significant digit
c. Both a and b
d. None of these
14. LSD stand for:
a. Less significant digit
b. Least significant digit
c. Loss significant digit
d. None of these
15. The _____ and ________ of a number is defined as the number of different digits which can occur in each
position in the system:
a. Base
b. Radix
c. Both
d. None of these
16. Which system has a base or radix of 10:
a. Binary digit
b. Hexadecimal digit
c. Decimal digit
d. Octal digit
17. Each of the ten decimal digits__________:
a. 1 through 10
b. 0 through 9
c. 2 through 11
d. All of these
18. The binary number system is also called a __________:
a. Base one system
b. Base two system
c. Base system
d. Binary system
19. The two symbols 0 and 1 are known as:
a. Bytes
b. Bits
c. Digit
d. All of these
20. In which counting, single digit are used for none and one:
a. Decimal counting
File hosted by educationobserver.com/forum
b. Octal counting
c. Hexadecimal counting
d. Binary counting
21. In which numeral every position has a value 2 times the value f the position to its right:
a. Decimal
b. Octal
c. Hexadecimal
d. Binary
22. A binary number with 4 bits is called a_________:
a. Bit
b. Bytes
c. Nibble
d. None of these
23. A binary number with 8 bits is called as a___________:
a. Bytes
b. Bits
c. Nibble
d. All of these
24. In which digit the value increases in power of two starting with 0 to left of the binary point and decreases
to the right of the binary point starting with power -1:
a. Hexadecimal
b. Decimal
c. Binary
d. Octal
25. Which system is used in digital computers because all electrical and electronic circuits can be made to
respond to the states concept:
a. Hexadecimal number
b. Binary number
c. Octal number
d. Decimal number
26. Which addition is performed in the same manner as decimal addition:
a. Binary
b. Decimal
c. Both
d. None of these
27. ______in all digital systems actually performs addition that can handle only two number at a time:
a. Register
b. circuit
c. digital
d. All of these
28. Which machine can perform addition operation in less than 1 ms:
a. Digital machine
b. Electronic machine
c. Both
d. None of these
File hosted by educationobserver.com/forum
c. Both
d. None of these
47. Which algorithm is a multiplication algorithm which multiplies two signed binary numbers in 2s
complement notation:
a. Usual multiplication
b. Booths multiplication
c. Both
d. None of these
48. Which algorithm includes repeated addition of two predetermined values A and S to a product P and then
performs a rightward arithmetic shift on P:
a. Booths algorithm
b. Usual algorithm
c. Multiplication algorithm
d. None of these
49. Which algorithm in mathematics expresses the outcome of the process of division of integers by another:
a. Addition algorithm
b. Multiplication algorithm
c. Division algorithm
d. None of these
50. Which algorithm is used to find GCD of two integers:
a. Multiplication algorithm
b. Division algorithm
c. Addition algorithm
d. Simple algorithm
51. Which algorithm is used as a general variant of a theorems, in the domain of integral numbers:
a. Multiplication algorithm
b. Division algorithm
c. Addition algorithm
d. Simple algorithm
52. How many main approaches to algorithm for division:
a. 2
b. 3
c. 4
d. 5
53. How many algorithm based on add/subtract and shift category:
a. 2
b. 4
c. 3
d. 6
54. Which are the algorithm based on add/subtract and shift category:
a. Restoring division
b. Non-restoring division
c. SRT division
d. All of these
55. Several methods for converting a ___________:
File hosted by educationobserver.com/forum
a. Binary
b. Decimal
c. Hexadecimal
d. Octal
65. An __________can be easily converted to its decimal equivalent by multiplying each octal digit by
positional weight:
a. Binary number
b. Octal number
c. Hexadecimal number
d. Decimal number
66. The simple procedure is to use ___________ :
a. Binary-triplet method
b. Decimal-triplet method
c. Octal-triplet method
d. All of these
67. Which system groups number by sixteen and power of sixteen:
a. Binary
b. Hexadecimal
c. Octal
d. None of these
68. Which number are used extensively in microprocessor work:
a. Octal
b. Hexadecimal
c. Both
d. None of these
69. Which number is formed from a binary number by grouping bits in groups of 4-bit each starting at the
binary point:
a. Binary
b. Octal
c. Decimal
d. Hexadecimal
70. Which number system has a base of 16 :
a. Binary number system
b. Octal number system
c. Decimal number system
d. Hexadecimal number system
71. Counting in hex, each digit can be increment from__________:
a. 0 to F
b. 0 to G
c. 0 to H
d. 0 to J
72. Which number can be converted into binary numbers by converted each hexadecimal digit to 4 bits binary
equivalent using the code:
a. Binary number
b. Decimal number
File hosted by educationobserver.com/forum
c. Octal number
d. Hexadecimal number
73. One way to convert from decimal to hexadecimal is the _________:
a. Double dabble method
b. Hex dabble method
c. Binary dabble method
d. All of these
74. Binary numbers can also be expressed in this same notation by _________representation:
a. Floating point
b. Binary point
c. Decimal point
d. All of these
75. How many parts of floating point representation of a number consists:
a. 4
b. 2
c. 3
d. 5
76. The first part of floating point represents a signed fixed point number called:
a. Exponent
b. Digit
c. Number
d. Mantissa
77. The second part of floating point designates the position of the decimal point and is called:
a. Mantissa
b. Binomial
c. Octal
d. Exponent
78. The fixed point mantissa may be _______or__________:
a. Fraction
b. Integer
c. Both
d. None of these
79. The number of bit required to express_________ and _______ are determined by the accuracy desired from
the computing system :
a. Exponent
b. Mantissa
c. Both
d. None f these
80. Which part is not physically indicated in the register:
a. Binary
b. Decimal
c. Octal
d. None of these
e.
81. The exponent contains the decimal number :
File hosted by educationobserver.com/forum
a. +05
b. +03
c. +04
d. +07
82. The first or the integer part is known as________:
a. Exponent
b. Integer
c. Binomial
d. None of these
83. How many bits of mantissa :
a. 4
b. 8
c. 10
d. 16
84. How many bit of exponent:
a. 4
b. 6
c. 8
d. 10
85. Which number is said to be normalized if the more significant position of the mantissa contains a non zero
digit:
a. Binary point number
b. Mantissa point number
c. Floating point number
d. None of these
86. Which operation with floating point numbers are more complicated then arithmetic operation with fixed
point number :
a. Logical operation
b. Arithmetic operation
c. Both
d. None of these
1. _____ is a command given to a computer to perform a specified operation on some given data:
a. An instruction
b. Command
c. Code
d. None of these
a. PC
File hosted by educationobserver.com/forum
b. ALU
c. Both a and b
d. CPU
a. Opcode
b. Operand
c. Only a
d. Both a & b
a. Unique
b. Two
c. Three
d. Four
a. MOV
b. ADD
c. SUB
d. All of these
6. _______specify where to get the source and destination operands for the operation specified by the
_______:
a. Operand fields and opcode
b. Opcode and operand
c. Source and destination
d. Cpu and memory
7. The source/destination of operands can be the_______ or one of the general-purpose register:
a. Memory
b. One
c. both
d. None of these
8. The complete set of op-codes for a particular microprocessor defines the______ set for that processor:
a. Code
b. Function
c. Module
d. Instruction
File hosted by educationobserver.com/forum
a. Instruction selection
b. Selection control
c. Instruction sequencing
d. All of these
10. The simplest method of controlling sequence of instruction execution is to have each instruction explicitly
specify:
a. The address of next instruction to be run
b. Address of previous instruction
c. Both a & b
d. None of these
11. As the instruction length increases ________ of instruction addresses in all the instruction is_______:
a. Implicit inclusion
b. Implicit and disadvantageous
c. Explicit and disadvantageous
d. Explicit and disadvantageous
12. ______is the sequence of operations performed by CPU in processing an instruction:
a. Execute cycle
b. Fetch cycle
c. Decode
d. Instruction cycle
a. Fetch time
b. Execution time
c. Control time
d. All of these
14. _____is the step during which a new instruction is read from the memory:
a. Decode
b. Fetch
c. Execute
d. None of these
15. ________is the step during which the operations specified by the instruction are executed:
a. Execute
b. Decode
c. Both a& b
d. None of these
File hosted by educationobserver.com/forum
a. Initialized
b. Incremented
c. Decoded
d. Both b & c
17. The instruction fetch operation is initiated by loading the contents of program counter into the______ and
sends_____ request to memory:
a. Memory register and read
b. Memory register and write
c. Data register and read
d. Address register and read
18. The contents of the program counter is the _______ of the instruction to be run:
a. Data
b. Address
c. Counter
d. None of these
19. The instruction read from memory is then placed in the_______ and contents of program counter is______
so that it contains the address of_______ instruction in the program:
a. Program counter, incremented and next
b. Instruction register, incremented and previous
c. Instruction register, incremented and next
d. Address register, decremented and next
20. Execution of instruction specified by instruction to perform:
a. Operation
b. Operands
c. Both a & b
d. None of these
a. Data
b. Code
c. Address
d. Control
a. Binary code
b. Digit code
File hosted by educationobserver.com/forum
c. Symbolic representation
d. None of these
a. Nibble
b. Byte
c. Decimal
d. Digit
a. 1-10
b. 1-9
c. 0-9
d. 0-10
25. The ______ are assigned according to the position occupied by digits:
a. Volume
b. Weight
c. Mass
d. All of these
27. ________are the codes that represent alphabetic characters, punctuation marks and other special
characters:
a. Alphanumeric codes
b. ASCII codes
c. EBCDIC codes
d. All of these
a. 6
b. 7
c. 5
d. 8
30. Which code used in transferring coded information from keyboards and to computer display and printers:
a. ASCII
b. EBCDIC
c. Both
d. None of these
31. Which code used to represent numbers, letters, punctuation marks as well as control characters:
a. ASCII
b. EBCDIC
c. Both
d. None of these
a. 7
b. 8
c. 5
d. 9
34. Which code the decimal digits are represented by the 8421 BCD code preceded by 1111:
a. ASCII
b. EBCDIC
c. Both
d. None of these
35. _________ has the property that corrupting or garbling a code word will likely produce a bit string that is
not a code word:
d. None of these
38. The ability of a code to detect single errors can be stated in term of the _________:
a. Concept of distance
b. Even parity
c. Odd parity
d. None of these
39. The first n bit of a code word called __________ may be any of the 2 n n- bit string minimum error bit:
a. Information bits
b. String bits
c. Error bits
d. All of these
40. A code in which the total number of 1s in a valid (n+1) bit code word is even, this is called an __________:
41. A code in which the total number of 1s in a valid (n+1)bit code word is odd and this code is called
an__________:
a. n bit
b. n cube
c. n single
d. n double
43. Which method is used to detect double errors and pinpoint erroneous bits:
a. Even parity method
b. Odd parity method
c. Check sum method
d. All of these
44. A code that is used to correct error is called an _________:
a. Error detecting code
b. Error correcting code
c. Both
d. None of these
45. A received ___________with a bit error will be closer to the originally transmitted code word than to any
other code word:
a. Code word
b. Non code word
c. Decoding
d. All of these
46. Which code word was originally transmitted to produce a received word is called:
a. 1953
b. 1950
c. 1945
d. 1956
49. ____________ between two code words is defined as the number of bits that must be changed for one code
File hosted by educationobserver.com/forum
to another:
a. Hamming codes
b. Hamming distance
c. Both
d. None of these
50. It is actually a method for constructing codes with a minimum distance of ____:
a. 2
b. 4
c. 3
d. 5
i
51. The bit position in a ___________ can be numbered from 1 through 2 -1:
52. Each check bit is grouped with the information bits as specified by a____________:
53. The pattern of groups that have odd parity called the _________must match one of the of columns in the
parity check matrix:
a. Syndrome
b. Dynodes
c. Both
d. None of these
a. Programmer
b. Processors
c. Instruction
d. Opcode
a. Op code
b. Instruction code
c. Parity code
d. Operand code
56. The list of specific instruction supported by the CPU is termed as its ____________:
a. Instruction code
b. Parity set
c. Instruction set
d. None of these
57. __________is divided into a number of fields and is represented as a sequence of bits:
a. instruction
b. instruction set
c. instruction code
d. parity code
a. Timing
b. Control
c. Both
d. None of these
60. Which unit acts as the brain of the computer which control other peripherals and interfaces:
a. Memory unit
b. Cache unit
c. Timing and control unit
d. None of these
61. It contains the ____________stack for PC storage during subroutine calls and input/output interrupt
services:
62. Which unit works as an interface between the processor and all the memories on chip or off- chip:
a. Timing unit
b. Control unit
c. Memory control unit
d. All of these
a. 45 MHZ
b. 50 MHZ
c. 52 MHZ
d. 68 MHZ
64. ________ is given an instruction in machine language this instruction is fetched from the memory by the
CPU to execute:
a. ALU
b. CPU
c. MU
d. All of these
65. Which cycle refers to the time period during which one instruction is fetched and executed by the CPU:
a. Fetch cycle
b. Instruction cycle
c. Decode cycle
d. Execute cycle
a. 5
b. 6
c. 4
d. 7
a. Fetch
b. Decode
c. Execute
d. Derive effective address of the instruction
File hosted by educationobserver.com/forum
e. All of these
a. Memory address
b. Effective memory address
c. Both a and b
d. None of these
70. Which are instruction in which two machine cycle are required:
a. Instruction cycle
b. Memory reference instruction
c. Both
d. None of these
71. Which instruction are used in multithreaded parallel processor architecture:
72. Which instruction are arranged as per the protocols of memory reference format of the input file in a
simple ASCII sequence of integers between the range 0 to 99 separated by spaces without formatted text and
symbols:
73. ____________ is an external hardware event which causes the CPU to interrupt the current instruction
sequence:
a. Input interrupt
b. Output interrupt
c. Both
d. None of these
a. Save interrupt
b. Input/output interrupt
c. Service interrupt
d. All of these
a. Interrupt enter
b. Interrupt return
c. Interrupt delete
d. None of these
a. Speed
b. Accuracy
c. Storage
d. Versatility
a. Speed
b. Accuracy
c. Storage
d. Versatility
a. Garbage-in-garbage-out
b. Garbage-in garbage-occur
c. Both
d. None of these
a. 5
b. 6
c. 4
d. 7
a. Intelligence
b. Storage
c. Versatility
d. Diligence
a. Inputting
b. Storing
c. Processing
d. Outputting
e. Controlling
f. All of these
88. The control unit and arithmetic logic unit are know as the ___________:
89. Which unit is comparable to the central nervous system in the human body:
a. Output unit
b. Control unit
c. Input unit
d. All of these
a. Storage capacity
b. Magnetic disk
c. Both
d. None of these
a. Electrical digit
b. Electrical component
c. Electronic bit
d. None of these
a. Byte
b. Bit
c. Digits
d. Component
a. Binary digit
b. Octal digit
c. Both
d. None of these
a. 5
b. 4
c. 7
d. 8
File hosted by educationobserver.com/forum
a. 3
b. 4
c. 6
d. 8
96. Which is the most important component of a digit computer that interprets the instruction and processes
the data contained in computer programs:
a. MU
b. ALU
c. CPU
d. PC
97. Which part work as a the brain of the computer and performs most of the calculation:
a. MU
b. PC
c. ALU
d. CPU
a. Execute of programs
b. Execution of programs
c. Both
d. None of these
a. 4
b. 3
c. 6
d. 8
a. Instruction register
b. Program register
c. Control register
d. None of these
a. Instruction register
b. Program register
c. Program control register
d. None of these
a. Microprocessor
b. Microcode
c. Both
d. None of these
103. Which are microcomputers commonly used for commercial data processing, desktop publishing and
engineering application:
a. Digital computer
b. Personal computer
c. Both
d. None of these
104. Which microprocessor has the control unit, memory unit and arithmetic and logic unit:
a. Pentium IV processor
b. Pentium V processor
c. Pentium III processor
d. None of these
105. The processing speed of a computer depends on the __________of the system:
a. Clock speed
b. Motorola
c. Cyrix
d. None of these
a. Pentium III
b. Pentium II
c. Pentium IV
d. All of these
b. Motorola corporations
c. Both
d. None of these
2. Which operations are used for addition, subtraction, increment, decrement and complement function:
a. Bus
b. Memory transfer
c. Arithmetic operation
d. All of these
3. Which language is termed as the symbolic depiction used for indicating the series:
a. Random transfer language
b. Register transfer language
c. Arithmetic transfer language
d. All of these
4. The method of writing symbol to indicate a provided computational process is called as a:
a. Programming language
b. Random transfer language
c. Register transfer language
d. Arithmetic transfer language
5. In which transfer the computer register are indicated in capital letters for depicting its function:
a. Memory transfer
b. Register transfer
c. Bus transfer
d. None of these
6. The register that includes the address of the memory unit is termed as the ____:
a. MAR
b. PC
c. IR
d. None of these
a. MAR
b. PC
c. IR
d. None of these
a. MAR
b. PC
c. IR
d. None of these
a. MAR
b. PC
c. IR
d. RI
a. 2
b. 4
c. 6
d. 8
11. Which are the operation that a computer performs on data that put in register:
a. Register transfer
b. Arithmetic
c. Logical
d. All of these
12. Which micro operations carry information from one register to another:
a. Register transfer
b. Arithmetic
c. Logical
d. All of these
a. R1->R2
b. R1<-R2
File hosted by educationobserver.com/forum
c. Both
d. None
14. In memory transfer location address is supplied by____ that puts this on address bus:
a. ALU
b. CPU
c. MAR
d. MDR
a. 1
b. 2
c. 3
d. 4
a. Read
b. Write
c. Both
d. None
17. In memory read the operation puts memory address on to a register known as :
a. PC
b. ALU
c. MAR
d. All of these
18. Which operation puts memory address in memory address register and data in DR:
a. Memory read
b. Memory write
c. Both
d. None
19. Arithmetic operation are carried by such micro operation on stored numeric data available in_____:
a. Register
b. Data
c. Both
d. None
File hosted by educationobserver.com/forum
20. In arithmetic operation numbers of register and the circuits for addition at _____:
a. ALU
b. MAR
c. Both
d. None
21. Which operation are implemented using a binary counter or combinational circuit:
a. Register transfer
b. Arithmetic
c. Logical
d. All of these
22. Which operation are binary type, and are performed on bits string that is placed in register:
a. Logical micro operation
b. Arithmetic micro operation
c. Both
d. None
23. A micro operation every bit of a register is a:
a. Constant
b. Variable
c. Both
d. None
a. Register transfer
b. Arithmetic
c. Logical
d. All of these
a. Digital system
b. Register
c. Data
d. None
30. High level language C supports register transfer technique for______ application:
a. Executing
b. Compiling
c. Both
d. None
31. A counter is incremented by one and memory unit is considered as a collection of _______:
a. Transfer register
b. Storage register
c. RTL
d. All of these
32. Which is the straight forward register transfer the data from register to another register temporarily:
a. Digital system
b. Register
c. Data
d. Register transfer operations
33. In organization of a digital system register transfer of any digital system therefore it is called:
a. Digital system
b. Register
c. Data
d. Register transfer level
a. Demultiplexer
b. Multiplexer
File hosted by educationobserver.com/forum
c. Both
d. None
a. Logic
b. Operation
c. Circuit
d. All of these
a. Flip-flop
b. Logics
c. Circuit
d. Operation
a. Data bus
b. Address bus
c. Memory bus
d. All of these
a. 2
b. 3
c. 5
d. 6
a. Analog circuit
b. Analog fundamentals
File hosted by educationobserver.com/forum
c. Both a&b
d. Digital circuit
a. Logic 0
b. Logic 1
c. None of these
d. Both a & b
43. In 3 state gate third position termed as high impedance state which acts as:
a. Open circuit
b. Close circuit
c. None of these
d. All of above
a. Control signal
b. No signal
c. All signal
d. All of above
a. 2 common line
b. 3 common line
c. 1 common line
d. none of these
a. RTL
b. RAM
c. MAR
d. All of these
a. (^)
b. (v)
c. Both
d. None
a. (^)
b. (v)
c. Both
d. None
a. Serial output
b. Serial input
c. Both
d. None
a. 2
b. 4
c. 6
d. 8
55. Which shift is a shift micro operation which is used to shift a signed binary number to the left or right:
File hosted by educationobserver.com/forum
a. Logical
b. Arithmetic
c. Both
d. None of these
a. Logical
b. Arithmetic
c. Both
d. None of these
a. One
b. Two
c. Three
d. All of these
a. RAM
b. RTL
c. ALU
d. MAR
a. Chirsfraser 1980
b. J.davidson 1980
c. Chirs fraser 1920
d. J.davidson 1920
e. A and B
f. B and C
g. C and D
a. machine language
b. assembly language
c. code language
d. none of these
a. Instructions
b. Code
c. Symbolic codes
d. Assembler
3. Mnemonic represent:
a. Operation codes
b. Strings
c. Address
d. None of these
a. String characters
b. Arrays
c. Structure
d. Enum
a. First generation
b. Third generation
c. second generation
d. fourth generation
a. Object program
b. Source program
c. Oriented program
File hosted by educationobserver.com/forum
d. All of these
a. $ hello.s -o hello.o
b. $as hello.s o o
c. $ as hello o hello.o
d. $ as hello.s o hello.o
9. By whom address of external function in the assembly source file supplied by ______ when activated:
a. Assembler
b. Linker
c. Machine
d. Code
a. Input file
b. External file
c. Output file
d. None of these
11. The assembler translates ismorphically______ mapping from mnemonic in these statements to machine
instructions:
a. 1:1
b. 2:1
c. 3:3
d. 4:1
a. 1
b. 3
c. 2
d. 4
13. The assembler in first pass reads the program to collect symbols defined with offsets in a table_______:
a. Hash table
b. Symbol table
c. Both a& b
d. None of these
File hosted by educationobserver.com/forum
14. In second pass, assembler creates _______in binary format for every instruction in program and then refers
to the symbol table to giving every symbol an______ relating the segment.
a. Link code
b. Decimal code
c. Assembly code
d. Binary code
a. syntax error
b. logical error
c. run time error
d. none of these
a. Syntax error
b. Run time error
c. Logical error
File hosted by educationobserver.com/forum
d. All of these
a. List
b. object
c. link
d. code
a. 1 pass
b. 2 pass
c. both a & b
d. none of these
a. S/340
b. S-350
c. S/320
d. S/360
a. S/370
b. S/380
c. S/390
d. S/360
a. Interpreter
b. Translator
c. Exchanger
d. None of these
a. Macro
File hosted by educationobserver.com/forum
b. Micro
c. Nano
d. All of these
a. Micro
b. Macro
c. Both a & b
d. None of these
a. Name
b. Definition
c. Identifier
d. All of these
a. NAME
b. MEND
c. DATA
d. MEMORY
a. Linker
b. Loader
c. Translator
d. None of these
a. Absolute
b. Relative
c. Both a & b
d. None of these
File hosted by educationobserver.com/forum
34. ________address is provided by linker to modules linked together that starting from______:
a. Absolute and 0
b. Relative and 0
c. Relative and 1
d. Relative and 3
a. Binder
b. Linkage editor
c. Both a & b
d. None of these
36. Loading is _______ with the task of storage management of operating system and mostly preformed after
assembly:
a. Bound
b. Expanded
c. Overlaps
d. All of these
a. Externally defined
b. Internally defined
c. Executable file
d. All of these
38. It is the task of the ________to locate externally defined symbols in programs, load them in to memory by
placing their _______of symbols in calling program:
39. Linker creates a link file containing binary codes and also produces_______ containing address information
on linked files:
a. Link map
b. Map table
c. Symbol map
d. None of these
File hosted by educationobserver.com/forum
a. 4
b. 2
c. 3
d. 5
a. Absolute entities
b. Relative entities
c. Object program
d. All of these
42. ________have addresses where instructions are stored along with address of working storage:
a. Relative entities
b. Absolute entities
c. Both a & b
d. None of these
43. Absolute entities are __________whom value signify storage locations that are independent of resulting
machine code:
a. Numeric constants
b. String constants
c. Fixed addresses
d. Operation codes
e. All of these
44. A module contains machine code with specification on______:
a. Relative addresses
b. Absolute addresses
c. Object program
d. None of these
45. After actual locations for main storage are known, a ______adjusts relative addresses to these actual
locations:
a. Relocating loader
b. Locating loader
c. Default loader
d. None of these
46. If there is a module from single source-language only that does not contain any external references, it
File hosted by educationobserver.com/forum
a. Indirectly
b. Directly
c. Extending
d. None of these
47. Modern assemblers for RISC based architectures make optimization of instruction scheduling to make use
of CPU _______efficiently:
a. Pipeline
b. Without pipeline
c. Both a & b
d. None of these
a. 4
b. 5
c. 2
d. 3
a. For loop
b. While loop
c. Do-while loop
d. All of these
a. Assignment expression
b. Condition value
c. Increment/decrement
d. None of these
a. 11
File hosted by educationobserver.com/forum
b. 10
c. 9
d. 12
a. Relational
b. Logical
c. Both a & b
d. None of these
54. <Increment> is the________ value of variable which will be added every time:
a. Increment
b. Decrement
c. Expanding
d. None of these
55. _______is the statement block of for loop lies inside block of another for loop:
a. For statement
b. Do-while statement
c. While statement
d. None of these
a. Goto
File hosted by educationobserver.com/forum
b. Continue
c. Switch
d. All of these
60. In Goto statement the place to which control is transferred is identified by a statement______:
a. Label
b. Display
c. Break
d. None of these
61. The continue statement is used to transfer the control to the________ of a statement block in a loop:
a. End
b. Beginning
c. Middle
d. None of these
62. The__________ statement is used to transfer the control to the end of statement block in a loop:
a. Continue
b. Break
c. Switch
d. Goto
63. ________function is used to transfer the control to end of a program which uses one argument( ) and takes
value is zero for_______ termination and non-zero for _______termination:
a. Program specification
b. Code specification
c. Instruction specification
d. Problem specification
65. Testing helps to ensure _______of the program for use within a system:
a. Quality, accuracy and except
b. Quality, accuracy and acceptance
c. Design, assurance and acceptance
d. Quality, accuracy and development
File hosted by educationobserver.com/forum
a. Linear
b. Top down
c. Both a & b
d. None of these
a. Branching
b. Condition
c. Both a & b
d. None of these
a. 3
b. 2
c. 1
d. 6
a. Sequence
b. Selection
c. Iteration
d. All of these
a. Repetition
b. Straight
c. Selection
d. Sequence
71. In ________instructions are followed one after the other in the preset order in which they appear within
program:
a. Sequence
b. Selection
c. Break
d. Iteration
72. _______means that one of two alternative sequences of instruction is chosen based on logical condition:
File hosted by educationobserver.com/forum
a. Sequence
b. Selection
c. Repetition
d. None of these
73. _________is sequence of instructions is executed and repeated any no. of times in loop until logical
condition is true:
a. Iteration
b. Repetition
c. Both a & b
d. None of these
74. A ________is a small program tested separately before combining with final program:
a. Module
b. Block
c. selection
d. none of these
75. _______uses various symbols to represent function within program and is _______representation:
a. Flowchart, pictorial
b. Algorithm, pictorial
c. Pictorial, flowchart
d. None of these
a. Flowchart
b. Algorithm
c. Both a & b
d. None of these
a. Right to left
b. Only right
c. Left to right
d. Only left
78. Flowchart that exceed page should be properly linked using ________to portions of flowchart on
different pages:
a. Connectors
File hosted by educationobserver.com/forum
b. Interconnections
c. Connections
d. None of these
a. Flowchart
b. Algorithm
c. Both a & b
d. None of these
a. Imitation
b. Imitate
c. In imitation
d. None of these
a. Less
b. More
c. Optimum
d. None of these
a. No
b. 4
c. 2
d. 6
83. ______are used to translate high level language instructions to a machine code:
a. Translators
b. Interpreters
c. Compilers
d. None of these
84. The compiler _______translate a program code with any syntax error:
a. Can
b. Cannot
c. Without
d. None of these
File hosted by educationobserver.com/forum
85. Before checking the program for errors in translating code into machine language the high level language
code is loaded into_________:
a. Register
b. Memory
c. Data
d. CPU
86. After compilation of the program ,the operating system of computer activates:
a. Loader
b. Linker
c. Compiler
d. None of these
87. The linker has utilities needed for ________within the translated program:
a. Input
b. Output
c. Processing
d. All of these
a. Symbolic
b. Diagrammatic
c. Both a & b
d. None of these
89. In flow chart symbols the _______operation represents the direction of flow:
a. Connector
b. Looping
c. Arrows
d. Decision making
a. Program counter
b. Instruction register
c. Stack pointer
d. Source index
a. 2
b. 3
c. 4
d. 5
92. Which are the following approaches used to design control unit:
a. Hardwired control
b. Microprogrammed control
c. Both a & b
d. None of these
a. CPU
b. Memory
c. Both a & b
d. None of these
e.
94. _______arrow represents the value obtained by evaluating right side expression/variable to the left side
variable:
a. Forth
b. Inbetween
c. Back
d. None of these
95. A ________ is written as separate unit, apart from main and called whenever necessary:
a. Subroutine
b. Code
c. Block
d. None of these
a. CPU
b. Microprocessor
c. register
d. memory
a. CALL
b. RETURN
c. Both a & b
d. None of these
a. Main
b. Procedures
c. Program
d. Memory
a. Subroutine
b. Main program
c. Both a & b
d. None of these
100. When subroutine is called contents of program counter is location address of _______instruction
following call instruction is stored on ________and program execution is transferred to______ address:
a. Non executable, pointer and subroutine
b. Executable, Stack and Main program
c. Executable, Queue and Subroutine
d. Executable, Stack and Subroutine
101. A subroutine called by another subroutine is called:
a. Nested
b. For loop
c. Break
d. Continue
a. SCAL
b. SXIT
c. Both a & b
d. None of these
a. Alter
b. Not alter
c. Both a & b
d. None of these
105. Markers in subroutine cannot be accepted as limits whereas this markers stands for:
a. Top of stack
b. Bottom of stack
c. Middle of stack
d. All of these
106. Subroutines are placed in identical section to caller so that SCAL and SXIT _______overpass divison
limits:
a. Dont
b. Does
c. Cross
d. By
a. Global
b. Local
c. Both a & b
d. None of these
108. subroutines are invoked by using their________ in a subroutine call statement and replacing formal
parameters with________ parameters:
a. Asterisk(*)
b. Arrow
c. Line
d. Pipeline
a. Conditional
b. Unconditional
c. Both a & b
d. None of these
112. A flag is a _________that keep track of a changing condition during computer run:
a. Memory
b. Register
c. Controller
d. None of these
113. When a subroutine is ________the parameters are loaded onto the stack and SCAL is executed:
a. Executed
b. Invoked
c. Ended
d. Started
a. In Same program
b. In external program
c. Both a & b
d. None of these
115. If internal subroutine is called global data is used to pass values defining parameters between
_________program and defined _______:
116. In what type of subroutine actual parameters are passed through the main program to formal
parameters in the related subroutine:
a. Internal
File hosted by educationobserver.com/forum
b. External
c. Both a & b
d. None of these
117. By defining the _________register as last in first out stack the sequence can handle nested
subroutines:
a. S
b. J
c. R
d. T
118. The ______stack can be 4-word memory addressed by 2 bits from an up/down counter known as the
stack pointer:
a. FIFO
b. PIPO
c. SISO
d. LIFO
a. Useful value
b. Get output
c. Get no output
d. None of these
121. The front panel display provides lights as green LED represent _____ and red LED represent _____for
device programmer who writes input/output basic:
122. The input data for processing uses the standard input device which by default is a ________:
a. Mouse
b. Scanner
File hosted by educationobserver.com/forum
c. Keyboard
d. Monitor
123. The processed data is sent for output to standard ________device which by default is computer
screen:
a. Input
b. Output
c. Both a & b
d. None of these
a. Micro instructions
b. Mini instructions
c. Both a & b
d. None of these
125. For each micro operation the control unit generates set of______ signals:
a. Control
b. Address
c. Data
d. None of these
a. Hardware
b. Software
c. Firmware
d. None of these
127. The micro program is an ________written in microcode and stored in firmware which is also
referred as___________:
a. Interpreter and control memory
b. Translator and control store
c. Translator and control memory
d. Interpreter and Translator
128. Compared to hardware, firmware is ________to design micro programmed organization:
a. Difficult
b. Easier
c. Both a& b
d. None of these
File hosted by educationobserver.com/forum
a. Easier
b. Difficult
c. Mediator
d. Optimum
a. T.V. Wilkes
b. M.V. Wilkes
c. S.V. Wilkes
d. D.V. Wilkes
a. John Faircloughs
b. Johny fairclough
c. Mr. Redcliff
d. M.V. Wilkes
134. From1961-1964 John faircloughs research played an important role to pursue full range of
compatible computers as system:
a. System/360
b. System/460
c. System/560
d. System/780
a. Fetch
b. Execute
c. Code
File hosted by educationobserver.com/forum
d. Both a & b
136. One of use of microprogramming to implement ________ of processor in Intel 80x86 and Motorola
680x0 processors whose instruction set are evolved from 360 original:
a. Control structure
b. Without control
c. Control unit
d. Only control
137. The function of these microinstructions is to issue the micro orders to______:
a. CPU
b. Memory
c. Register
d. Accumulator
138. Micro-orders generate the_______ address of operand and execute instruction and prepare for
fetching next instruction from the main memory:
a. Physical
b. Effective
c. Logical
d. all of above
139. Which of the following 2 task are performed to execute an instruction by MCU:
a. Microinstruction execution
b. Microinstruction sequencing
c. Both a & b
d. None of these
a. Memory chips
b. Registers
c. accumulators
d. none of these
a. Control instruction
b. Memory instruction
c. Register instruction
d. None of these
a. Microinstruction
b. Program
c. Sets
d. All of these
147. During program execution content of main memory undergo changes and, but control memory
has______ microprogram:
a. Static
b. Dynamic
c. Compile time
d. Fixed
149. Control memory is part of ______ that has addressable storage registers and used as temporary
storage for data:
a. ROM
b. RAM
c. CPU
d. Memory
150. How many modes the address in control memory are divided:
a. 2
b. 3
c. 5
d. 7
a. Task mode
b. Executive mode
c. Both a & b
d. None of these
a. Executive mode
b. Task mode
c. Both a & b
d. None of these
153. Addresses in control memory is made by____ for each register group:
a. 3
b. 5
c. 6
d. 8
File hosted by educationobserver.com/forum
156. Which memory is used to copy instructions or data currently used by CPU:
a. Main memory
b. Secondary memory
c. Cache memory
d. None of these
a. Execution cache
b. Data cache
c. Instruction cache
d. All of these
a. Data cache
b. Execution cache
c. Address cache
d. Control cache
a. Cache directing
b. Cache mapping
c. Cache controlling
d. Cache invalidation
a. Main memory
b. External memory
File hosted by educationobserver.com/forum
c. Cache
d. All of these
162. When cache process starts hit and miss rate defines in cache directory:
a. Directories
b. Memory
c. Registers
d. Folders
167. Invalidation writes only to_____ and erases previously residing address in memory:
a. Folders
b. Memory
c. Directory
d. Files
168. _______machine instruction creates branching to some specified location in main memory if result of
last ALU operation is Zero or Zero flag is set:
a. Branch on One
b. Branch on Three
c. Branch on Nine
File hosted by educationobserver.com/forum
d. Branch on Zero
a. Branching
b. Non-branching
c. Both a & b
d. None of these
171. Which are 3 ways to determine address of next micro instruction to be executed:
a. Conditional
b. Unconditional
c. Both a & b
d. None of these
173. In which branching condition is tested which is determined by status bit of ALU:
a. Unconditional
b. Conditional
c. Both a & b
d. None of these
174. which branch is achieved by fixing status bit that output of multiplexer is always one:
a. Unconditional
b. Conditional
c. Looping
d. All of these
175. Which register is used to store addresses of control memory from where instruction is fetched:
a. MAR
File hosted by educationobserver.com/forum
b. BAR
c. CAR
d. DAR
a. Control words
b. Memory words
c. Multiplexers
d. Decoders
177. Opcode is the machine instruction obtained from decoding instruction stored in:
a. Stack pointer
b. Address pointer
c. Instruction register
d. Incrementer
178. Branch logic determines which should be adopted to select the next______ value among possibilities:
a. CAR
b. GAR
c. HAR
d. TAR
a. Decrementer
b. Incrementer
c. Postfix
d. Prefix
180. ________used to hold return address for operations of subroutine call branch:
a. TBR
b. HDR
c. SDR
d. SBR
181. Which of following 2 types of computer system considered by micro programmed unit:
a. Micro level computers
b. Machine level computers
c. Both a & b
d. None of these
182. Following are the components of micro programmed control unit:
File hosted by educationobserver.com/forum
a. Subroutine register
b. Control address register
c. Memory Of 128 words with 20 bits per words
d. All of these
183. Various machine level components are:
a. Address register
b. Program counter
c. Data register
d. Accumulator register
e. Memory of 2K,16 bits/word RAM
f. Multiplexers
g. All of these
184. Data transfers are done using:
a. Multiplexer switching
b. Demultiplexer switching
c. Adder switching
d. Subtractor switching
185. PC can be loaded from_____:
a. BR
b. CR
c. AR
d. TR
a. 3
b. 4
c. 5
d. 2
c. Both a & b
d. None of these
190. _______is the data paths link CPU registers with memory or I/O modules:
191. ______is data paths there is movement of data from one register to another or b/w ALU and a
register:
a. External
b. Boreal
c. Internal
d. Exchange
a. Zero
b. One
c. Three
d. Eight
a. ROM
b. RAM
c. SAM
d. SAN
a. Hardwired
b. Microprogrammed
c. Both a & b
d. None of these
a. Microprogrammed
b. Hardwired
c. Betterwired
d. None of these
a. ROM
b. Random logic
c. Programmable logic array
d. All of these
200. In RISC architecture access to registers is made as a block and register file in a particular register can
be selected by using:
a. Multiplexer
b. Decoder
c. Subtractor
d. Adder
a. Reg R/W
b. Load/Reg-Reg
c. ALU function select
d. Load control
e. Read control
f. IR Latch
g. JUMP/Branch/Next PC
h. All of these
File hosted by educationobserver.com/forum
202. One last bit of control output is for control of_______ state:
a. Minor
b. Major
c. Mixer
d. None of these
a. Fetch
b. Decode
c. Memory
d. Write back
e. All of these
a. Fetch
b. Decode
c. Complete
d. All of these
a. Major
b. Minor
c. Both a & b
d. None of these
a. 1
b. 2
c. 3
d. 0
207. Decoding of an instruction in RISC architecture means decision on working of control unit for:
a. Remainder of instructions
b. Divisor of instructions
c. Dividend of instructions
d. None of these
208. Which control is used during starting of instruction cycle:
a. Write
File hosted by educationobserver.com/forum
b. Read
c. R/W
d. None of these
209. ________function select takes op code in IR translating to function of ALU and it may be compact
binary code or one line per ALU:
a. ALU
b. CPU
c. Memory
d. Cache
a. Jump
b. Branch
c. NextPC
d. All of these
211. __________dependent on instruction and major state and also comes in starting of data fetch state as
well as write back stage in CU:
a. Register read
b. Register write
c. Register R/W
d. All of these
a. Load register
b. Load Reg/Reg
c. Only Load
d. None of these
a. Microinstruction execution
b. Microinstruction sequencing
c. Both a & b
d. None of these
File hosted by educationobserver.com/forum
a. CD
b. RG
c. CC
d. CR
216. Who determine under what conditions the branching will occur and when:
a. By combination of CD and BT
b. By combination of CD and BR
c. By combination of CD and CR
d. By combination of TD and BR
217. The character U is used to indicate:
a. Undefined transfers
b. Unfair transfers
c. Unconditional transfers
d. All of these
a. DR
b. CR
c. TR
d. BR
a. CR
b. SR
c. BR
d. MR
a. CPU
b. RISC
c. ALU
d. MUX
2. Which unit is a pipeline system helps in speeding up processing over a non pipeline system:
a. CPU
b. RISC
c. ALU
d. MUX
3. The group of binary bits assigned to perform a specified operation is known as:
a. Stack register
b. Control word
c. Both
d. None
a. 1
b. 7
c. 14
d. 28
a. 1
b. 2
c. 3
d. 4
6. Three fields contains three bits each so one filed has how many bits in control word:
a. 2
b. 4
c. 5
d. 6
7. How is selects the register that receives the information from the output bus:
a. Decoder
b. Encoder
c. MUX
File hosted by educationobserver.com/forum
d. All of these
a. ALU
b. RISC
c. CPU
d. MUX
a. 1
b. 2
c. 3
d. 4
10. How many bits of OPR select one of the operations in the ALU:
a. 2
b. 3
c. 4
d. 5
11. five bits of OPR select one of the operation in the ____ in control register:
a. CPU
b. RISC
c. ALU
d. MUX
a. 2
b. 3
c. 4
d. 5
a. Pop
b. Push
c. Both
d. None
a. Pop
b. Push
c. Both
d. None
a. ALU
b. CPU
c. Memory unit
d. None of these
a. Memory stack
b. Stack pointer
c. Push operation
d. Pop operation
a. Infinite number
b. Finite number
c. Both
d. None
18. Which operation are done by increment or decrement the stack pointer:
a. Push
b. Pop
c. Both
d. None
a. Control word
b. Memory word
c. Transfer word
d. All of these
20. The stack pointer contains the address of the word that is currently on____:
21. In register stack items are removed from the stack by using the ____operation:
a. Push
b. Pop
c. Both
d. None
22. Which register holds the item that is to be written into the stack or read out of the stack:
a. SR
b. IR
c. RR
d. DR
23. In register stack the top item is read from the stack into:
a. SR
b. IR
c. RR
d. DR
24. In conversion to reverse polish notation the ____and____ operations are performed at the end:
a. Memory data
b. Main memory
c. CPU
d. ALU
File hosted by educationobserver.com/forum
a. Sequence
b. Parallel
c. Both
d. None
28. In instruction formats the information required by the ______ for execution:
a. ALU
b. CPU
c. RISC
d. DATA
a. Operand code
b. Opcode
c. Source code
d. All of these
30. Which are contains one or more register that may be referenced by machine instruction:
a. Input
b. Output
c. CPU
d. ALU
31. Memory mapped ___is used this is just another memory address:
a. Input
b. Output
c. Both
d. None
a. Arithmetic
b. Logical
c. Both
d. None
c. dst <->[src1][src2]
d. All of these
34. 2- Address format can be represented as:
a. dst ->[dst]*[src]
b. dst<-[dst]*[src]
c. dst<->[dst]*[src]
d. All of these
35. In 1-address format how many address is used both as source as well as destination:
a. 1
b. 2
c. 3
d. 4
a. Data
b. Register
c. Address
d. None of these
a. Stack
b. Array
c. Queue
d. Binary
a. Logical
b. Arithmetic
c. Both
d. None
39. In the RPN scheme the numbers and operators are listed__________:
a. 1
File hosted by educationobserver.com/forum
b. 2
c. 3
d. 4
a. Effective add
b. Effective absolute
c. Effective address
d. End address
a. Immediate addressing
b. Direct addressing
c. Register addressing
d. None of these
43. In which addressing the simplest addressing mode where an operand is fetched from memory is_____:
a. Immediate addressing
b. Direct addressing
c. Register addressing
d. None of these
a. Immediate addressing
b. Direct addressing
c. Register addressing
d. None of these
45. In which mode the main memory location holds the EA of the operand:
a. Immediate addressing
b. Direct addressing
c. Register addressing
d. Indirect addressing
a. Displacement addressing
b. Immediate addressing
c. Direct addressing
d. Register addressing
File hosted by educationobserver.com/forum
47. In the base register addressing the register reference may be _____:
a. Implicit
b. Explicit
c. Both
d. None
49. In post-indexing the contents of the address field are used to access a memory location containing a___
address:
a. Immediate addressing
b. Direct addressing
c. Register addressing
d. None of these
a. Art
b. System
c. Computer
d. None of these
a. Immediate addressing
File hosted by educationobserver.com/forum
b. Direct addressing
c. Register addressing
d. Displacement addressing
54. Which addressing offset can be the content of PC and also can be negative:
a. Relative addressing
b. Immediate addressing
c. Direct addressing
d. Register addressing
55. The length of instruction set depends on:
a. Data size
b. Memory size
c. Both
d. None
56. In length instruction some programs wants a complex instruction set containing more instruction, more
addressing modes and greater address rang, as in case of_____:
a. RISC
b. CISC
c. Both
d. None
57. In length instruction other programs on the other hand, want a small and fixed-size instruction set that
contains only a limited number of opcodes, as in case of_____:
a. RISC
b. CISC
c. Both
d. None
58. The instruction set can have variable-length instruction format primarily due to:
a. Varying number of operands
b. Varying length of opcodes in some CPU
c. Both
d. None
59. An instruction code must specify the address of the____:
a. Opecode
b. Operand
c. Both
d. None
a. CISC
b. RISC
c. CPU
d. ALU
a. 1
b. 2
c. 3
d. 4
e.
62. Which is data manipulation types are:
a. Arithmetic instruction
b. Shift instruction
c. Logical and bit manipulation instructions
d. All of these
63. Arithmetic instruction are used to perform operation on:
a. Numerical data
b. Non-numerical data
c. Both
d. None
64. How many basic arithmetic operation:
a. 1
b. 2
c. 3
d. 4
a. Addition
b. Subtraction
c. Multiplication
d. Division
e. All of these
f. None of these
66. In which instruction are used to perform Boolean operation on non-numerical data:
a. Logical and bit manipulation
b. Shift manipulation
c. Circular manipulation
d. None of these
File hosted by educationobserver.com/forum
67. Which operation is used to shift the content of an operand to one or more bits to provide necessary
variation:
a. Logical and bit manipulation
b. Shift manipulation
c. Circular manipulation
d. None of these
68. ________is just like a circular array:
a. Data
b. Register
c. ALU
d. CPU
a. Data control
b. Register control
c. Program control
d. None of these
a. Parallel
b. Sequence
c. Both
d. None
71. How many types of unconditional jumps used in program control are follows:
a. 1
b. 2
c. 3
d. 4
72. Which are unconditional jumps used in program control are follows:
a. Short jump
b. Near jump
c. Far jump
d. All of these
73. Which instruction is used in program control and used to decrement CX and conditional jump:
a. Loop
b. Shift manipulation
File hosted by educationobserver.com/forum
c. Circular manipulation
d. None of these
a. Conditional jump
b. Short jump
c. Near jump
d. Far jump
75. Who change the address in the program counter and cause the flow of control to be altered:
a. Shift manipulation
b. Circular manipulation
c. Program control instruction
d. All of these
a. Branch
b. Jump
c. Call a subroutine
d. Return
e. All of these
f. None of these
77. Which is a type of microprocessor that is designed with limited number of instructions:
a. CISC
b. RISC
c. Both
d. None
a. System multiprocessor
b. Symmetric multiprocessor
c. Both
d. None
d. None
a. Pipeline
b. CISC
c. RISC
d. Database
a. 1
b. 2
c. 3
d. 4
a. Weather forecasting
b. Artificial intelligence
c. Experts system
d. Images processing
e. Seismology
f. Gene mapping
g. Aerodynamics
h. All of these
i. None of these
88. Which types of jump keeps a 2_byte instruction that holds the range from- 128to127 bytes in the memory
location:
a. Far jump
b. Near jump
c. Short jump
d. All of these
89. Which types of register holds a single vector containing at least two read ports and one write ports:
a. Data system
b. Data base
c. Memory
d. Vector register
90. Parallel computing means doing several takes simultaneously thus improving the performance of
the________:
a. Data system
b. Computer system
c. Memory
d. Vector register
a. Pipeline
b. Vector processing
c. Both
d. None
92. Which processor is a peripheral device attached to a computer so that the performance of a computer can
be improved for numerical computations:
File hosted by educationobserver.com/forum
93. Which processor has a single instruction multiple data stream organization that manipulates the common
instruction by means of multiple functional units:
a. Rotate carry
b. Rotate through carry
c. Both
d. None
95. In the case of a left arithmetic shift , zeros are Shifted to the ______:
a. Left
b. Right
c. Up
d. Down
96. In the case of a right arithmetic shift the sign bit values are shifted to the_____:
a. Left
b. Right
c. Up
d. Down