1.__________ converts the programs written in assembly language into machine instructions.
a. Converter
b. Assembler
c. Machine compilerInterpreter
Correct Answer: b
2.Instructions which won’t appear in the object program are called as _____
a. Redundant instructions
b. Assembler Directives
c. Exceptions
d. Comments
Correct Answer: b
3.The utility program used to bring the object code into memory for execution is ______Loader
a. Fetcher
b. Extractor
c. Linker
d.
Correct Answer: d
4.The ultimate goal of a compiler is to ________
a. Reduce the clock cycles for a programming task
b. Reduce the size of the object code
c. Be versatile
d. Be able to detect even the smallest of errors
Correct Answer: a
5.As of 2000, the reference system to find the SPEC rating are built with _____ Processor.
a.
b. Intel Atom SParc 300Mhz
c. ASUS A series 450 Mhz
d. Ultra SPARC -IIi 300M Amd Neutrino seriesHZ
Correct Answer: d
6.The code sent by the device in vectored interrupt is _____ long.
a. upto 16 bits
b. 4-8 bits
c. upto 24 bits
d. upto 32 bits
Correct Answer: b
7.Which table handle stores the addresses of the interrupt handling sub-routines?
a. Symbol link tableNone of the mentioned
b.
c. Interrupt-vector table
d. Vector table
Correct Answer: c
8.The directive used to perform initialization before the execution of the code is ______Dataword
a. Store
b. EQU
c. Dataword
d. Reserve
Correct Answer: c
9.The assembler stores the object code in ______
a. Magnetic disk
b. RAM
c. Cache
d. Main memory
Correct Answer: a
10.To overcome the problems of the assembler in dealing with branching code we use _____
a. Op-Assembler
b. Debugger
c. Interpreter
d. Two-pass assembler
Correct Answer: d
11.The most efficient way of handling parameter passing is by using ______
a. Memory locations
b. None of the mentioned
c. General purpose registers
d. Stacks
Correct Answer: c
12.The order in which the return addresses are generated and used is _________
a. Random
b. Highest priority
c. LIFO
d. FIFO
Correct Answer: c
13.As of 2000, the reference system to find the performance of a system is _____
a. Ultra SPARC 10
b. SUN SPARC
c. SUN II
d. None of the mentioned
Correct Answer: a
14.If a processor clock is rated as 1250 million cycles per second, then its clock period is ________
a. 1.6 * 10-9 sec
b. 8 * 10-10 sec
c. 1.9 * 10-10 sec
d. 1.25 * 10-10 sec
Correct Answer: b
15.The device which interacts with the initiator is __________
a. Master
b. Responder
c. Friend
d. Slave
Correct Answer: d
16.Which is fed into the BUS first by the initiator?
a. Data
b. Address, Commands or controls
c. Commands or controls
d. Address
Correct Answer: b
17._____________ signal is used as an acknowledgement signal by the slave in Multiple cycle transfers.
a. Ack signal
b. Master ready signal
c. Slave received signal
d. Slave ready signal
Correct Answer: d
18.The device which starts data transfer is called __________
a. Initiator
b. Distributor
c. Transactor
d. Master
Correct Answer: a
19._____ is/are types of exceptions.
a. Trap
b. All of the mentioned
c. Trap
d. Interrupt
Correct Answer: b
20.The instructions which can be run only supervisor mode are?
a. Exception instructions
b. System instructions
c. Non-privileged instructions
d. Privileged instructions
Correct Answer: d
21.The DMA transfers are performed by a control circuit called as __________
a. Data controller
b. Overlooker
c. DMA controller
d. Device interface
Correct Answer: c
22.The controller is connected to the ____
a. Processor BUS
b. External BUS
c. None of the mentioned
d. System BUS
Correct Answer: d
23.The technique where the controller is given complete access to main memory is __________
a. Cycle stealing
b. Burst mode
c. Memory Con
d. Memory stealing
Correct Answer: b
24.To overcome the conflict over the possession of the BUS we use ______
a. BUS arbitrators
b. Optimizers
c. Multiple BUS structure
d. None of the mentioned
Correct Answer: a
25.The DMA transfer is initiated by _____
a. The process being executed
b. I/O devices
c. OS
d. Processor
Correct Answer: d
26.__________ is the bottleneck, when it comes computer performance.
a. Delay
b. Latency
c. Memory cycle time
d. Memory access time
Correct Answer: c
27.The cells in each column are connected to ______
a. Sense/ Write lineRead line
b.
c. Data line
d. Word line
Correct Answer: a
28.Circuits that can hold their state as long as power is applied is _______
a. Dynamic memory
b. Register
c. Cache
d. Static memory
Correct Answer: d
29.In a 4M-bit chip organisation has a total of 19 external connections.then it has _______ address if 8 data lines are there.
a. 9
b. 8
c. 10
d. 12
Correct Answer: a
30.A 16 X 8 Organisation of memory cells, can store upto _____
a. 128 bits
b. 512 bits
c. 1024 bits
d. 256 bits
Correct Answer: a
31.The contents of the EPROM are erased by ________
a. Exposing the chip to UV rays
b. Overcharging the chip
c. Exposing the chip to IR rays
d. Discharging the Chip
Correct Answer: a
32.The flash memories find application in ______
a. Mainframe systems
b. Super computers
c. Portable devicesDistributed systems
d.
Correct Answer: c
33.The flash memory modules designed to replace the functioning of a hard disk is ______
a. FIMM
b. DIMM
c. Flash drives
d. RIMM
Correct Answer: c
34.The disadvantage of the EPROM chip is _______
a. The low speed of operation
b. The low efficiency
c. The high cost factor
d. The need to remove the chip physically to reprogram it
Correct Answer: d
35.The flash memories find application in ______
a. Mainframe systems
b. Super computers
c. Portable devices
d. Distributed systems
Correct Answer: c
36.To overcome the lag in the operating speeds of the I/O device and the processor we use ___________
a. BUffer spaces
b. Interrupt signals
c. Exceptions
d. Status flags
Correct Answer: d
37.The process wherein the processor constantly checks the status flags is called as ___________
a. Reviewing
b. Echoing
c. Polling
d. Inspection
Correct Answer: c
38.The data is transferred over the RAMBUS as _______
a. Packets
b. Blocks
c. Bits
d. Swing voltages
Correct Answer: d
39.The only draw back of using the early start protocol is _______
a. Complexity of circuit
b. Time delay
c. Latency
d. High miss rate
Correct Answer: a
40.The logic operations are implemented using _______ circuits.
a. Gate
b. Combinatorial
c. Bridge
d. Logical
Correct Answer: b
41.In full adders the sum circuit is implemented using ________
a. And & or gates
b. NAND gate
c. XNOR
d. XOR
Correct Answer: d
42.A _______ gate is used to detect the occurrence of an overflow.
a. NAND
b. XOR
c. NAND
d. XNOR
Correct Answer: b
43.The multiplier is stored in ______
a. PC Register
b. Cache
c. None of the mentioned
d. Shift register
Correct Answer: d
44.The multiplicand and the control signals are passed through to the n-bit adder via _____
a. Encoder
b. Decoder
c. MUX
d. DEMUX
Correct Answer: c
45.The bits 1 & 1 are recorded as _______ in bit-pair recording.
a. 1
b. both -1 and 0
c. -1
d. 0
Correct Answer: b
46.CSA stands for?
a. Computer Service Architecture
b. None of the mentioned
c. Computer Speed Addition
d. Carry Save Addition
Correct Answer: c
47.Each computer in a cluster is connected using __________
a. Rj-45
b. STP
c. UTP
d. Coaxial cable
Correct Answer: a
48.In the client server model of the cluster _________ approach is used.
a. Bankers algorithm
b. FIFO
c. Load configuration
d. Round robin
Correct Answer: d
49.The most common modes of communication in clusters are ______
a. Message passing interface
b. Message queues
c. Message passing interface and PVm
d. PVm
Correct Answer: c
50.The alternate way of writing the instruction, ADD #5,R1 is ______
a. There is no other way
b. ADDI 5,R1;
c. ADDIME 5,[R1];
d. ADD [5],[R1];
Correct Answer: b