Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
A1
1) Where can the program data be stored permanently?
a) Memory
b) Hard Disk
ANS: b
ANS: false
ANS: d
ANS: c
ANS: true
ANS: c
7) What is the value of 11110101 (8 bit binary in 1’s complement form) in decimal?
a) 10
b) -117
c) 245
d) -10
ANS: d
ANS: a
ANS: b
1100
0100
1010
0101
ANS: a
A2
1) What is the binary encoding for "ld r0, [sp]"
a) 01110 1 0000 1110 000000000000000000
b) 00000 1 0100 0100 010000000000000011
c) 00001 1 1110 1110 000000000000000100
d) 01000 0 0100 0000 000000000000000101
Ans - (a)
3) Assemblers are:
a) programs that convert high level language to low level language
b) programs that convert low level language to machine language
c) programs that convert high level language to machine language
d) all of the above
Ans - (b)
ANS: d
2) The arguments to a function can only be passed using registers. True or False
a) True
b) False
ANS: b
ANS: b
ANS: b
ANS: c
ANS: d
ANS: c
ANS: c
ANS: a
A4
1) Which instruction is used to make a function call in ARM? bl
2) What is the encoding of 0x0B A0 00 00 in 12-bit ARM rot+payload immediate format? 0x6BA
3) Branch target in bl offset instruction in ARM is: PC + 8 + 4*offset
4) What is the preferred method to return from a function call in ARM? bx lr
5) What does stmfd instruction do in ARM? spill a set of registers
6) We can run the 16 bit ISAs on a modern 64 bit x86 processor. True or False? True
7) x86 can even Support 8 bit Registers. True or False? True
8) How many floating point registers are there in x86 ISA? 8
9) How many segment registers are there in x86 ISA? 6
10) Which memory addressing mode is supported by x86? all the above ( base + offset, base +
scale*index, base + scale*index + offset)
A5
1. Is an x86 processor aware of the presence of the stack? True
2. The stack pointer is stored in the register: esp
3. The compare instruction in x86 processor sets the flags. True
4. eax and edx in imul instruction (1 operand form) contain - lower 32 bits and upper 32 bits
resp
5. The call instruction saves the return address on - stack
6. The rep prefix repeats the instruction n times. The value of n is present in -register ecx
7. Integer and Floating point registers are connected through: Memory
8. fild instruction: pushes integer stored in memory to FP stack
9. finit instruction resets the: all of the above (status of FP unit, FP stack, FP registers)
10. fcomi instruction: compares the values of FP registers and sets the flags
A6
4) Multiplexer:
a) n inputs, 1 output
b) 1 input, n outputs
c) n inputs, 1 output based on the select bits
d) n inputs, log(n) outputs
Ans-c
5) Encoder:
a) n bits input, log(n) bits output
b) n inputs, log(n) output
c) n inputs, log(n) bits output
d) None of the above
Ans-c
1) How long does the n-bit Ripple Carry Adder take? th is time for half adder and tf is time for full
adder.
a) n*tf
b) n*th
c) th + (n-1)tf
d) tf + (n-1)th
ANS: c
ANS: c
ANS: b
ANS: d
ANS: d
ANS: c
ANS: d
9) What action should be taken when current value is 0 and previous value was 1 in case of
Booth’s multiplication?
ANS: b
ANS: a
A8
1) How many iterations are used by Restoring algorithm to divide two 32 bit numbers?
32
2) Restoring division algorithm uses:
Left shift operation
3) Time complexity of each iteration in Restoring algorithm is:
log(n)
4) Assume that U contains remainder and D contains Divisor. If (U-D)>=0,then
Both Restoring and Non Restoring algorithms produces the same results.
5) How many rounding modes are available in IEEE 754 standard?
4
6) What is the condition for incrementing the significand in Round to Nearest mode?
(Residue > 0.5) OR (Residue = 0.5 AND lsb(P)=1)
7) Time complexity of Goldschmidt algorithm is:
log(n)*log(n)
8) Number of steps and complexity of each step in Newton Raphson method is:
log(n) and log(n)
9) Normalization operation in multiplication of floating point numbers can be done by using:
Both (Left shift operation, Right shift operation)
10) Implementation of rounding needs:
Both (sticky bit, round bit)
A9
1) The value of isBranchTaken in case of call, ret and b instruction is
a) 0
b) 1
ANS: b
ANS: c
ANS: d
ANS: d
ANS: b
ANS: c
ANS: d
a) beq
b) bgt
c) b
d) call
ANS: b
a) beq
b) bgt
c) b
d) call
ANS: d
A10
1. Microprogrammed processors are much faster than hardwired processors.
a) True
b) False
Ans- b
Ans - c
Ans- b
4) If the two instructions - {add r1, r2, r3} and {mul r5, r1, r4} are passed in the pipeline one after
the other (at two consecutive cycles), it will lead to
a) RAW hazard
b) WAR hazard
c) WAW hazard
d) None of the above
Ans -a
5) Interlocks are:
a) Hardware mechanism
b) Software mechanism
Ans-a
Ans-c
Ans -a
Ans- b
Ans-a
Ans - a
A11
1) The signals for the forwarding multiplexers are generated by the control Unit. True or False?
a) True
b) False
ANS: False
2) In the case when EX stage is a load and the instruction in the OF stage uses its loaded value
then Data Lock Unit creates a
a) Bubble
b) Stall
c) Flush
d) Commit
ANS: b
ANS: a
5) The optimal number of pipeline stages is proportional to (t = Minimum clock cycle time of a
single cycle pipeline, l = latch delay )
a) t/l
b) t*l
c) sqrt(t/l)
d) sqrt(t*l)
ANS: c
ANS: a
9) If a resource is accessed at some point of time, then most likely it will be accessed again in a
short period of time. This concept is known as
a) Temporal Locality
b) Spatial Locality
ANS: a
10) If a resource is accessed at some point of time, then most likely similar resources will be
accessed again in the near future. This concept is known as
a) Temporal Locality
b) Spatial Locality
ANS: b
A12
1. Block arrays are used to store:
a. Contents of the blocks
2. Both the tag arrays and block arrays have same number of entries.
a. True
3. A way in a set associative cache is defined as:
a. each entry in a set
4. In write through cache policy
a. Whenever a write is performed in the cache, a write is also performed to its lower
level
5. In write back cache policy
a. The write is just performed in the cache and set the modified bit
6. Global miss rate is defined as:
a. number of misses in a cache at level i divided by the total number of memory
accesses
7. Compulsory misses are:
a. Misses that happen when we read the data for the first time
8. Victim cache is used to eliminate
a. Both conflict and capacity misses
9. Virtual memory refers to:
a. Memory space assumed by program
10. Conflict misses are:
a. Misses that occur due to limited associativity in a set associative cache