set-10
451. Address symbol table is generated by
452. When an instruction is read from the memory, it is called
453. Which activity does not take place during execution cycle?
454. The time for which the D-input of a D-FF must not change after the clock is applied is known as
455. How many memory chips of (128 x 8) are needed to provide a memory capacity of 4096 x 16?
456. In addition of two signed numbers, represented in 2's complement form generates an overflow if
457. In DMA the data transfer is controlled by...
458. Synchronous means...
459. Excess-3 equivalent representation of (1234) H is
460. Which of the memory holds the information when the Power Supply is switched off?
461. Minimum no. of NAND gate required implementing an Ex-OR function is
462. Which of the following expression is not equivalent to x?
463. BCD equivalent of Two's complement is
464. Associative memory is sometimes called as...
465. When CPU is not fully loaded, which of the following method of data transfer is preferred?
466. 8085 microprocessor carryout the subtraction by
467. PAL circuit consists of
468. CPU checks for an interrupt signal during
469. Which of the following is not a characteristic of RISC architecture......?
470. Memory interleaving technique is used to address the memory modules in order to have
471. In a multiprogramming system, which of the following is used?
472. Cycle stealing technique is used in
473. During DMA acknowledge cycle, CPU relinquishes
474. If the stack pointer is initialized with (4FEB) H, then after execution of Push operation in 8085 microprocessors, the Stack Pointer shall be
475. A more efficient way to organize a Page Table is by means of an associative memory having
476. If there are four ROM ICs of 8K and two RAM ICs of 4K words, then the address range of 1st RAM is (Assume initial addresses correspond to ROMs)
477. A.B.C is equal to A B C for
478. Gray code equivalent of (1000)2 is
479. The memory blocks are mapped on to the cache with the help of......
480. During a write operation if the required block is not present in the cache then...... occurs
481. In...... protocol the information is directly written into main....
482. The method of mapping the consecutive memory blocks to consecutive cache blocks is called....
483. While using the direct mapping technique, in a 16-bit system the higher order 5 bits is used for....
484. The technique of searching for a block by going through all tags is......
485. In case of Zero-address instruction method the operands are stored in....
486. The addressing mode which makes use of in-direction pointer is......
487. The addressing mode, where you directly specify the operand value is
488. ...addressing mode is most suitable to change the normal sequence of execution of instructions.
489. The pipelining process is also called as....
490. The fetch and execution cycles are interleaved with the help of......
491. The situation where in the data of operands are not available is called...
492. The reason for the implementation of the cache memory is
493. The effectiveness of the cache memory is based on the property of ______.
494. The temporal aspect of the locality of reference means
495. The spatial aspect of the locality of reference means
496. The algorithm to remove and place new contents into the cache is called ______.
497. The key factor/s in commercial success of a computer is/are......
498. The main objective of the computer system is
499. A common measure of performance is:
500. The main purpose of having memory hierarchy is to
Last updated