Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
It is a special type of high speed RAM where If AL contains FFH, what does it contain after
data and the address of the data are stored. INC AL executes? 00H
Cache
Which of the following examples is an
The following is true for r/m except: When Immediate Addressing Mode? MOV AL,
mod = 11, r/m indicates a REG field. FFH
The Direction flag is cleared by this It transfers the source immediate byte or word
instruction. CLD of data into the destination register or memory
It is another way of referring to a subroutine location Immediate Addressing Mode
and has to do with the assembler directives An example of Indexed Addressing Mode
PROC and ENDP used in the source file.
ADD AL, [DI+16]
Procedures
Which of the following is a Logical It moves a byte or a word between a memory
Instruction? TEST location and a register Direct Addressing
Mode
Which of the following are Bit Manipulation
Instructions? All of the above Data transfer group contains instructions that
transfer from _____ Memory to register,
It is a collection of Instructions that is called
register to register, register to memory
from one or many other different locations
within a program. Subroutine MOV DL, [SI] is a sample of which type of
This Instruction sets the carry flag. STC addressing?
These instructions are used to preserve the Which of the following examples is a direct
contents of the outer loop counter. PUSH and addressing mode? MOV [500H], AL
POP The source file is converted into a(n) _____
mm=___ is automatically used for direct wherein it contains all the actual binary
addressing 00 information Object file
This group of instructions allows the MOVS is used to _______ Copy the source of
programmer to choose where the processor the string to the destination string
What segment is used to store a destination If SI = 1000H, what does MOV [SI], BH do?
string? Writes byte of data from BH into memory
location 1000H
Which of the following examples is an
Register Addressing Mode? None of the In this addressing mode, the operands offset
choices address is found by adding the contents of SI
or DI register and 8-bit/16-bit displacements
It transfers a byte or a word between a register
Indexed addressing mod
and a memory location addressed by an index
or base register Based Addressing Mode The addressing mode in which the effective
address of the memory location is visibly part
Based addressing mode example MOV DX,
of the instruction Direct Mode
[BX+04]
A type of addressing mode, the offset address
What is the result of SHL AL, CL if AL =
of the operand is given by the sum of contents
3EH and CL = 04H E0H
of BX/BP registers and 8-bit/16-bit
This instruction pushes all registers to the displacement. Based addressing mode
stack PUSHA
This is an example of register Indirect
Addressing
Mode MOV AX, [BX] Which is not a valid logical instruction? XO
What are the contents of AH and AL after
MOV AX, 4 executes? AH = 0, AL = 04
4. Which technique does the Pentium Pro
CISC stands for______. employs here the processor looks ahead into
a. Complicated Instruction System Computer the instruction stream, executing instructions
b. Complex Instruction Set Computer out of order, so that the instruction pipeline
c. Complex Instruction System Computer can be kept busy
d. Complicated Instruction Set Computer a. Predication
b. Speculative Execution
2. What do ARM stands for, it developed the c. Superthreading
large variations in superscalars as per d. Register renaming
application-specific needs
a. Advance RISC Machines 5. Which two bit value has the highest priority
b. Advance Response Machines of Requestor Privilege level in a Segment
c. Advance Robotic Machines Selector for a Protected-mode Operation?
d. Advance Reprogrammable Machines a. 00
b. 01
3. RISC stands for_____. c. 10
a. Reduced Instructive System Computer d. 11
b. Reused Instruction Set Computer
c. Reused Instruction System Computer 6. This input is used to force the Pentium to
d. Reduced Instruction Set Comput limit addressable memory to 1MB to emulate
the memory space the memory of the 8086. a. CLC
a. A20M (Address 20Mask) b. STC
b. ADS (Address Strobe) c. CMC
c. AHOLD (Address Hold) d. CLD
d. AP (Address Parity)
12. It is another way of referring to a
7. A processor design, where single instruction subroutine and has to do with the assembler
can execute several low-level operations or directives PROC and ENDP used in the source
addressing modes within single instruction? file
a. CISC processor a. Procedures
b. RISC processor b. Processor
c. Celeron c. CALL
d. Athion d. RET
21. These instructions are used to preserve the 26. If SP = 1E00H before PUSH AX, what
contents of the outer loop counter. does it equal after PUSH AX?
a. PUSH and LOOP a. 1DFEH
b. LOOP and POP b. 1E02H
c. PUSH and PUSH c. 1E00H
d. PUSH and POP d. none of the above
ANSWER: D
2. An _________ is a special program that
will understand the contents of the object
file/
A. Assembler
B. Compiler
C. Linker
D. Library
ANSWER: A
3. This type of assemblers work with one
source line at a time and are restricted in
operation.
A. One-liner-assemblers
B. Special-assemblers
C. Cross-assemblers
D. Single-line-assemblers
ANSWER: D
4. ______ contains many new pseudocodes
to help the assembler generate the correct
machine code for the object file.
A. Module
B. Operands
C. Segments
D. Linker
ANSWER: C
A. Memory to register, register to memory,
5. Data transfer group contains instructions memory to memory, register to register
that transfer from ____________.
B. Memory to memory, register to register, C. Memory to memory, memory to register,
register to memory register to memory
D. Memory to register, register to register,
register to memory
ANSWER: D
6. A _____ is a collection of bytes stored
sequentially in memory, whose length can
be up to _______.
A. String, 64KB
B. String, 8KBytes
C. Char, 1KB
D. Char, 64KB
ANSWER: A
7. Bit manipulation is used for __________.
A. AND, OR, NOR, NOT
B. AND, OR, XOR, NOT
C. AND, NOR, OR, XOR
D. TEST, NOR, AND, OR
ANSWER: B
8. Address is referred to ________ when the
processor’s address bus is formed by some
combination of segment register and an
additional numerical offset.
A. Effective Address
B. Immediate Addressing
C. Register Addressing
D. Base Addressing
ANSWER: A
9. MOV CX, 7 is a sample of which type of
addressing?
A. Indirect Addressing
B. Base Addressing
C. Register Addressing
D. Immediate Addressing
ANSWER: D
10. MOV AX, [BX+4] is a sample of which
type of addressing?
A. Indirect Addressing
B. Base Addressing
C. Register Addressing
D. Immediate Addressing
ANSWER: B
11. MOV DL, [SI] is a sample of which type
of addressing?
A. Indirect Addressing
B. Base Addressing
C. Register Addressing
D. Register Indirect Addressing
ANSWER: D
12. Base registers, BX or BP, is used as a
pointer to the desired memory location in
this type of addressing.
A. Indirect Addressing
B. Base Addressing
C. Register Addressing
D. Immediate Addressing
ANSWER: B
13. This instruction pushes all registers to
the stack.
A. PUSHD
B. PUSH
C. PUSHF
D. PUSHA
ANSWER: D
5. It is a useful way to grab the proc
14. MOVS is used to ___________ essor’s attention, get it to perform a special
A. Move the signed value to the destination task, and then resume
B. Move the source to the destination execution from the point where it left off.
ANS. Interrupt
C. Copy the source to the destination
6. They are actually souped
D. Copy the source of the string to the upmicroprocessors with built-in features
destination string. such as RAM, ROM, interval timers,parallel
I/O ports, and even A/D converters.
ANSWER: D ANS. Microcontrollers
15. BSWAP swaps bytes in a ______ 7. It is where the most electronics within the
A. 16-bit general purpose register PC were contained which is a single printed
B. 32-bit general purpose register circuit board.
C. 16-byte general purpose register ANS. Motherboard
8. It is the first single-chip microprocessor.
D. 32-byte general purpose register
ANS. Intel 4004
9. It is the 8-bit microprocessor.
ANSWER: B VILLARUEL, King Ralph
ANS. Intel 8008
G.
10. It is ten times faster than the
COE121 / C1
performance of 8008.
Identification
ANS. Intel 8080
1. It is a digital machine that can execute
11. They are used to convert the binary form
many different software instructions and
intro current, voltage, or electric charge.
controlling a wide
ANS. D/A Converter / Digital-to-Analog
variety of electronic devices.
Converter
ANS. Microprocessor
12. 1 to 3 in high, it requires space, generate
2. It is either the “heart” or the “brain”
tremendous heat, and requires large amount
of the system, the master controller of all
of power.
operations that can be
ANS. Vacuum Tubes
performed.
13. Act as logical switches in digital circuits,
ANS. Central Processing Unit (CPU)
and it replaced the vacuum tubes.
3. They are actually microprocessors
ANS. Transistors
themselves; their instruction set consists
14. It is where the transistor was invented in
mainly of simple instructions for
1947.
transferring data, and compex instructions
ANS. Bell Lab
for performing a large variety of
15. He used very small wires to connect
mathematical operations.
transistors (first IC) that was in 1958.
ANS. Math Coprocessors
ANS. Jack Kilby
4. It is a type of RAM that retains its
16. He developed a single general-purpose
information even when the power is turned
chip that could be programmed to carry out
off.
a calculator’s function.
ANS. Nonvolatile Memory (NVM)
ANS. Ted Hoff
17. It is a type of RAM that is fast and easy ANS. C
to interface but comes in small sizes. 5.
ANS. Static RAM It is a type of flag register that contains carry
18. It is a special parallel operation used to out of MSB of result.
transfer data from a hard disk to a A. Overflow Flag (OF)
microcomputer’s memory. B. Auxiliary Flag (AF)
ANS. Direct Memory Access (DMA) C. Interrupt Flag (IF)
19. It is a type of RAM that has larger D. Carry Flag (CF)
capacity but requires refreshing. ANS. D
ANS. Dynamic RAM 6. 8-bit binary numbers are referred to
20. ROM stands for. as__________.
ANS. Read-Only Memory Multiple A. Word
Choice B. Double-Word
1. It is a type of a flag register that indicates C. Bytes
if result equals to zero. D. Kilobytes
A. Carry Flag (CF) ANS. C
B. Zero Flag (ZF) 7. 32-bit binary numbers are referred to as
C. Sign Flag (SF) __________.
D. Interrupt Flag (IF) A. Double-Word
ANS. B B. Long-Word
2. Intel C. Word
CPUs are also called __________computers, D. Both A and B
while Motorola processors are called ANS. D
__________ computers. 8. The first practical IC was developed in
A. little endian; big endian this year.
B. big endian; little endian A. 1959
C. little indian; big indian B. 1961
D. big indian; little indian C. 1967
ANS. A D. 1973
3. ANS. A
It is a type of flag register that provides 9. This processor is considered as one of the
single-step capability for debugging. XTs or experimental technologies.
A. Trap Flag (TF) A.
B. Nested Task (NT) Intel 80186
C. Overflow Flag (OF) B.
D. Auxiliary Flag (AF) Pentium Pro
ANS. A C.
4. A method that began with the 8-bit 8080 Pentium III
and has been used on all upgrades from the D.
8085 to the Pentium. Intel 8088
A. pipelining ANS. A
B. UV pipelining
C. byte-swapping
D. branch prediction
10. This element is the one responsible in 15. Which among the choices is not a
creating signals or commands for the software interrupt?
execution of the A. Mobile Legends
instruction. Failure
A. Control Signal B. Program Loader Failure
B. Control Bus C. Word Processor Failure
C. Control Unit D. Worm
D. Control Logic ANS. B
ANS. D 16. This element serves as a medium of
11. If pin INTR is connected to the ground, communication between the processor and
which flag is affected? the outside world.
A. Interrupt Flag (IF) A. Modem
B. Carry Flag (CF) B. Ethernet Cable
C. Auxiliary Flag (AF) C. I/O Port
D. Trap Flag (TF) D. Coprocessor
ANS. A ANS. C
12. This register is the 17.
one responsible in pointing to the address of Which of the following is part of the
the next instruction to be fetched and Microprocessor?
executed. A. I/O Port
A. Program Counter B. Memory
B. Program Sequencer C. Arithmetic Logic Unit (ALU)
C. Program Accumulator D. Video Display Adapter
D. Program Yasuo ANS. C
ANS. A 18. Which of the following is
13. This element is the one responsible in not part of the Microprocessor?
decoding the operation code of A. Memory
an instruction. B. Arithmetic Logic Unit (ALU)
A. Instruction Encoder C. General-purpose Registers
B. Instruction Converter D. Coprocessor
C. Instruction Interpreter ANS. A
D. Instruction Decoder 19. Which among the flags is affected by the
ANS. D direction flow during string operations?
14. This element is the one responsible in A. Carry Flag (CF)
monitoring the bus operation. B. Interrupt Flag (IF)
A. Bus Snooping C. Trap Flag (TF)
B. Watchdog Monitor D.Direction Flag (DF)
C. Branch Prediction ANS. D
D. Address Bus
ANS. B
20. He noticed that the number of transistors ;
per square inch on integrated circuits had C. CF=1; AF=0; ZF=0; I
doubled every year since their invention. F=0;
His law predicts that this trend will continue D. CF=1; AF=1; ZF=0; IF=0
into the foreseeable future. ANS. A
A. Mandy Moore 23. Simulate the given instructions (below)
B. Gordon Moore and determine which among the choices is
C. Bill Gates correct.
D. Paul Allen Initially
ANS. B CF=0; AF=0
21. Simulate the given instructions (below) ; ZF=0
and determine which among the choices is ; IF=1
correct. Initially CF=0; AF=0; ZF=0; MOV AL, FF
I MOV BL, 01
F=0 ADD
MOV AL, 1F AL, BL
MOV BL, F1 CLC
ADD CLI
AL, BL A. CF=1; AF=1; ZF=1; IF=1
Assume that there is an interr ;
upt. B. CF=0
A. CF=1; AF=1; ZF=1 ; AF=1; ZF=0; IF=1
; IF=1 ;
; C. CF=0
B. CF=1; AF=1; ZF=0 ; AF=0; ZF=0; I
; IF=1 F=0;
; D. C
C. CF=1; AF=0; ZF=0; I F=0
F=0; ; AF=1; ZF=0; IF=0
D. C ANS. D
F=1; AF=1; ZF=0; IF=0 24 Simulate the given instructions (below)
ANS. B and determine which among
22. Simulate the given instructions (below) the choices is correct.
and determine which among the choices is Initially CF=0; AF=0; ZF=1; IF=0
correct. MOV AL, 3A
Initially CF=1; AF=1; ZF=1; IF=1 MOV BL,
MOV C
AL, 1F 2
MOV BL, F1 ADD
ADD AL, BL
AL, BL STC
A. CF=1; AF=1; ZF=1; IF=1 A. CF=0; AF=0
; ; ZF=1; I
B. CF=1; AF=1; ZF=0; IF=1 F=0
; Multiple Choice
B. CF=0; AF=1; ZF=1 1. What element is responsible for
; IF=1 monitoring the bus operation?
; A. Bus snooping
C. CF=1 B. Watchdog monitor
; AF=0; ZF=1 C. Instruction register
;I ANSWER: B
F=0; 2. Pointing to the address of the next
D. C instruction to fetched and executed is the
F=1 responsibility of this register.
; AF=1; ZF=0; IF=0 A. Program counter
ANS. A B. Data segment
25. Simulate the given instructions C. Direction flag
(below) and determine which among the ANSWER: A
choices is correct. 3. It is a signal that indicates the need of
Initially CF=0; AF=0; ZF=0; IF=0 attention, perform special task and resume
MOV AL, AE the pre-empted operation.
MOV BL, A. Interrupts
9A B. Commands
SUB C. Operands
AL, BL ANSWER: A
A. CF=0; AF=0 4. During the flow of string
; ZF=0 operations, this flag is affected.
; IF=0 A. Sign flag
; B. Carry flag
B. CF=0; AF=1; ZF=1; IF=1 C. Direction flag
; ANSWER: C
C. CF=1; AF=0; ZF=1; I 5. This instruction allows you to transfer the
F=0; data or address to a register or variable.
D. CF=1 A. ADD instruction
; AF=1; ZF=1 B. SUB instruction
;I C. The MOV instruction
F=1 ANSWER: C
ANS. A COE121 6.
- Pushing Flags onto stack is the use of this
C1 instruction.
Quiz#1 A. PUSHA
I. B. PUSHF
C. PUSHD
ANSWER: B
7. What data type has a size of 2bytes or 0
16bits? ANSWER: B
A. Doubleword 14.
B. Word Binary word of -28
C. Quadword A. 1110 0100
ANSWER: B B. 0000 0000 1110 0100
8. Data type that has a size of 4bytes or C. 0001 0011 0000 1000
32bits ANSWER: B 15.
A. Doubleword The 2nd generation of microprocessors is
B. Word __________.
C. Quadword A. Transistors
ANSWER: A B. Vacuum tube computers
9. This flag is a way for the processor to C. Intel 8080
wave the programmer that a zero condition ANSWER: A
has occurred. 16. The Intel 80586 is also known as
A. Carry flag ___________.
B. The zero flag A. First microprocessor
C. Overload flag B. ENIAC
ANSWER: C. The Pentium
B ANSWER: C
10. CISC stands for: 17. This law states that y=x 2 or the number
A. Computer Instruction Set Configurations or complexity of transistors per IC doubles
B. Complex Instruction Set Configuration every 2 years.
C. Complex Instruction Set Computer A. The Moore’s law
ANSWER: C B. Newton’s law
11. ASCII code for EECE C. Mealy’s law
A. 45h, 45h, 43h, 45h ANSWER: A
B. 43h, 43h, 45h, 43h 18.
C. 46h, 46h, 41h, 46h Advance technologies
ANSWER: A developed Intel _____.
12. BCD of 3431 (packed) A. 80486
A. 0000 00011 0000 0100 0000 0011 0000 B. 8080
0001 C. 8086
B. 0011 0100 0011 0001 ANSWER: A
C. 0000 0101 0100 1000 19. The first practical IC was developed in
ANSWER: ______.
B A. 1989
13. Binary and normalized form of - B. The year 1959
1.75. C. 1890
A. 1.11 and 1.11x2 ANSWER: B
1
B. 1.11 and 1.11x2
0
1.01 and 1.01x2
20. The single general-purpose chip that 1. The following are types of RAM except ?
could be programmed to carry out the A. Static RAM
calculator’s function was developed by: B. Dynamic RAM
A. Ed Roberts C. Nonvolatile memory
B. Bill Gates D. Volatile memory
C. Ted Holf ANS: D
ANSWER: C 2. A special parallel operation that is used to
1. The vision of Mapua Institute of transfer data from a hard disk to a
Technology is to be ____ microcomputer’s memory?
A. be among the best universities in the A. Direct memory access (DMA)
world B. Random access memory (RAM)
B. be the best universities in the Philippines C. Read only memory (ROM)
C. be among the great universities in the D. None of the choices
world ANS: A
D. shall be the best engineering school in the 3. The first processor in the 80x86 family
world was the ______?
ANS: A A. Pentium
2. The institute shall provide a learning B. 16-bit 8086
environment in order for _____ C. 8-bit 8086
A. Its students to be good engineers D. None of the choices
B. its students to acquire the attributes that ANS: B
will make them globally competitive. 4. by common practice, 8-bit binary
C. Its students to acquire the attributes of an numbers are referred to as ____ ?
engineers A. Bits
D. None of the above B. Bytes
ANS: B C. Kilobytes
3. The institute shall engage in the following D. Megabytes
except one? ANS: B
A. Research 5. Sixteen-bit numbers are known as ____ ?
B. Development A. Double-words
C. Competition B. Long-words
D. Innovation C. Words
ANS: C D. None of the choices
4. the institute shall provide state-of-the- ANS: C
art _______ to problems of industries and 6. A method that began with the 8-bit 8080
communities and has been used on all upgrades from the
A. Answers 8085 to the Pentium is a technique called
B. Designs _____ ?
C. Both A and B A. Byte-changer
D. Solutions B. Byte-swapping
ANS: D C. Byte-swarming
D. None of the choices
ANS: B
7. Motorola processors are called ____ ? 4. _____ is the first processor in the 80x86
A. Little-endian family, which was capable of addressing
B. Huge-endian _____
C. Large-endian Ans. 16-bit 8086, 1 MB of memory
D. None of the choices 5. A ______ contains all the memory
ANS: D locations that can be reached when a
8. what instruction are used to move data particular number in a certain segment
among registers, memory, and the out register is used.
side world ? Ans. Segment
A. Data transport instructions 6. Intel CPUs are also called ________
B. Data network instructions computers, while Motorola processors are
C. Data transfer instructions called _______ computers. Ans. Little-
D. None of the choices endian, big- endian
ANS: C ENUMERATIONS:
9. A hardware ________ is an event that 1. Enumerate the 4 data registers of the
occurs while the processor is executing an 80x86 family of
instruction. It temporarily suspends microprocessors.
execution of the main program in favor of a Ans:
special routine that services it. • _AX
A. Error • _BX
B. Interrupt • _CX
C. Restrict • _DX
D. Interject 2. List the 6 main groups of instructions in
ANS: B the80x86 instruction set.
10. this instructions is capable of performing Ans:
logical, shift and rotate operations. Many • _Data Transfer Instruction
common boolean operations (AND, OR, • _Arithmetic Instructions
NOT) are available in the logical • _Bit Manipulation Instructions
instructions. • _String Instructions
A. Bit Manipulation Instructions • _Program Transfer Instructions
B. Byte Manipulation Instructions • _Processor Control Instructions
C. Both A and B SOLVING:
D. None of the above 1. Determine the content of each of the flags
ANS: A after the execution of each of the following
IDENTIFICATION: instructions. Note that the given instructions
1. _____ is the heart of the system, the will function as a part of a program. Show
master controller of all operation that can be your solution.
performed. INSTRUCTIONS
Ans. CPU (Central processing unit) CF
2. _____ special devices that often used in 0
simple control system because of their many AF
features. 0
Ans. Microcontrollers ZF
0
SF 0
0 SF
PF 0
0 PF
OF 0
0 OF
TF 0
0 TF
DF 0
0 DF
IF 0
0 IF
NT 0
0 NT
IOPL 0
00 CLC IOPL
STI 00
MOV AL, AC CLC
MOV BL, F3 0
STC 0
ADD AL, BL 0
CLI 0
MOV CL, AL 0
MOV AL, D2 0
STD 0
SUB AL, CL 0
CLD 0
1. It is assumed that after 3rd instruction 0
there is an interrupt. 00
2. It is assumed that after 4th instruction STI
there is an error. 0
3. It is assumed that before 6th instruction 0
there is an overflow. 0
4. It is assumed that after 7th instruction the 0
task is nested. 0
5. It is assumed that before 9th 0
the privilege level is third to the highest. 0
Ans: 0
INSTRUCTIONS 1
CF 0
0 00
AF MOV AL, AC
0 0
ZF 0
0 00
0 CLI
0 1
0 0
0 1
0 1
1 1
0 1
00 0
MOV BL, F3 0
0 0
0 0
0 00
0 MOV CL, AL
0 1
0 0
0 1
0 1
1 1
0 1
00 0
STC 0
1 0
0 1
0 10
0 MOV AL, D2
1 1
1 0
0 1
0 1
1 1
0 1
00 0
ADD AL, BL 0
1 0
0 1
1 10
1 STD
1 1
1 0
0 1
0 1
1 1
0 1
0 123A
0 3.ADD AX, BX
0 03C3
1 123B
10 -
SUB AL, CL 123C
1 4.MOV DX, 7EBF
1 BABF7E
1 123D
1 -
1 123F
1 5.SUB DX, AX
0 2BD0
0 1240
0 -
1 1241
10 6.HLT
CLD F4
1 1242
1 What is the OpCode for the operator MOV
1 AX?
1 a.DE
1 b. F8
1 c. B0
0 d. B8
0 Ans: D
0 2. These are signals that indicate need of
1 attention, perform special task and resume
10 the pre-empted operation.
Multiple Choices a. Operation Code
1. Using the given information in table #1 b. Commands
and determine which among the choices is c. Interrupts
correct. d. Control Signals
INSTRUCTION/S CONTENT/S or Ans: C
OPCODE ADDRESS/ES 3. Using the given information in the table,
1.MOV AX, DEF8 determine which among the choices is
B8F8DE correct. INSTRUCTION/S CONTENT/S
1234 or OPCODE ADDRESS/ES
- 1.MOV AX, DEF8
1237 B8F8DE
2.MOV BX, AD23 1234
BB23AD -
1238 1237
- 2.MOV BX,
AD23 B8F8DE
BB23AD 1234
1238 -
- 1237
123A 2.MOV BX, AD23
3.ADD AX, BX BB23AD
03C3 1238
123B -
- 123A
123C 3.ADD AX, BX
4.MOV DX, 7EBF 03C3
BABF7E 123B
123D -
- 123C
123F 4.MOV DX, 7EBF
5.SUB DX, AX BABF7E
2BD0 123D
1240 -
- 123F
1241 5.SUB DX, AX
6.HLT 2BD0
F4 1240
1242 -
At what address will the program counter 1241
point to if the next to be fetched and 6.HLT
executed is F4
instruction #5? 1242
a. 123F What is the OpCode
b. 1240-1241 for the operator MOV BX?
c. 1240 a. AD
d. 1241 b. BB
ANS: C c. 23
4. This is the main focus of all the designers d. B1
of computers. ANS: BB
a. Processor Identification
b. Speed 1. This element is consist of circuits needed
c. Functionality to get information or data into the program
d. Time of execution Ans: Input Devices
ANS: B 2. This is an enhancement of the usual
5.Using the given information in table #1 microprocessor because aside from the ALU
and determine which among the choices is and the control unit, read write memory,
correct. INSTRUCTION/S CONTENT/S read only memory, EEPROM, peripheral
or OPCODE ADDRESS/ES devices and I/O interfaces were added
1.MOV AX, DEF8 Ans: Microcontrollers
3. Developed the method of evaporating alu 3. This data dependency exists if the second
minum in specific places on a silicon wafer instruction reads an operand written to it by
to connect transistors the first
Ans: Robert Noyce instruction.
4. A group of lines that has a related A. write after read
function within the microprocessor system B. execute
Ans: System Bus C. execute after read
5. An element which functions as a floating D. read after write
point, graphics, signal processing, and even Ans. D
encryption 4. The history bits are initially set to 01.
Ans: Coprocessor What will be the history bits after this
6. Invented the single general purpose chip sequence; taken->taken->
that could be programmed to carry out not taken-> not taken-> not taken-> taken?
calculator’s functions A. 11
Ans: Ted Hoff B. 00
7. A type of special circuit which is disabled C. 10
during normal program execution D. 01
Ans: Interrupt Logic Ans. D
8. Used to indicate results of Arithmetic and 5. This specifies the percentage of hits to
Logical instructions total cache accesses
Ans: ALU A. miss ratio
9. An element in the operation of B. accuracy
microprocessor where all the data and C. precision
instructions are first stored D. hit ratio
Ans: Instruction Register Ans. D
10. The element which decodes theoperation 6. Average access time for a system that
code of an instruction contains 15ns cache and 75ns RAM if the hit
Ans: Instruction Decoder ration is 0.89 is
1. A _____ cycle is run if the Pentium _______?
detects an interval parity error. A. 23.25ns
A. shutdown B. 22.22ns
B. restart C. 25.23ns
C. bus snooping D. 20ns
D. Debug Ans. A
Ans. A 7. This translate linear addresses into
2. Bus ______ cycle is when the Pentium physical addresses
processor is able to watch the system bus in A. MESI
a multiprocessor B. TTL
system. C. TTF
A. clearing D. TLB
B. snooping Ans. D
C. sweeping
D. cleaning
Ans. B
8. This is a Pentium’s mechanism that is 2. The state in which data requested for
used to maintain cache coherency in its data processing by a component or application is
cache. found in the cache memory?
A. TLB A. Cache Hit
B. TTL B. Cache miss
C. TTF C. Cache Drop
D. MESI D. Cache fluff
Ans. D ANSWER: A
9. Busy instruction pipelines use this 3. A processor design, where single
technology instruction can execute several low-level
A. Passive Execution operations or are capable of multi-step
B. Dynamic Execution operations or addressing modes within
C. Passive Distribution single instruction?
D. Dynamic Distribution A. CISC processor
Ans. B B. RISC processor
10. Compute for the number of clock cycles C. Celeron
of the following instructions in UV D. Athlon
pipelining. ANSWER: A
MOV AX, 02 4. A type of microprocessor architecture that
MOV BX, 03 utilizes a small, highly-optimized set of
MOV CX, 04 instructions, rather than a more specialized
ADD AX, CX set of instructions often found in other
INC BX types of architectures?
SUB BX, AX A. CISC processor
MOV CX, BX B. RISC processor
DEC CX C. Celeron
A. 8 D. Athlon
B. 9 ANSWER: B
C. 10 5. A CPU that implements a form of
D. 11 parallelism called instruction-level
Ans. C parallelism within a single processor?
1. The state where the data requested for A. Supervector processor
processing by a component or application is B. RISC processor
not found in the cache memory? C. Pentium II
A. Cache Hit D. Superscalar processor
B. Cache miss ANSWER: D
C. Cache drop 6. An implementation technique where
D. Cache fluff multiple instructions are overlapped in
ANSWER: B execution?
A. Superscaling
B. Pipelining
C. RISC
D. CISC
ANSWER: B
7. IBM, Motorola, and Apple developed the 3. This bus cycles require additional
_________ superscalars. An RISC design decoding and use the byte enable outputs
but provides for more than 200 instructions for selection.
at the instruction set. Ans: special cycle
A. PowerPC 4. This cycle transfers bytes that are non-
B. PowerRISC cacheable between the processor and
C. IPhone memory.
D. PowerLaptop Ans: Single transfer cycle
ANSWER: A 5. This cycle is used by the cache for line
8. What do ARM stands for, it developed the loads and writebacks.
large variations in superscalars as per Ans: burst cycle
application-specific needs. 6. This is examined first whenever the
A. Advance RISC Machines processor tries to read data from the main
B. Advance Robotic Machines memory.
C. Advance RISC Monitor Ans: Cache
D. Advance Robotic Monitor 7. This helps identify possible interruptions
ANSWER: A to the normal flow of instruction through U
9. A memory cache that stores recent and V pipelines.
translations of virtual memory to physical Ans: Branch Prediction
addresses for faster retrieval? 8. This put its buses into a high-impedance
A. Translation lookafter buffer state, beginning with the next clock cycle.
B. Transfer lookbefore buffer Ans: BOFF
C. Translation lookaside buffer 9. This cycle is run if the Pentium detects an
D. Translate lookaside buffer interval parity error.
ANSWER: C Ans: Shutdown
10. First used in the P6 or sixth-generation 10. In this cycle the Pentium processor is
processors, ______ is an innovative able to watch the system bus in a
combination of three processing techniques multiprocessor system.
designed to help the processor manipulate Ans: Bus Snooping
data more efficiently. MULTIPLE CHOICE
A. Static execution 1. CISC stands for ___________________.
B. Superscalar execution A. Complex Instructive System Computer
C. Multiple execution B. Complex Instruction System Computer
D. Dynamic execution C. Complex Instruction Set Computer
ANSWER: D D. Complex Instructive Set Computer
Identification ANSWER: C
1. What type of dependency exists between 2. RISC stands for ___________________.
these two instructions? SUB DX, CX A. Reduced Instructive System Computer
ADD BX, DX B. Reduce Instruction System Computer
Ans: Read after Write C. Reduced Instructive Set Computer
2. This bus state indicates that no bus cycle D. Reduced Instruction Set Computer
is currently running. ANSWER: D
Ans: Ti
3. RISC machines are designed to have the 8. Bus _______ input provides a second way
following goals in mind except for a different bus master to take control of
_____________. the Pentium’s buses.
A. Utilize compiler extensively A. BOFF
B. Make good use of registers B. HOLD
C. Pipeline Everything C. INTR
D. Reduce access to hard drive D. FLUSH
ANSWER: D ANSWER: B
4. ____________ technique is used to 9. An internal parity error is detected by the
enable one instruction to complete with each Pentium allowing the _________ to run.
one clock cycle. A. Shutdown
A. Non-pipelining B. Halt
B. Cache Organization C. Pipelined
C. Branch Prediction D. inquire
D. Pipelining ANSWER: A
ANSWER: D 10. The Pentium is known as a superscalar
5. Choosing to make the instruction set machine because ___________.
smaller using fewer instructions and simpler A. it is capable of executing three integer or
addressing codes was the decision of three floating-point instructions
____________designers. simultaneously.
A. Computer B. it is capable of executing ten integer or
B. CISC ten floating-point instructions
C. RISC simultaneously.
D. System C. of its Pentium’s twin U and W pipelines.
ANSWER: C D. it can perform parallel instruction
6. As the Pentium also contains six 16-bit execution of multiple instructions.
segment registers, 32-bit stack pointer, and ANSWER: D
eight ______. 11. Also known as an external cache.
A. Floating point registers A. Second-level cache
B. Index registers B. Third-level cache
C. Control flags C. Data cache
D. Offset Addresses D. None of the above
ANSWER: A ANSWER: A
7. A __________ allows a new 8-byte chunk 12. Which is true about caches?
to transfer every clock cycle. A. It speeds up access to memory and
A. Burst operation reduce traffic on the processor’s buses.
B. Bus operation B. When an instruction or data is found in
C. Pipelining the cache it is called a hit.
D. Brach Prediction C. When an instruction or data is not found
ANSWER: A in the caches it is called a miss.
D. All of the above.
ANSWER: D
13. Bus snooping is used to maintain 3. RISC is also known as _________.
consistent data in a __________________. A. Resized Instruction Set Compatibility
A. Multiprocessor system where each B. Reduced Instructions Set Computers
processor has one cache. C. Resized Instructions Set Compatibilities
B. Multiprocessor system where each D. Reduced Instruction Set Computer
processor has a separate cache. ANS: D.
C. Multiprocessor system where both 4. CISC stands for __________.
processors has a separate cache. A. Complex Instruction Set ComputerB.
D. Multiprocessor system where both Complexity Instruction Set Computer
processors has one cache. C. Both A and B
ANSWER: B D. Neither A and B
14. TLB stands for ___________. ANS: A.
A. Translation Logical Buffers 5. Which is
B. Translation Logical Bus Operations NOT
C. Translation Lookaside Bus Operations a goal of a RISC machine?
D. Translation Lookaside Buffers A. Pipeline everything.
ANSWER: D B. Make good use of registers.
15. Label the format of a segment selector. C. Keep instructions and addressing modes
Write the letter. complex.
A. TI D. Utilize the compiler extensively.
B. Index(13-bit) ANS: C.
C. Index (16-bit) 6. It is used to store frequently used
D. RPL instructions, such as those in a short loop.
ANSWER: A. Data Cache
1. This input is used to force the Pentium to B. Instruction Cache
limit addressable memory to 1 MB, to C. Address Cache
emulate the memory D. None of the above
space the memory space of the 8086. ANS: B.
A. A20M (Address 20 Mask) 7. It is used to store frequently used data.
B. ADS (Address Strobe) A. Data Cache
C. AHOLD (Address Hold) B. Instruction CacheC. Address Cache
D. AP (Address Parity) D. None of the above
ANS: A. ANS: A.
2. It is a special type of high speed RAM 8. It is a technique used to enable one
where data and the address of the data are instruction to complete with each clock
stored. cycle.
A. Clock A. Clock
B. Burst Ready B. Pipelining
C. Cache C. Non-pipelining
D. Bus Lock D. Float Pointing
ANS: C. ANS: B.
9. Which technique is used in the execution C. Complier Prediction
of these three instructions? D. Register Prediction
I ANS: A.
5 10. This cycle is used to transfer up to 8
I bytes of non-cacheable data between the
4 processor and
I memory.
3 A. Burst Cycles
I B. Locked Operation
2 C. Single Transfer Cycle
I D. BOFF
1 ANS: C.
F
I 11. This operation cannot be broken down
4I into smaller sub-operation. The data
3 accessed during this
I operation often comes in the form of
2 semaphore.
I A. BOFF
1 B. Lock Operation
D C. Single Transfer Operation
I D. Atomic Operation
3 ANS: D.
I 12. It is a special type of counter variable
2 that must be read, updated and stored in one
I single,
1 uninterruptable operation.
E A. Lock OperationB. Burst
Clock C. Semaphore
Cycle D. BOFF
123 ANS: C.
45 13. It provides a way for other processors in
A. Clock a multiprocessor system to instantly take
B. Pipelining over the Pentium’s
C. Non-pipelining buses.
D. Float Pointing A. BOFF
ANS: B. B. Shutdown
9. The Pentium employs a technique called C. Bus Hold
______ that helps identify possible D. HALT
interruptions to the ANS: A.
normal flow of instruction through the U
and V pipelines.
A. Branch Prediction
B. Normal Prediction
14. It is used to help maintain consistent
data in a multiprocessor system where each
processor has a
separate cache.
A. TLBs
B. Triple Ported
C. Cache Coherency
D. Bus Snooping
ANS: D.
15. Which is NOT one of the Pentium’s
hardware interrupt signals?
A. INTR
B. KEN
C. NMI
D. SMIANS: B.
16. It contains a 13-bit index field that is
used to select one of 8,192 segment
descriptors that reside
either in GDT or LDT.
A. Segment Selectors
B. Segment Descriptors
C. Both A and B
D. None of the above
ANS: A.
17. It is accomplished by interweaving
micro-ops from each instruction through a
single instruction
pipeline.
A. Ultrathreading
B. Superthreading
C. Hyperthreading
D. Overthreading
ANS: C.
18. Which is NOT a component of NetBurst
Architecture?
A. HyperPiped Line Technology
B. Rapid Execution Engine
C. Execution Trace Cache
D. None of the above
ANS: D.
REGISTER QUESTIONS.
1. Machine code for LAHF Answer: 9F
1. Prevent changing the location POPA which *note: 9E kapag SAHF
register is not loaded with data
Answer: SP or ESP
*note: POPA Pop All Registers; Intel 80x86; move 2. Machine code ROL BYTE PTR[SI], 1 Answer:
memory pointed to by stack pointer to all 16-bit general final value = 82H → D004 - 1101 0000 0000 0100
purpose
registers (except for SP); does not affect flags
3. Machine code XOR AX, CX
2. Pushes all registers to the stack Answer: 31C8 or 0011 0001 1100 1000
Answer: PUSHA
*note: PUSH - push data onto stack SIMULATION QUESTIONS.
PUSHW - push word onto stack
PUSHD - push double word onto stack 1. Result of executing RCR AX, CL if CL
PUSHA - push all registers to stack (60) contains 2 and AX contains ABCDh
Order: AX, CX, DX, BX, SP, BP, SI, DI Answer: AAF3 Machine Code: D3D8
PUSHF - push flags onto stack (9C)
2. AX, BX, CX = 1234H, 5678H, 9ABCH ; result of
3. Lower byte of flag reg = 83H. Which flag SHRD BX, CX, 8?
registers are set as a result of LAHF Answer: BC56 Machine Code: 0FAC CB08
instruction?
Answer: SF 3. Result of executing RCL DL, 1; cleared flags; DL
contains 93h
4. The higher byte of the flag register contains Answer: 26h Machine Code: D0D2
83h. Which flag registers are cleared as a result
of executing LAHF instruction? 4. SHLD AX, BX, 4
Answer: AF Answer: 2345H Machine Code: 0FA4 D804
6. These instructions are used to preserve the 3. The adjacency matrix of the graph is seen
contents of the outer loop counter below, determine how many edges are in the
Answer: PUSH and POP graph.
PROPOSITION QUESTIONS.
1. An algorithm that uses Hamiltonian cycle to 7. Determine which of the given relations on the
solve set of all integers is an antisymmetric relation where
uses a Big-O notation of (x, y) is an element of R. x is not equal to y x is
Answer: logarithmic complexity greater than or equal to y2 x is a multiple of y xy is
greater than or equal to 1
2. An algorithm that uses Eulerian Path/Bubble 8. Determine which of the given relations on the
Sort set of all integers is an equivalence relation where
to solve uses a Big-O notation of (x, y) is an element of R.
Answer: linear complexity
x is a multiple of y
3. An algorithm that uses Selection to solve uses a x greater than or equal to y2
Big-O notation of x = y2
Answer: quadratic x and y are both negative or both nonnegative
LOGIC QUESTIONS.
SET THEORY QUESTIONS.
1. Under precedence of logical operators which is
1. Which of the ff relation from Set A {integer performed last? Answer: Biconditional
numbers} is considered as equivalence relation?
a. R = {(a,b) | a > b or a = b } 2. Which of the ff logical operator is performed
b. R = {(a,b) | a b (mod m) with m > 1} first?
c. R = {(a,b) | a + b = 3} Answer: And
d. R = {(a,b) | a < b} *note: precedence of logical operators →
NOT(Negation), AND(Conjunction), OR(Disjunction), Answer: LSI
IMPLICATION, BICONDITIONAL(Equivalence) *note: (if more than 100 gates, matic LSI)
SSI - less than 100, about 10 gates
3. The expression below is regarded as (p ^ q) -> (p MSI - less than 500 or more than 10 but less than 100
v q) gates
Answer: TAUTOLOGY LSI - 500 to 300000 or have more than 100 gates
(p ^ q) ->
p q p^q pvq
(p v q) 7. What is the highest privilege (RPL) in
protected mode? Answer: 00
0 0 0 0 1 *note: 00 - highest
11- lowest
0 1 0 1 1
1. Signal that has I/O clk 11. If 8088 has frequency of 4MHz, the time of one
Answer: CLK T state? [200 ns; 80 ns, 250 ns; 300 ns]
Answer: 250 ns
2. How many additional control reg are activated
based from Pentium’s protected mode 12. This input is used to force the Pentium to limit
Answer: 5 addressable memory to 1 Mb to emulate the
memory space of the 8086.
3. 8088 I/O ad space, number of I/O ports? Answer: A20M
Answer: 4096
*note: The 8088's I/O addressing space contains 13. mm = __ is automatically used for direct
65 addressing Answer:
536 (2^16) 00
3. The binary value 0111 represent a decimal 5. 3x8 decoder D0 to D7 which output is
value activated high if input x’yz’
of 1 in this decimal code Answer: D2
Answer: 8 4 -2 -1
For other coding, we replace the 8 4 2 1 with other 6. 2 to 4 line decoder, made of NAND gates which
values. input would produce an output of 1011 from D0 to
We know that 0111 in decimal is 7 because of the D3
common 8 4 2 1 coding. 8(0) + 4(1) + 2(1) + 1(1) = 7
1XX
001
In this case, we replace it by 8 4 -2 -1.
(8) (4) (-2) (-1) 011
0 1 1 1 8(0) + 4(1) - 2(1) - 1(1) = 1 010
23. INTR
Answer: flag ground
24. TI
Choices:
Field 1 segment