Hardware & Software Concepts

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

FC-AL supports ______ MBps packet transmission in one direction, with a theoretical maximum of _______ devices in the loop.

100/127

If a cache access requires one clock cycle and dealing with cache misses requires an additional five clock cycles, which of the following cache hit rates results in an effective access time of 2 clock cycles?

80%

The embedded systems programmer typically writes programs exclusively in _____does not have the luxury o after-the-fact performance tuning.

Assembly language

The wireless protocol suitable for a piconet is:

Bluetooth

The device that functions primarily at layer 2 that can join two similar types of networks so they look like one network (subnet) is called a_______.

Bridge

The IPv4 address 64.122.34.252 is a _____ network address

Class A

The IPv4 address 136.11.22.116 is a ______network address.

Class B

Which of the following types of memory needs to be refreshed periodically to maintain its data?

DRAM

The ISO/OSI layer that organizes messages bytes into frames of suitable size for transmission along the physical medium is the _______ layer.

Data Link

Distance vector routing considers latency in the network before assigning a route to a packet. T/F

False

It is possible for a computer with a single logical address to have more than one NIC, each with a distinct MAC address. T/F

False

One problem with Flynn's taxonomy is with the MIMD category; there are very few, if any, applications for this type of architecture. True/False

False

Superpipelining occurs when a pipeline has stages that require less than two clock cycles to execute.

False

Switches handle only one packet at a time, while hubs handle multiple incoming and outgoing packets simultaneously. T/F

False

VDHL is an abbreviation for Very high-speed integrated system Hardware Design Language. True/False

False

The device that can connect networks having vastly different organizations and protocols is a ________.

Gateway

A Layer 1 device whose primary purpose is to receive incoming packages from one or more locations and broadcast the packets to one or more devices on the network is called a _______.

Hub

The organization that controls the names of the host computers on the Internet is (the)______

ICANN

Two interfaces that support hot plugging are USB and ________.

IEEE 1394 (FireWire)

Twisted pair cabling is twisted in order to reduce _________.

Inductance

The _______ is the core of the operating system

Kernel

_____ is the process of removing the beginning or ending statements from a loop.

Loop peeling

The class A address 127.x.x.x is a network address reserved for

Loopback testing

The unique physical address burned into every network interface card is its:

MAC address

The transmission mode whereby a single message is placed on the network to be read by multiple nodes is called________.

Multicasting

_____ allows multiple processes to run cocurrently.

Multitasking

Modern CPU's need only a few ______ to execute an instruction when all operands are in its registers

Nanoseconds

The ISO/OSI layer responsible for routing PUDs across intermediate nodes is the______ layer.

Network

The electrical phenomena that work against the accurate transmission of signals are called _______.

Noise

At gigabits speeds, a 65,535-byte IP datagram passes over a given point in less than _________

1ms

The theoretical maximum number of hosts under IPv6 is_______.

2^128

Assuming an 8-bit virtual address with pages of 32 bytes, the virtual address format is:

3 bits for the page and 5 bits for the offset

Java _____ are bytecode that runs in browsers

Applets

A network that covers more than one building that is entirely owned or controlled by the same entity is called a _______.

Campus network

Measures of ______ indicate to us the expected behavior of the samples system

Central tendency

_____ is EEPROM that can be written and erased in blocks

Flash memory

The early computer networking protocol that provided nearly instantaneous access between client terminals and host computers was:

SNA

IEEE 1394 supports all of the following transfer modes except________

Synchronous

DVDs rotate at about ____ times the speed of cds

Three

Quantum computers use quantum bits (quibits) that can be in multiple states simultaneously. T/F

True

Security experts caution that wired equivalent privacy (WEP) is insufficient to block all types of network intrusion. T/F

True

________contains constants and literals used by the embedded program and its stored here to protect them from accidental overwrites.

read-only memory

Many networks running at 100Mbps and above encode 4 bits in 5 baud using______ signaling.

PRML

The two ISO/OSI layers that do not have a direct correspondence with TCP/IP are the _____ later and the ______layer

Physical and data link

Systems that require high availability and must be able to tolerate more than on concurrent drive failure use:

RAID-6

____ memory allows data to be both read from and written to easily and rapidly

RAM

The basic difference between RAM and ROM memory is:

RAM is read/write while ROM is ready only

Only explicit load and store instructions are permitted access to memory in _________ machines.

RISC

Which of the following types of memory has the shortest (fastest) access time?

Registers

The main purpose of a ______ is to reduce attenuation, although some models provide other functions in addition to this.

Repeater

The Layer 3 device connected to at least two networks that determines the destination to which a packer should be forwarded is a ________.

Router

______delays the binding process until the process is actually running

Run-time binding

______ benchmarks are helpful to computer buyers whose prime concern is CPU performance

SPEC's CPU

_______ are divisions of concentric circles (tracks) on disk drives.

Sectors

_________schedules the processor giving preference to the job with the shortest execution time.

Shortest job first scheduling

SCSI is the acronym for _________.

Small Computer Systems Interface

SPEC stands for:

Standard Performance Evaluation Corporation

______routing works best in networks where a large number of users in one location use a centralized host, or gateway, in another location.

Static

A Layer 2 device whose primary purpose is to create a point-to-point connection between one of its input ports and one of its output ports is called a________.

Switch

_________Computers derive their name from drawing an analogy to how blood rhythmically flows through a biological heart.

Systolic array

Direct mapping is set associative mapping with a set size of 1. T/F

True

Embedded systems differ from general-purpose computers because they are designated to carry out a limited set of tasks. T/F

True

Embedded systems rarely use virtual memory

True

In embedded systems, one major challenge is that the events can happen asynchronously and can occur in any order, making it impossible to test all possible sequences of events. T/F

True

It is possible for a single host to support both IPV4 and IPv6. T/F

True

One of the problems that IPv6 is intended to solve is the lack of Class B address space. T/F

True

TCP is a connection-oriented protocol. T/F

True

The problem with unstructured code in embedded system is that it can be hard to maintain. True/False

True

The unstructured code is called "spaghetti" code. T/F

True

When a computer uses paging, there must be a page table for every process. T/F

True

aggregatable global unicast address format of IPv6 helps keep the size of router tables under control. T/F

True

Shared memory MIMD machines can be divided into two categories _________ and _________.

UMA, NUMA

What characteristic of RAM makes it unsuitable for permanent storage?

Volatile

Large computer systems use an intelligent type of DMA interface known as:

an I/O channel

Solid state drives:

are built using flash memory

Buses that require handshakes to take place every time the bus is accessed are called:

asynchronous buses

"Locality of reference" refers to:

clustering of memory references

The sole purpose of IP is to________.

correctly route diagrams across the network

When obsolete routes can persist in the routing tables, packets can be misrouted or lost. This problem is known as the ______ problem.

count-to-infinity

The computation sequence of a dataflow computer can be understood by examining its:

dataflow graph

Memory segmentation can result in____ fragmentation, which paging can result in _____ fragmentation.

external, internal

Information can be retrieved fastest from:

hard disk

When the requested data resides in a given level of memory, we call this a:

hit

The tag field of a main memory address is used to determine:

if the cache entry is the desired block

The first internetwork provided protocol translations for different systems including

interface message processors

A major advantage of direct mapped cache is its simplicity and ease of implementation. The main disadvantage of direct mapped cache is:

its performance is degraded if two or more blocks that map the same location are used alternately

Lineal spaces between the pits in a CD-ROM are called:

lands

It would be very easy for the computer buyer if there were some way to classify systems according to a _______.

metric

Cache memory is effective because:

of the principle of locality

(A) ____ is a precursor to modern operating systems that allowed programs to be processed without human interaction

resident monitor

Upon detecting an error, the ISO/OSI layer that requests transmission of a PDU is the_____layer.

session

Specially designed hardware units, known as __________, monitor inconsistencies in caches in a multiprocessor system.

snoopy cache controllers

The extra line used for synchronization in parallel data transmission is called a:

strobe

Cache memory is typically positioned between:

the CPU and RAM

The purpose of a TLB is

to cache page table entries

Cache replacement policies are necessary:

to determine which block in cache should be the victim block


संबंधित स्टडी सेट्स

Lesson 3 Affordable Care Act (ACA)

View Set

สังคม ข้อสอบ

View Set

Wong's CH 30: End of Chapter NCLEX Review Q's

View Set

Business Analyst Certificate Week One

View Set

Chapter 6 Micro Physical Nutrition and Growth of Bacteria

View Set