Computer Architecture Mid

1 / 20

What are the two hardware methods to establish a priority?

Select the correct answer

1

Two hardware methods to establish priority are synchronous and asynchronous protocols.

2

Two hardware methods to establish priority are FIFO and LIFO.

3

Two hardware methods to establish priority are daisy chaining and parallel priority interrupt.

4

Two hardware methods to establish priority are round-robin and random selection.

What is a virtual memory on a computer?

Select the correct answer

1

Virtual memory allows a computer to use disk storage as an extension of RAM to manage larger workloads.

2

Virtual memory is a type of memory used only for virtual machines.

3

Virtual memory is a technique used to virtualize network connections.

4

Virtual memory is a storage area in the CPU used for temporary data.

What is the concept of memory latency?

Select the correct answer

1

Memory latency refers to the delay between a request for data and the delivery of the data.

2

Memory latency is the speed at which data is transmitted over a network.

3

Memory latency refers to the amount of memory available in a computer system.

4

Memory latency is the time it takes for the CPU to cool down between operations.

What is the purpose of the memory hierarchy's write-back and write-through policies?

Select the correct answer

1

Write-back policy writes data to main memory only when it is removed from the cache, while write-through policy writes data to both cache and main memory simultaneously.

2

Write-back policy is faster than write-through policy in data retrieval.

3

Write-back policy is used for volatile memory, while write-through policy is for non-volatile memory.

4

Write-back policy writes data to cache memory only, while write-through policy writes data to main memory only.

What is the role of the microarchitecture in CPU design?

Select the correct answer

1

Microarchitecture defines the way a processor is internally organized to implement the instruction set architecture (ISA).

2

Microarchitecture is the method of designing circuit boards for computers.

3

Microarchitecture is a type of software that manages the CPU.

4

Microarchitecture refers to the physical size of the processor chip.

Explain the concept of vector processing in CPU architecture.

Select the correct answer

1

Vector processing allows the CPU to execute a single instruction on multiple data points simultaneously.

2

Vector processing is a method of organizing data in a database.

3

Vector processing refers to the cooling system of the CPU.

4

Vector processing is a technique used to store vectors in memory.

What is the role of the memory controller in computer architecture?

Select the correct answer

1

The memory controller handles the input and output operations of the computer.

2

The memory controller is responsible for managing network connections in the system.

3

The memory controller controls the power supply to the CPU.

4

The memory controller manages the flow of data between the CPU and the memory.

Explain the concept of instruction-level parallelism (ILP) in CPUs.

Select the correct answer

1

Instruction-level parallelism (ILP) is a method to enhance graphics rendering in GPUs.

2

Instruction-level parallelism (ILP) refers to the synchronization of multiple CPUs in a network.

3

Instruction-level parallelism (ILP) is a technique to improve data storage in cloud systems.

4

Instruction-level parallelism (ILP) allows multiple instructions to be executed simultaneously to improve performance.

What is the role of a memory hierarchy in computer architecture?

Select the correct answer

1

The role of a memory hierarchy in computer architecture is to manage network connections.

2

The role of a memory hierarchy in computer architecture is to sort data based on alphabetical order.

3

The role of a memory hierarchy in computer architecture is to organize different types of memory to balance speed and cost effectively.

4

The role of a memory hierarchy in computer architecture is to control the input and output devices.

Explain the concept of a branch target buffer (BTB) in the context of instruction fetching.

Select the correct answer

1

A branch target buffer (BTB) is a type of cache used to store frequently accessed instructions.

2

A branch target buffer (BTB) is a part of the memory used for temporary storage of data.

3

A branch target buffer (BTB) is used to synchronize the clock signals in a CPU.

4

A branch target buffer (BTB) is used to store the destination addresses of previously executed branch instructions.

What is speculative execution in CPU architecture.

Select the correct answer

1

Speculative execution allows the CPU to guess the outcome of a conditional operation and execute instructions ahead of time.

2

Speculative execution is a technique used to compress data before storing it in memory.

3

Speculative execution is a method for predicting power consumption in the CPU.

4

Speculative execution is a feature of GPUs used for rendering graphics.

What is the purpose of the memory management unit (MMU) in computer architecture.

Select the correct answer

1

The memory management unit (MMU) manages input and output devices connected to the computer.

2

The memory management unit (MMU) translates virtual memory addresses to physical addresses and handles memory protection.

3

The memory management unit (MMU) is a part of the operating system that handles software updates.

4

The memory management unit (MMU) is responsible for cooling the CPU and preventing overheating.

Explain the concept of multi-core processors in computer architecture.

Select the correct answer

1

Multi-core processors can only be used in gaming computers.

2

Multi-core processors are another name for dual-processor systems.

3

Multi-core processors are designed to run only single-threaded applications faster.

4

Multi-core processors contain multiple processing units on a single chip to improve performance and parallelism.

Explain the concept of out-of-order execution in modern CPUs.

Select the correct answer

1

Out-of-order execution involves executing instructions based on their memory addresses.

2

Out-of-order execution is a method of executing instructions only during idle CPU cycles.

3

Out-of-order execution ensures that all instructions are executed in reverse order.

4

Out-of-order execution allows a CPU to execute instructions as resources are available rather than strictly in the order they appear.

What is branch prediction in computer architecture.

Select the correct answer

1

Branch prediction is a technique to guess the direction of branches to improve the flow in the instruction pipeline.

2

Branch prediction is a method to allocate more memory to certain processes.

3

Branch prediction is a technique to cool down the CPU during intensive tasks.

4

Branch prediction is a strategy for managing network traffic in multiprocessor systems.

Explain the difference between RISC and CISC architectures.

Select the correct answer

1

RISC architecture is used only in supercomputers, while CISC architecture is used in personal computers.

2

RISC architecture uses a small set of simple instructions, while CISC architecture uses a larger set of more complex instructions.

3

RISC architecture has no instruction set, while CISC architecture has a fixed instruction set.

4

RISC architecture is designed for mobile devices, while CISC architecture is designed for desktops.

Mention what are the different types of fields that are part of an instruction?

Select the correct answer

1

Different types of fields that are part of an instruction include opcode, operands, and addressing mode.

2

Different types of fields that are part of an instruction include memory size, voltage level, and clock speed.

3

Different types of fields that are part of an instruction include input type, output type, and data type.

4

Different types of fields that are part of an instruction include process ID, user ID, and access level.

What is the easiest way to determine cache locations in which to store memory blocks?

Select the correct answer

1

The easiest way to determine cache locations for memory blocks is using a random number generator.

2

The easiest way to determine cache locations for memory blocks is using the modulo operation on memory addresses.

3

The easiest way to determine cache locations for memory blocks is by using alphabetical sorting of data.

4

The easiest way to determine cache locations for memory blocks is by manually assigning addresses.

What is a snooping protocol?

Select the correct answer

1

A snooping protocol is a process for managing power consumption in processors.

2

A snooping protocol is a security measure for protecting data from unauthorized access.

3

A snooping protocol is a method used to maintain cache coherence by checking the actions of other processors.

4

A snooping protocol is a technique for speeding up data transmission between devices.

What are the different hazards?

Select the correct answer

1

The different hazards in a computer system include logical hazards, physical hazards, and network hazards.

2

The different hazards in a computer system include software hazards, hardware hazards, and firmware hazards.

3

The different hazards in a computer system include power hazards, thermal hazards, and signal hazards.

4

The different hazards in a computer system include data hazards, control hazards, and structural hazards.