set-5
1. The most common addressing techniques employed by a CPU is:
2. ______ have been developed specifically for pipelined systems.
3. The pipelining process is also called as______.
4. Each stage in pipelining should be completed within ______ cycle.
5. To increase the speed of memory access in pipelining, we make use of______.
6. The contention for the usage of a hardware device is called______.
7. The situation wherein the data of operands are not available is called______.
8. The CISC stands for______.
9. The computer architecture aimed at reducing the time of execution of instructions is______.
10. The iconic feature of the RISC machine among the following is______.
11. Both the CISC and RISC architectures have been developed to reduce the______.
12. Pipe-lining is a unique feature of ______.
13. In CISC architecture most of the complex instructions are stored in ______.
14. In ______ the operand is specified in the instruction itself.
15. In which mode the operand is placed in one of 8-bit or 16-bit general-purpose registers?
16. An offset is determined by adding any combination of ______ address elements.
17. Zero address instruction are designed with implied addressing mode.
18. In the following indexed addressing mode instruction, MOV 5(R1), LOC the effective address is ______.
19. The addressing mode/s, which uses the PC instead of a general-purpose register is ______.
20. ______ addressing mode is most suitable to change the normal sequence of execution of instructions.
21. Sign magnitude is a very simple representation of?
22. Sign bit 1 represents
23. The logic 1 in positive logic system is represented by?
24. The m-bit parallel adder consists of
25. Input or output devices that are connected to a computer are called ______.
26. How many types of modes of I/O Data Transfer?
27. The method which offers higher speeds of I/O transfers is ______.
28. In memory-mapped I/O ______.
29. The ISA is an architectural standard developed by ______.
30. The SCSI BUS is used to connect the video devices to a processor by providing a ______.
31. The registers of the controller are ______.
32. Auxiliary memory access time is generally ______ times that of the main memory.
33. What is the formula for Hit Ratio?
34. Which of the following is correct example for Auxiliary Memory?
35. The fastest data access is provided using ______.
36. The next level of memory hierarchy after the L2 cache is ______.
37. Which Processors includes multicolcks?
38. Which Processors Data transfer Register to register?
39. Which of the following is true?
40. Which processor requires more number of registers?
41. Both the CISC and RISC architectures have been developed to reduce the ______.
42. Which of the following is true about CISC processor?
43. What is the high-speed memory between the main memory and the CPU called?
44. Cache Memory is implemented using the DRAM chips.
45. Whenever the data is found in the cache memory it is called as ______.
46. LRU stands for ______.
47. When the data at a location in cache is different from the data located in the main memory, the cache is called ______.
48. Which of the following is not a write policy to avoid Cache Coherence?
49. Which of the following is an efficient method of cache updating?
50. In ______ mapping, the data can be mapped anywhere in the Cache Memory.
Last updated