Computer Architecture Question Bank
Computer Architecture Question Bank
4. How CPU execution time for a program is calculated? / Give the formula for CPU execution time
for a program. (Nov 2015 / Nov 2016)
CPU execution time for a program = CPU clock cycles for a program x clock cycle time
CPU clock cycles for a program
CPU execution time for a program =
6. Distinguish between auto increment and auto decrement addressing mode. (May 2016)
Auto increment addressing mode: The effective address of the operand is the contents of a register
specified in the instruction. After accessing the operand, the contents of this register are incremented to
address the next location. Ex: MOV R0, (R2)+
Auto decrement addressing mode: The contents of a register specified in the instruction are decremented
and then they are used as an effective address to access a memory location.
Ex: MOV (R0),R1
1
JERUSALEM COLLEGE OF ENGINEERING
CS6303 COMPUTER ARCHITECTURE DEPARTMENT OF EIE 2017 - 2018
11. State the need for indirect addressing mode. Give an example. (May 2017)
The effective address of the operand is the contents of a register. We denote the indirection by the name
of the register or new address given in the instruction. Address of an operand (B) is stored into R1 register.
If we want this operand, we can get it through register R1 (indirection).
Ex: MOV A, (R0)
2
JERUSALEM COLLEGE OF ENGINEERING
CS6303 COMPUTER ARCHITECTURE DEPARTMENT OF EIE 2017 - 2018
PART B
1. What is an addressing mode? What is the need for addressing in a computer system? Explain the various
addressing modes with suitable examples. / Explain direct, immediate, relative and indexed addressing
mode with examples. (May 2017 / May 2015 / Nov 2015 / May 2016 / Nov 2016)
2. Explain in detail the various components of computer system with neat diagram. (Nov 2014 / Nov 2015 /
May 2016 / Nov 2016)
3. Discuss about the various techniques to represent instructions in a computer system. (May 2015)
4. State the CPU performance equation and discuss the factors that affect performance. (Nov 2014)
5. Explain the important measures of the performance of a computer and derive the basic performance
equation. (May 2017)
6. Explain in detail about the eight ideas of computer architecture.
7. Describe the MIPS Instruction set in detail with suitable examples.
8. i) Assume a two address format specified as source, destination. Examine the following sequence of
instructions and explain the addressing modes used and the operation done in every instruction.
i. Move (R5)+, R0
ii. Add (R5)+, R0
iii. Move R0, (R5)
iv. Move 16(R5), R3
v. Add #40, R5 (Nov 2014)
ii) Consider the computer with three instruction classes and CPI measurements as given below and
Instruction counts for each instruction class for the same program from two different compilers are given.
Assume that the computers clock rate is 4GHZ. Which Code sequence will execute faster according to
execution time? (Nov 2014)
Code from CPI for this instruction class
A B C
CPI 1 2 3
Code from Instruction count for each class
A B C
Compiler 1 2 1 2
Compiler 2 4 1 1
3
JERUSALEM COLLEGE OF ENGINEERING
CS6303 COMPUTER ARCHITECTURE DEPARTMENT OF EIE 2017 - 2018
PART A
1. Define Little Endian arrangement. (Nov 2014)
Little-endian describes the order in which a sequence of bytes is stored in computer memory. Little-
endian is an order in which the "little end" (least significant value in the sequence) is stored first. For
example, in a little-endian computer, the two bytes required for the hexadecimal number 4F52 would be
stored as 524F (52 at address 1000, 4F at 1001).
4. What are the overflow/underflow conditions for addition and subtraction? (Nov 2015)
Overflow / underflow conditions will occur when result cannot be represented in the allocated number
of bits. Overflow occurs if the Result > Max value. Underflow occurs if the Result < Min value. Overflow
can occur when two positive numbers are added and result is out of range. After addition, the result will
become negative. Underflow can occur when two negative numbers are added and result is out of range.
After addition, the result will become positive. While adding a positive number with a negative number. No
overflow or underflow can occur.
Unsigned number representation using n-bits
Overflow when result > 2n 1.
Underflow when result < 0.
Signed number representation using n-bits
Overflow when result > 2n1 1.
Underflow when result < 2n1.
5. State the representation of double precision floating point number. (Nov 2015)
Double precision representation contains 1 sign bit, 11 exponent bits and 52 Mantissa nits. It is also
called excess -1023 format. Exponent E which has the range 0 E 2047 for normal values. This means
that the actual exponent E is in range -1022 E 1023.
7. What is guard bit? What are the ways to truncate the guard bits? (Nov 2016)
Although the mantissa of initial operands is limited to 24 bits, it is important to retain extra bits. These
extra bits are called as guard bits. There are several ways to truncate the guard bits: Chopping, Von
Neumann rounding, Rounding.
4
JERUSALEM COLLEGE OF ENGINEERING
CS6303 COMPUTER ARCHITECTURE DEPARTMENT OF EIE 2017 - 2018
9. Write the rules to perform addition on floating point numbers? (May 2017)
i. Choose the number with the smaller exponent and shift its mantissa right a number of steps equal
to the difference in exponents.
ii. Set the exponent of the result equal to the larger exponent
iii. Perform addition on the mantissa and determine the sign of the result
iv. Normalize the resulting value, if necessary
10. Subtract (11010)2 (10000)2 using 1s complement and 2s complement method. (May 2017)
(11010)2 (10000)2 = (1010)2
12. Why floating point number is more difficult to represent and process than integer?
In floating point numbers we have to represent any number in three fields sign, exponent and mantissa.
The IEEE 754 standard gibes the format for these fields and according to format the numbers are to be
represented. In case of any process the mantissa and exponent are considered separately.
16. Write the rules for multiply operation on floating point numbers?
Add the exponents and subtract 127.
Multiply the mantissa and determine the sign of the result.
Normalize the resulting value, if necessary.
5
JERUSALEM COLLEGE OF ENGINEERING
CS6303 COMPUTER ARCHITECTURE DEPARTMENT OF EIE 2017 - 2018
PART B
1. Explain the Booths algorithm for multiplication of signed twos complement numbers. / Define Booth
Multiplication algorithm with suitable example. (Nov 2016 / May 2016)
2. Discuss in detail about division algorithm in detail with diagram and examples. / Describe non restoring
division with an example. (Nov 2015 / Nov 2016 / May 2017)
3. Explain the sequential version of multiplication algorithm and its hardware. / Explain in detail about the
multiplication algorithm with suitable example and diagram. (May 2015 / Nov 2015 / May 2017)
4. Explain how floating point addition is carried out in a computer system. Give an example for a binary
floating point addition. / Explain briefly about floating point addition and subtraction algorithm. (May 2015
/ May 2016)
5. Divide (12)10 by (3)10 using the Restoring and Non restoring division algorithm with step by step
intermediate results and explain. (Nov 2014)
6. i) What is the disadvantage of ripple carry addition and how it is overcome in carry look ahead adder and
draw the logic circuit CLA? / Briefly explain Carry Look ahead adder. (Nov 2014 / Nov 2016)
ii) What is meant by subword parallelism? Explain. (May 2017)
7. i) Design an arithmetic element to perform the basic floating point operations. (May 2017)
ii) Multiply the following pair of signed nos. using Booths bit-pair recoding of the multiplier.
A = +13 (Multiplicand) and B = -6 (Multiplier). (Nov 2014)
6
JERUSALEM COLLEGE OF ENGINEERING
CS6303 COMPUTER ARCHITECTURE DEPARTMENT OF EIE 2017 - 2018
4. What is a hazard? What are its types? (Nov 2015 / May 2017)
Any condition that causes the pipeline to stall is called hazard. They are also called as stalls or bubbles.
The various pipeline hazards are:
Data hazard
Structural Hazard
Control Hazard.
7
JERUSALEM COLLEGE OF ENGINEERING
CS6303 COMPUTER ARCHITECTURE DEPARTMENT OF EIE 2017 - 2018
10. Name the control signals required to perform arithmetic operations. (May 2017)
Set muxes to correct input
Operation code to ALU
Read and write to register file
Read and write to memory (load/store)
Update of program counter
8
JERUSALEM COLLEGE OF ENGINEERING
CS6303 COMPUTER ARCHITECTURE DEPARTMENT OF EIE 2017 - 2018
PART B
1. Explain Data path and its control in detail. (Nov 2014)
2. What is Hazard? Explain its types with suitable examples. / Explain the different types of pipeline hazards
with suitable examples. (Nov 2014 / May 2016 / Apr 2015)
3. What is pipelining? Discuss about pipelined data path and control. (May 2016 / May 2017)
4. Explain how the instruction pipeline works? What are the various situations where an instruction pipeline
can stall? Illustrate with an example. (Nov 2015 / Nov 2016)
5. Explain the basic MIPS implementation with necessary multiplexers and control lines. (Nov 2015)
6. Why is branch prediction algorithm needed? Differentiate between the static and dynamic techniques. (Nov
2016)
9
JERUSALEM COLLEGE OF ENGINEERING
CS6303 COMPUTER ARCHITECTURE DEPARTMENT OF EIE 2017 - 2018
UNIT IV PARALLELISM
PART A
1. What is Instruction level parallelism (ILP)? (Nov 2015 / May 2016 / May 2017 / Nov 2016)
ILP is a measure of how many of the operations in a computer program can be performed
simultaneously. The potential overlap among instructions is called instruction level parallelism. There are
two primary methods for increasing the potential amount of instruction-level parallelism. 1. Increasing the
depth of the pipeline to overlap more instructions. 2. Multiple issue.
10
JERUSALEM COLLEGE OF ENGINEERING
CS6303 COMPUTER ARCHITECTURE DEPARTMENT OF EIE 2017 - 2018
11
JERUSALEM COLLEGE OF ENGINEERING
CS6303 COMPUTER ARCHITECTURE DEPARTMENT OF EIE 2017 - 2018
PART B
1. Explain in detail Flynns classification of parallel hardware. / Discuss about SISD, MIMD, SIMD, SPMD
and VECTOR systems. (Nov 2016 / May 2016 / Nov 2015 / May 2017)
2. Explain Instruction Level Parallel Processing. State the challenges of parallel processing. (Nov 14/ Nov 16)
3. Explain the term: (i) Multicore Processor (ii) Hardware Multithreading (Nov 2014 / Nov 2015 / May 2016)
4. What is hardware multithreading? Compare and contrast Fine grained multithreading and Coarse grained
multithreading.(May 2015)
5. Explain the four principal approaches to multithreading with necessary diagrams. (May 2017)
12
JERUSALEM COLLEGE OF ENGINEERING
CS6303 COMPUTER ARCHITECTURE DEPARTMENT OF EIE 2017 - 2018
4. Point out how DMA can improve I/O speed? (May 2015)
Direct memory access (DMA) is a feature of computer systems that allows certain hardware subsystems
to access main system memory (RAM) independent of the central processing unit (CPU).
13
JERUSALEM COLLEGE OF ENGINEERING
CS6303 COMPUTER ARCHITECTURE DEPARTMENT OF EIE 2017 - 2018
9. Summarize the sequence of events involved in handling an interrupt request from a single device.
(May 2017)
i. The device raises an interrupt.
ii. The processor interrupts the program currently being executed.
iii. Interrupts are disabled by changing the control bits in the PS.
iv. The device is informed that its request has been recognized, and in response, it deactivates the
interrupt request signal.
v. The action requested by the interrupt is performed by the interrupt service routine.
vi. Interrupts are enabled and execution of the interrupted program is resumed.
16. Distinguish between memory mapped I/O and I/O mapped I/O.
Memory mapped I/O: When I/O devices and the memory share the same address space, the arrangement
is called memory mapped I/O. The machine instructions that can access memory is used to transfer data to
or from an I/O device.
14
JERUSALEM COLLEGE OF ENGINEERING
CS6303 COMPUTER ARCHITECTURE DEPARTMENT OF EIE 2017 - 2018
I/O mapped I/O: Here the I/O devices the memories have different address space. It has special I/O
instructions. The advantage of a separate I/O address space is that I/O devices deals with fewer address
lines.
PART B
1. Elaborate on the various memory technologies and its relevance. (May 2015)
2. What is virtual memory? Explain in detail about how virtual memory is implemented with neat diagram? /
Explain virtual memory address translation in detail with necessary diagrams.(May 2015 / Nov 2015 / Nov
2016 / May 2017)
3. Draw the typical block diagram of a DMA controller and explain how it is used for direct data transfer
between memory and peripherals? / What is meant by DMA? Explain the use of DMA controllers in a
computer system. (Nov 2015 / May 2016 / Nov 2016 / May 2017)
15
JERUSALEM COLLEGE OF ENGINEERING
CS6303 COMPUTER ARCHITECTURE DEPARTMENT OF EIE 2017 - 2018
4. (i) Explain mapping functions in cache memory to determine how memory blocks are placed in cache. /
Define cache memory? Explain the various mapping techniques associated with cache memories. (8 / 16)
(May 2017 / Nov 2014 / May 2016 / May 2017)
(ii) Explain in detail about the Bus Arbitration techniques in DMA. (May 2017 / Nov 2014)
5. (i) Draw different memory address layouts and brief about the technique used to increase the average rate
of fetching words from the main memory. (Nov 2014)
(ii) Explain in detail about any two standard input and output interfaces required to connect the I/O device
to the Bus.(Nov 2014)
6. Design and explain a parallel priority interrupt hardware for a system with eight interrupt sources. (15) (Nov
2016)
7. What is an interrupt? Explain the different types of interrupts and the different ways of handling the
interrupts.
8. (i) Explain in detail about the basic structure of a memory level hierarchy with suitable diagram.
(ii)Write short note on I/O processor. What is the need for an I/O interface?
16
JERUSALEM COLLEGE OF ENGINEERING