Computer Architecture Solved Paper 2024
Computer Architecture Solved Paper 2024
It is the combination of the computer Structure and behaviour as seen by the programmer that uses machine
language instructions. This includes the following:
Both SRAM and DRAM are the types of Random Access Memory (RAM)
SRAM:
Data is stored in transistors and requires a constant power flow. Because of the continuous power, SRAM
doesn‟t need to be refreshed to remember the data being stored.
DRAM:
Data is stored in capacitors. Capacitors that store data in DRAM gradually discharge energy, no energy
means the data has been lost. So, a periodic refresh of power is required in order to function.
5)List basic computer registers with their functions?
Operation code:
It is a part of the instruction that tells the processor what should be done.
Operand:
It is a part of the instruction that contains the data to be acted on, or the memory location of the data in a
register
Circuit diagram
2) Explain full adder with diagram
3) Explain multi threaded architecture..
4) Explain DMA controller with a neat diagram
5) Convert binary to octal number.(1101011)
ILP is to achieve not only instruction overlap, but the actual execution of more than one instruction at a time
through dynamic scheduling and how to maximize the throughput of a processor. For typical RISC
processors, instructions usually depend on each other too and as a result the amount of overlap is limited.
7) What is RAID ? What are the advantages of using RAID technology for secondary storage ?
RAID or redundant array of independent disks is a data storage virtualization technology that combines
multiple physical disk drive components into one or more logical units for data redundancy, performance
improvement, or both.
It is a way of storing the same data in different places on multiple hard disks or solid-state drives to protect
data in the case of a drive failure. A RAID system consists of two or more drives working in parallel. These
can be hard discs, but there is a trend to use SSD technology (Solid State Drives).
8) Explain Line decoder with truth table.
Decoder :
The combinational circuit that change the binary information into 2N output lines is known as Decoders.
The binary information is passed in the form of N input lines. In simple words, the Decoder performs the
reverse operation of the Encoder. At a time, only one input line is activated for simplicity.
11) Explain I/O interface unit with a neat diagram.
Input-Output Interface
Input-Output Interface is used as method which helps in transferring of information between the internal
storage devices i.e., memory and the external peripheral device. A peripheral device is that which provide
input and output for the computer, it is also called Input-Output devices.
For Example: A keyboard and mouse provide Input to the computer are called input devices while a monitor
and printer that provide output to the computer are called output devices. Just like the external hard-drives,
there is also availability of some peripheral devices which are able to provide both input and output.
In micro-computer base system, the only purpose of peripheral devices is just toprovide special
communication links for the interfacing them with the CPU. Toresolve the differences between peripheral
devices and CPU, there is a special need for communication links.
12) State and prove De Morgan’s theorem.
15) Explain CISC and RISC.
RISC and CISC are two different types of computer architectures that are used to design the microprocessors
that are found in computers.
RISC
The CISC architecture comprises a complex instruction set. A CISC processor has a variable-length
instruction format. In this processor architecture, the instructions that require register operands can take only
two bytes.
In a CISC processor architecture, the instructions which require two memory addresses can take five bytes
to comprise the complete instruction code. Therefore, in a CISC processor, the execution of instructions may
take a varying number of clock cycles. The CISC processor also provides direct manipulation of operands
that are stored in the memory.
Addressing modes:
Addressing modes refers to the way in which the operand of an instruction is
specified.
Types of Addressing Modes-
1. Implied / Implicit Addressing Mode
2. Stack Addressing Mode
3. Immediate Addressing Mode
4. Direct Addressing Mode
5. Indirect Addressing Mode
Computer Registers
Registers are a type of computer memory used to quickly accept, store, and transfer data and instructions
that are being used immediately by the CPU. The registers used by the CPU are often termed as Processor
registers.
20) Explain Arithmetic micro-operations with example?
Examples :
Addition –
In addition micro-operation, the value in register R1 is added to the value in the register R2 and
then the sum is transferred into register R3.
Subtraction –
In subtraction micro-operation, the contents of register R2 are subtracted from contents of the
register R1, and then the result is transferred into R3.
There is another way of doing the subtraction. In this, 2‟s complement of R2 is added to R1, which is
equivalent to R1 – R2, and then the result is transferred into register R3.
Increment –
In Increment micro-operation, the value inside the R1 register is increased by 1.
Decrement –
In Decrement micro-operation, the value inside the R1 register is decreased by 1.
1’s Complement –
In this micro-operation, the complement of the value inside the register R1 is taken.
2’s Complement –
In this micro-operation, the complement of the value inside the register R2 is taken and then 1
is added to the value and then the final result is transferred into the register R2. This process is
also called Negation. It is equivalent to -R2.
Instruction Cycle
A program residing in the memory unit of a computer consists of a sequence of
instructions. These instructions are executed by the processor by going through a cycle for each instruction.
In a basic computer, each instruction cycle consists of the following phases:
1. Fetch instruction from memory.
2. Decode the instruction.
3. Read the effective address from memory.
4. Execute the instruction.
i. Floppy Disk: A floppy disk is a flexible disk with a magnetic coating on it, and it is packaged inside a
protective plastic envelope. These are among the oldest portable storage devices that could store up to 1.44
MB of data, but now they are not used due to very little memory storage.
ii. Hard Disk Drive (HDD): Hard disk drive comprises a series of circular disks
called platters arranged one over the other almost 1⁄2 inches apart around a spindle. Disks are made of non-
magnetic material like aluminium alloy and coated with 10-20 nm magnetic material. Data is stored by
magnetizing or demagnetizing the magnetic coating. A magnetic reader arm is used to read data from and
write data to the disks. A typical modern HDD has a capacity in terabytes (TB).
2. Optical Disk:
An optical disk is any computer disk that uses optical storage techniques
and technology to read and write data. It is a computer storage disk that stores data digitally and uses laser
beams to read and write data.
i. CD Drive: CD stands for Compact Disk. CDs are circular disks that use optical rays, usually lasers, to
read and write data. They are very cheap as you can get 700 MB of storage space for less than a dollar. CDs
are inserted in CD drives built into the CPU cabinet. They are portable as you can eject the drive, remove the
CD and carry it with you.
There are three types of CDs:
CD-ROM (Compact Disk - Read Only Memory): The manufacturer recorded
the data on these CDs. Proprietary Software, audio or video are released on
CD-ROMs.
CD-R (Compact Disk - Recordable): The user can write data once on the CD-R. It cannot be deleted
or modified later.
CD-RW (Compact Disk - Rewritable): Data can repeatedly be written and deleted on these optical
disks.
ii. DVD Drive: DVD stands for digital video display. DVD is an optical device that can store 15 times the
data held by CDs. They are usually used to store rich multimedia files that need high storage capacity.
DVDs also come in three varieties - read-only, recordable and rewritable.
iii. Blu Ray Disk: Blu Ray Disk (BD) is an optical storage media that stores high
definition (HD) video and other multimedia files. BD uses a shorter wavelength laser than CD/DVD,
enabling the writing arm to focus more tightly on the disk and pack in more data. BDs can store up to 128
GB of data.
Different types of binary code each have specific properties and uses in computers and digital electronics.
Weighted binary code is a binary code that obeys the positional weight system. This is a system where every
digit is assigned a specific weight based on its position.
These values originate from 2 to the power of their binary position: 24 , 2³ , 2² , 2¹ , 2⁰ , starting from the
most significant bit (MSB) to the least significant bit (LSB).
BCD code is an example of a weighted binary code. It is also known as 8421 code. In the BCD encoding
method, every decimal digit is represented by a four-bit binary number. Binary Coded Decimal code allows
us to convert decimal numbers into their binary equivalents easily.
We can represent 16 numbers using the BCD number system. (From 0000 – 1111).
Non-weighted code is used for special applications where a binary weight is not needed. Non-weighted code
does not use positional weights to convert binary code to other systems like decimal, hexadecimal, octal, or
any other system. Examples of non-weighted code include
Excess-3 code and Gray code.
Excess-3 code is also known as XS-3 code. Excess-3 code is a non-weighted code that is derived from the
8421 BCD code. Every number on the 8421 code is incremented by 0011 to achieve the XS-3 code. 3 is the
decimal equivalent of 0011, hence the name XS-3.
Gray code is a non-weighted code that is used as a unit distance code. It cannot be used for any arithmetic
operations like addition, subtraction, multiplication, and division (Boolean algebraic operations). Gray code
implements a unique system where only one-bit changes for every decimal number. This ensures alignment
and synchronicity, thus reducing error rate
Alphanumeric codes
Computers work with only 0‟s and 1‟s. However, there is a need for more advanced forms of
communication with machines. This is why alphanumeric code is important. It includes 26 characters for the
letters of the alphabet, and 10 more for symbols like !@#$%^&.
Alphanumeric code represents both numbers and alphabetical characters. The most common types of
alphanumeric code are EBCDIC and ASCII.
EBCDIC
EBCDIC stands for Extended Binary Coded Decimal Interchange Code. EBCDIC code is an 8-bit code
that is mainly used in IBM mainframe and IBM midrange computer operating systems.
ASCII
ASCII stands for American Standard Code for Information Interchange. ASCII code is a 7-bit code used
in smaller computers. ASCII code represents the numbers from 0 to 9, ninety-five upper and lowercase
letters of the alphabet, punctuation marks, and a blank space. In total, ASCII encodes 128 characters.
Error detection codes − are used to detect the errors present in the received data bitstream
. These codes contain some bits which are included appended to the original bit stream. These codes detect
the error, if it is occurred during transmission of the original data bitstream
Error correction codes − are used to correct the errors present in the received data bitstream
so that, we will get the original data. Error correction codes also use the similar strategy of error detection
codes.