CSA Final with answers

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

square[i][j] what is a miss rate

12.5%

28. How many generations semiconductor memory has been through, since 1970? (please write number)

13

square[i][j] number of writes that hit

224

square[j][i] number of writes that hit and miss

256

square[j][i] number of writes that miss

64

What is the description(s) of Transistors? A. A semiconductor device used to amplify electronic signals and electrical power. B. A semiconductor device used to switch electronic signals and electrical power. C. A semiconductor device used to amplify or switch electronic signals and electrical power. D. A semiconductor device used to reduce or switch electronic signals and electrical power. E. A semiconductor device used to reduce or combine electronic signals and electrical power.

A. A semiconductor device used to amplify electronic signals and electrical power. B. A semiconductor device used to switch electronic signals and electrical power. C. A semiconductor device used to amplify or switch electronic signals and electrical power.

12. Algorithm for Cache MISS: • Processor issues load request to cache -> Compare request address to cache tags and see if there is a match -> Read block of data from main memory -> Replace victim block in cache with new block -> return copy of data from cache o Processor issues load request to cache -> Read block of data from main memory -> return copy of data from cache o Processor issues load request to cache -> Replace victim block in cache with new block -> return copy of data from cache

o Processor issues load request to cache -> Compare request address to cache tags and see if there is a match -> Read block of data from main memory -> Replace victim block in cache with new block -> return copy of data from cache

79. At Critical Word First for Miss Penalty chose correct sequence of Basic Blocking Cache "Order of fill": o 0,1,2,3,4,5,6,7 o 3,4,5,6,7,0,1,2

• 0,1,2,3,4,5,6,7

66. Which digits are used in octal number system? o 0-7 o 0 and 1 o 0-9 o All digits

• 0-7

36. Which of the following is the right result for this operation: 11001+110001= o 10101010 o 10101110 o 01001010 o 01100110 o 10001010

• 01001010

37. Convert decimal 230 to the binary: o 011000110 o 011100110 o 101100110 o 011100110

• 011100110

41. How many issue queue used in Centralized Superscalar 2 and Exceptions? o 4 o 3 o 2 o 1

• 1

124. Systems alternate between two states of service with respect to an SLA: o 1. Service accomplishment, where the service is delivered as specified 2. Service interruption, where the delivered service is different from the SLA o 1. Service accomplishment, where the service is not delivered as specified 2. Service interruption, where the delivered service is different from the SLA o 1. Service accomplishment, where the service is not delivered as specified 2. Service interruption, where the delivered service is not different from the SLA o 1. Service accomplishment, where the service is delivered as specified 2. Service interruption, where the delivered service is not different from the SLA

• 1. Service accomplishment, where the service is delivered as specified 2. Service interruption, where the delivered service is different from the SLA

46. Which of the following is the result of the binary multiplication: 100010*100101= o 11011101010 o 10111101010 o 10010001010 o 10010101010 o 10011101010

• 10011101010

38. Convert binary 1100111 to decimal: o 103 o 100 o 95 o 130 o 110

• 103

30. Clock Frequency of SDRAM is equal to: o 200 o 600 o 300 o 166 o 156

• 166

56. Choose the years of the first generation computer architecture o 1958-1964 o 1964-1974 o 1974-present o 1945-1964 o 1945-1958

• 1945-1958

57. Choose the years of the second generation computer architecture o 1945-1958 o 1964-1974 o 1974-present o 1945-1964 o 1958-1964

• 1958-1964

42. How many issue queue used in Distributed Superscalar 2 and Exceptions: o 4 o 3 o 1 o 2

• 2

43. How many instructions used in Distributed Superscalar 2 and Exceptions? o 4 o 3 o 2 o 1

• 2

73. Into how many parts a program (or algorithm) which can be parallelized can be split up? o 3 o 4 o 5 o 2

• 2

105. How many size of Cache L2 is true approximately? : o 256 KB o 4 KB o 32 MB

• 256 KB

107. How many main levels of Cache Memory? o 3 o 2 o 6 o 8

• 3

129. How many access methods are there? o 3 o 2 o 4 o 5 o 6

• 3

190. How many policy conditions for deadlock to be possible are there? o 3 o 4 o 2 o 5 o 1

• 3

199. How many approaches of mutex implementation are there? o 3 o 4 o 2 o 5 o 1

• 3

209. How many categories of process management are there? o 3 o 2 o 4 o 5 o 1

• 3

106. How many size of Cache L3 is true approximately? : o 3 MB o 256 MB o 256 KB

• 3 MB

80. At Critical Word First for Miss Penalty chose correct sequence of Blocking Cache with Critical Word first "Order of fill": o 3,4,5,6,7,0,1,2 o 0,1,2,3,4,5,6,7

• 3,4,5,6,7,0,1,2

42. Convert hexadecimal value: DAD to decimal: o 3500 o 3501 o 4501 o 4500 o 3503

• 3501

43. Convert decimal value: 877 to hexadecimal: o 36D o 38A o 36B o 38C o 36A

• 36D

141. How many fields contains the entry in the ROB: o 4 o 5 o 6 o 3

• 4

179. How many deadlock recovery algorithms are there? o 4 o 3 o 2 o 5 o 1

• 4

34. How many number systems are exist? o 4 o 3 o 2 o 1 o 5

• 4

55. How many generations of computer architecture are there? o 4 o 3 o 2 o 1 o 5

• 4

61. How many number systems are there? o 1 o 2 o 3 o 4

• 4

123. The most companies spend only ____________ of their income on R&D, which includes all engineering. o 4% to 12% o 15% to 30% o 1% to 17% o 30% to 48%

• 4% to 12%

131. How many performance factors are there o 5 o 4 o 3 o 2 o 6

• 5

135. How many physical characteristics of disk systems are there? o 4 o 5 o 2 o 3 o 6

• 5

31. An instruction pipeline increases the performance of a processor by overlapping the processing of several different instructions. How many stages it is consist of: o 6 o 3 o 5 o 7 o 4

• 5

50. How many stages used in Superscalar (Pipeline)? o 5 o 4 o 6 o 7

• 5

47. Convert the binary value: 111011 to decimal o 59 o 58 o 56 o 60 o 69

• 59

123. How many elements of cache design are there? o 2 o 5 o 4 o 6 o 7

• 7

104. How many size of Cache L1 is true approximately? : o 8 KB o 256 KB o 2 MB

• 8 KB

12. The world's first general-purpose microprocessor. It was used in the first personal computer, the Altair. o 8070 o 8080 o 8086 o 8090

• 8080

127. A widely held rule of thumb is that a program spends __ of its execution time in only __ of the code. o 90% 10% o 50% 50% o 70% 30% o 89% 11%

• 90% 10%

169. Which symbol you should use to leave the variable uninitialized o ? o ! o @ o $

• ?

164. Choose the legal name(s) in assembly o @variable_name o variable? o variable&name o variable name o 1variable

• @variable_name • variable?

175. Choose the definition of stack segment in assembly o A block of memory to store a stack o All variable definitions o Contains a program's instructions

• A block of memory to store a stack

86. Choose the right formula for AMAT o AMAT = Hit time + Miss rate + Miss penalty o AMAT = Hit time * Miss rate + Miss penalty o AMAT = Hit time * Miss rate * Miss penalty o AMAT = Hit time + Miss rate * Miss penalty

• AMAT = Hit time + Miss rate * Miss penalty

120. For random-access memory, the time it takes to perform a read or write operation is called o Clock Rate o CPI o Access Time o Latency

• Access Time • Latency

227. For random-access memory, this is the time it takes to perform a read or write operation o Access time o Memory cycle time o Transfer rate o Performance o All of the above

• Access time

153. What is included into performance characteristic of computer memory systems? o Access time o Cycle Time o Transfer Rate o Word o Number of bytes o Number of words

• Access time • Cycle Time • Transfer Rate

136. Which of these concepts is NOT illustrated case study by Wen-mei W. Hwu and John W. Sias o Achievable ILP with software resource constraints o Limited ILP due to software dependences o Achievable ILP with hardware resource constraints o Variability of ILP due to software and hardware interaction

• Achievable ILP with software resource constraints

148. Choose the component of SSD for the following definition: Logic that performs the selection function across the flash memory components o Addressing o Flash Memory Components o Data buffer/cache o Controller o Error Correction

• Addressing

66. What is an ALAT? : o Advanced Load Address Table o Allocated Link Address Table o Allowing List Address Table o Addition Long Accessibility Table

• Advanced Load Address Table

174. Choose the definition of data segment in assembly o All variable definitions o A block of memory to store a stack o Contains a program's instructions

• All variable definitions

67. At VLIW Multi-Way Branches, which of this solution is true about problem: Long instructions provide few opportunities for branches: o Allow one instruction to branch multiple directions o Speculative operations that don't cause exceptions

• Allow one instruction to branch multiple directions

88. What is a RAID 1? o Also called mirroring or shadowing, there are two copies of every piece of data o It has no redundancy and is sometimes nicknamed JBOD, for "just a bunch of disks," although the data may be striped across the disks in the array o This organization was inspired by applying memory-style error correcting codes to disks

• Also called mirroring or shadowing, there are two copies of every piece of data

13. Which of the following laws deals with the potential speedup of a program using multiple processors compared to a single processor. o Moor's Law o Little's Law o Murphy's law o Amdahl's law

• Amdahl's law

15. Data Hazard: o An instruction depends on a data value produced by an earlier instruction o An instruction in the pipeline needs a resource being used by another instruction in the pipeline o Whether or not an instruction should be executed depends on a control decision made by an earlier instruction

• An instruction depends on a data value produced by an earlier instruction

14. Structural Hazard: o An instruction in the pipeline needs a resource being used by another instruction in the pipeline o An instruction depends on a data value produced by an earlier instruction o Whether or not an instruction should be executed depends on a control decision made by an earlier instruction

• An instruction in the pipeline needs a resource being used by another instruction in the pipeline

45. What is a ARF: o Architectural Register File o Architecture Relocation File o Architecture Reload File o Architectural Read File

• Architectural Register File

80. In which cache memory mapping technique any block from main memory can be placed anywhere in the cache? o Associative Mapping o Set Associative Mapping o Direct Mapping

• Associative Mapping

77. How a memory unit accessed by contents is called? o Associative Memory o Content Addressable Memory o Auxiliary Memory o Cache Memory o Virtual Memory

• Associative Memory • Content Addressable Memory

84. Which type of memory accessed via the input/output channels? o Main Memory o Cache Memory o Virtual Memory o Auxiliary Memory o Secondary Memory

• Auxiliary Memory • Secondary Memory

103. Little's Law and a series of definitions lead to several useful equations for "Length queue" -: o Average length of queue o Average number of tasks in service

• Average length of queue

40. Little's Law and a series of definitions lead to several useful equations for "Length queue" -: o Average length of queue o Average number of tasks in service

• Average length of queue

24. AMAT stands for: o Average memory access time o Automatic Message Accounting Transmitter o Asymptotic Mean Acquisition Time o Absolute memory access time

• Average memory access time

102. Little's Law and a series of definitions lead to several useful equations for "Length server" - : o Average number of tasks in service o Average length of queue

• Average number of tasks in service

39. Little's Law and a series of definitions lead to several useful equations for "Length server" - : o Average number of tasks in service o Average length of queue

• Average number of tasks in service

100. Little's Law and a series of definitions lead to several useful equations for "Time queue" - : o Average time per task in the queue o Average time to service a task; average service rate is 1/Time server traditionally represented by the symbol μ in many queuing texts o Average time/task in the system, or the response time, which is the sum of Time queue and Time server

• Average time per task in the queue

37. Little's Law and a series of definitions lead to several useful equations for "Time queue" - : o Average time per task in the queue o Average time to service a task; average service rate is 1/Time server traditionally represented by the symbol μ in many queuing texts o Average time/task in the system, or the response time, which is the sum of Time queue and Time server

• Average time per task in the queue

36. Little's Law and a series of definitions lead to several useful equations for "Time server" - : o Average time to service a task; average service rate is 1/Time server traditionally represented by the symbol μ in many queuing texts o Average time per task in the queue o Average time/task in the system, or the response time, which is the sum of Time queue and Time server

• Average time to service a task; average service rate is 1/Time server traditionally represented by the symbol μ in many queuing texts

99. Little's Law and a series of definitions lead to several useful equations for "Time server" - : o Average time to service a task; average service rate is 1/Time server traditionally represented by the symbol μ in many queuing texts o Average time per task in the queue o Average time/task in the system, or the response time, which is the sum of Time queue and Time server

• Average time to service a task; average service rate is 1/Time server traditionally represented by the symbol μ in many queuing texts

101. Little's Law and a series of definitions lead to several useful equations for "Time system" - : o Average time/task in the system, or the response time, which is the sum of Time queue and Time server o Average time to service a task; average service rate is 1/Time server traditionally represented by the symbol μ in many queuing texts o Average time per task in the queue

• Average time/task in the system, or the response time, which is the sum of Time queue and Time server

38. Little's Law and a series of definitions lead to several useful equations for "Time system" - : o Average time/task in the system, or the response time, which is the sum of Time queue and Time server o Average time to service a task; average service rate is 1/Time server traditionally represented by the symbol μ in many queuing texts o Average time per task in the queue

• Average time/task in the system, or the response time, which is the sum of Time queue and Time server

96. Select cache optimizations to reduce hit time (both basic and advanced) o Avoiding Address Translation during Cache Indexing o Small and Simple First-Level Caches o Way Prediction o Compiler Optimizations o Compiler-Controlled Prefetching

• Avoiding Address Translation during Cache Indexing • Small and Simple First-Level Caches • Way Prediction

9. Using this technique processor looks ahead in the instruction code fetched from memory and predicts which groups of instructions are likely to be processed next. o Branch prediction o Data flow analysis o Pipelining o Speculative execution

• Branch prediction

2. Controls the operation of the computer and performs its data processing functions: o Main memory o I/O o CPU o System interconnection

• CPU

68. What is time elapsed to program execution? o CPU Time o User time + OS Time o I/O waiting & Other programs o CPU Time + I/O waiting & Other programs

• CPU Time + I/O waiting & Other programs

75. Non-Blocking Cache Timeline for "Hit Under Miss" the sequence is -? o CPU time->Cache Miss->Hit->Stall on use->Miss Penalty->CPU time o CPU time-Cache Miss-Miss Penalty-CPU time o CPU time->Cache Miss->Miss->Stall on use->Miss Penalty->CPU time

• CPU time->Cache Miss->Hit->Stall on use->Miss Penalty->CPU time

76. Non-Blocking Cache Timeline for "Miss Under Miss" the sequence is -? o CPU time->Cache Miss->Miss->Stall on use->Miss Penalty->Miss Penalty->CPU time o CPU time-Cache Miss-Miss Penalty-CPU time o CPU time->Cache Miss->Hit->Stall on use->Miss Penalty->CPU time

• CPU time->Cache Miss->Miss->Stall on use->Miss Penalty->Miss Penalty->CPU time

74. Non-Blocking Cache Timeline for "Blocking Cache" the sequence is - ? o CPU time-Cache Miss-Miss Penalty-CPU time o CPU time->Cache Miss->Hit->Stall on use->Miss Penalty->CPU time o CPU time->Cache Miss->Miss->Stall on use->Miss Penalty->CPU time

• CPU time-Cache Miss-Miss Penalty-CPU time

85. Which type of memory stores frequently used data? o Main Memory o Virtual Memory o Auxiliary Memory o Secondary Memory o Cache Memory

• Cache Memory

125. Choose the element(s) of cache design o Tag o Latency o AMAT o Cache Size o Line Size o Number of Caches

• Cache Size • Line Size • Number of Caches

226. A state in which data requested for processing by a component or application is found in the cache memory o Cache hit o Cache miss o Cache set o Cache overwrites o Cache access time

• Cache hit

113. Choose the key characteristics of computer memory systems o Capacity o Performance o Organization o Instruction Fetch o Instruction Decode

• Capacity • Performance • Organization

186. Choose the correct answer for the following definition "A closed chain of processes exists, such that each process is blocked waiting for a resource held by another process in the set" o Circular wait o Mutual exclusion o No preemption o Hold and wait

• Circular wait

138. Which of these is NOT characteristics of recent highperformance microprocessors? o Color o Power o Functional unit capability o Clock rate

• Color

134. Choose the system attribute(s) by which the performance factors are influenced o Cache size o Unit of Transfer o Compiler Technology o Processor Implementation o Cache and memory hierarchy

• Compiler Technology • Processor Implementation • Cache and memory hierarchy

173. Choose the definition of code segment in assembly o Contains a program's instructions o A block of memory to store a stack o All variable definitions

• Contains a program's instructions

102. Choose hazard for the following definition: fetch cannot continue because it does not know the outcome of an earlier branch - special case of a data hazard o Control o Structural o Data

• Control

145. Choose the component of SSD for the following definition: provides SSD device level interfacing and firmware execution o Controller o Addressing o Data buffer/cache o Error correction o Flash memory components

• Controller

140. Choose the components of SSD o Controller o Addressing o Data buffer/cache o Data size o Memory hierarchy

• Controller • Addressing • Data buffer/cache

212. The time between pulses called? o Cycle time o Clock speed o Clock rate o Clock cycle

• Cycle time

67. What does CPI stand for? o Cycles Per Instruction o Clocks Per Instruction o Cycles Per Interface o Clocks Per Interface

• Cycles Per Instruction

101. Choose hazard for the following definition: an instruction cannot continue because it needs a value that has not yet been generated by an earlier instruction o Data o Structural o Control

• Data

149. Choose the component of SSD for the following definition: High speed RAM memory components used for speed matching and to increased data throughput o Data buffer/cache o Flash Memory Components o Addressing o Controller o Error Correction

• Data buffer/cache

10. Which technique helps to processor investigates which instructions are dependent on each other's results, or data, to create an optimized schedule of instructions o Branch prediction o Data flow analysis o Pipelining o Speculative execution

• Data flow analysis

183. Choose the correct approach for the following definition "involves making dynamic choices that guarantee prevention" o Deadlock avoidance o Deadlock prevention o Deadlock detection and recovery

• Deadlock avoidance

182. Choose the correct approach for the following definition "involves recognizing when deadlock has occurred, and trying to recover" o Deadlock detection and recovery o Deadlock avoidance o Deadlock prevention

• Deadlock detection and recovery

184. Choose the correct approach for the following definition "adopting a static policy that disallows one of the four conditions above" o Deadlock prevention o Deadlock detection and recovery o Deadlock avoidance

• Deadlock prevention

18. Bus lines can be separated into two generic types: o Dedicated o Centralized o Distributed o Multiplexed o Synchronous o Asynchronous

• Dedicated / • Multiplexed

92. At storage systems Gray and Siewiorek classify faults what does mean "Hardware faults"? : o Devices that fail, such as perhaps due to an alpha particle hitting a memory cell o Faults in software (usually) and hardware design (occasionally) o Mistakes by operations and maintenance personnel

• Devices that fail, such as perhaps due to an alpha particle hitting a memory cell

82. In which cache memory mapping technique any memory block is mapped to exactly one block in the cache? o Direct Mapping o Set Associative Mapping o Associative Mapping

• Direct Mapping

23. Reduce Miss Rate: High Associativity. Empirical Rule of Thumb: o Direct-mapped cache of size N has about the same miss rate as a two-way set- associative cache of size N/2 o If cache size is doubled, miss rate usually drops by about √2 o None of them

• Direct-mapped cache of size N has about the same miss rate as a two-way set- associative cache of size N/2

206. Choose the correct answer for the following definition "multiple processes on multiple systems" o Distributed processing o Multiprogramming o Multiprocessing

• Distributed processing

32. What does DDR stands for? o Double data rate o Dual data rate o Double data reaction o None of them

• Double data rate

135. When speculation is not perfect, it rapidly becomes energy inefficient, since it requires additional ___________ both for the incorrect speculation and for the resetting of the processor state o Dynamic power o Static power o Processing rate o Processor state

• Dynamic power

48. DRAM stands for: o Direct random access memory o Dynamic random accessible memory o Dynamical random access memory o Dynamic random access memory o Discrete random access memory

• Dynamic random access memory

145. Which Multiple-issue processors has not the hardware hazard detection: o EPIC o Superscalar(dynamic) o Superscalar(static) o Superscalar(speculative)

• EPIC

177. Which keyword you should use in order to define a constant in assembly language o EQU o DD o CONST o EQ o DW

• EQU

4. ENIAC stands for: o Electronical Numerical Integrator And Computer o Electronic Numerical Integration Analogue Computer o Electronic Numerical Integrator And Computer o Electronic Numerical Interaction And Calcuation

• Electronic Numerical Integrator And Computer

215. ENIAC stands for: o Electronic Numerical Integrator and Computer o Electronic Nuclear Integrator and Computer o Encapsulation Numerical Integrator and Commerce o Encapsulation Numerical Integrator and Computer o Electronic Numerical Integer and Computer

• Electronic Numerical Integrator and Computer

25. _____________ is a special purpose system that is used to perform one or few dedicated functions. o Distributed systems o Embedded systems o Ultra-Large-Scale Systems o Centralized systems o Ubiquitous systems

• Embedded systems

146. Choose the component of SSD for the following definition: Logic for error detection and correction o Error Correction o Addressing o Data buffer/cache o Controller o Flash memory components

• Error Correction

52. Speculating on Exceptions "Prediction mechanism" is - • Exceptions are rare, so simply predicting no exceptions is very accurate o Exceptions detected at end of instruction execution pipeline, special hardware for various exception types o Only write architectural state at commit point, so can throw away partially executed instructions after exception o None of them

• Exceptions are rare, so simply predicting no exceptions is very accurate

53. Speculating on Exceptions "Check prediction mechanism" is - o Exceptions detected at end of instruction execution pipeline, special hardware for various exception types o Exceptions are rare, so simply predicting no exceptions is very accurate o The way in which an object is accessed by a subject o None of them

• Exceptions detected at end of instruction execution pipeline, special hardware for various exception types

109. What is a "Kernel" in Cache Memory? o Execution or waiting for synchronization variables o Execution in the OS that is neither idle nor in synchronization access o Execution in user code

• Execution in the OS that is neither idle nor in synchronization access

111. What is a "Kernel" in Cache Memory? o Execution or waiting for synchronization variables o Execution in the OS that is neither idle nor in synchronization access o Execution in user code

• Execution in the OS that is neither idle nor in synchronization access

113. What is a "Kernel" in Cache Memory? o Execution or waiting for synchronization variables o Execution in the OS that is neither idle nor in synchronization access o Execution in user code

• Execution in the OS that is neither idle nor in synchronization access

108. What is a "Synchronization" in Cache Memory? o Execution in the OS that is neither idle nor in synchronization access o Execution in user code o Execution or waiting for synchronization variables

• Execution or waiting for synchronization variables

110. What is a "Synchronization" in Cache Memory? o Execution in the OS that is neither idle nor in synchronization access o Execution in user code o Execution or waiting for synchronization variables

• Execution or waiting for synchronization variables

112. What is a "Synchronization" in Cache Memory? o Execution in the OS that is neither idle nor in synchronization access o Execution in user code o Execution or waiting for synchronization variables

• Execution or waiting for synchronization variables

33. _____________ is the amount of time it takes the program to perform in seconds o Elapsed time o Overall time o Estimate time o Execution time o Process time

• Execution time

103. A technique used in advanced microprocessors where the microprocessor begins executing a first instruction before the second has been completed is called pipelining o True o False

• False

107. In execution stage identification of the operation is performed o True o False

• False

116. The "natural" unit of organization of memory is called block o True o False

• False

117. After implementing embedded systems, you can easily use them for another purposes o True o False

• False

118. Digital circuits are inflexible and slower, because they are technology dependent o True o False

• False

126. There are three types of cache addresses o True o False

• False

127. There are two types of mapping functions o True o False

• False

128. We can find needed block in associatively mapped cache by its block address o True o False

• False

142. SSDs are susceptible to mechanical wear o True o False

• False

143. SSDs are more susceptible to physical shock and vibration o True o False

• False

165. In two-operand instruction, the first operand is source and the second operand is destination o True o False

• False

166. An instruction may have one or more operands o True o False

• False

167. In assembly language you can express data only in binary and decimal o True o False

• False

178. In assembly statement name and comment are mandatory o True o False

• False

180. There are 3 approaches of deadlock avoidance o True o False

• False

185. There are 4 approaches of dealing with deadlock o True o False

• False

197. When using semaphores, processes communicate using messages o True o False

• False

202. In concurrency, locating programming errors can't be difficult, because the contexts in which errors occur cannot always be reproduced easily o True o False

• False

204. Concurrency offers genuine simultaneous execution o True o False

• False

205. Parallelism is interleaving of processes in time to give the appearance of simultaneous execution o True o False

• False

214. Measures such as MIPS and MFLOPS have proven adequate to evaluating the performance of processors. o False o True

• False

230. Moore's law: "The cost of a chip has remained virtually unchanged during this period of rapid growth in density. This means that the cost of computer logic and memory circuitry has increasing at a dramatic rate" o False o True

• False

231. Moore's law: "Because logic and memory elements are placed closer together on more densely packed chips, the electrical path length is shortened, decreasing operating speed" o False o True

• False

237. The L2 cache is faster and typically larger than the L1 cache, and the L3 cache is slower and typically larger than the L2 cache o False o True

• False

58. In 1976 Apple II computer model was released o True o False

• False

63. Four bits make octal digit o True o False

• False

64. Three bits make hexadecimal digit o True o False

• False

65. Octal and hexadecimal numbers are hard on use and conversion o True o False

• False

69. The execution time of a program clearly depends on the number of instructions o True o False

• False

70. The more clock rate of processor, the faster is processor o True o False

• False

74. The time interval is called a clock rate o True o False

• False

76. Static RAM has a reduced power consumption, and a large storage capacity o True o False

• False

79. ROM is the place in a computer where the operating system, application programs, and data in current use are kept. o True o False

• False

81. In LRU replacement algorithm, the block that is in the cache longest is replaced o True o False

• False

92. In virtual memory, memory can be used efficiently because a section of program always loaded o True o False

• False

93. The advantage of virtual memory is that it takes less time to switch between applications because of additional memory o True o False

• False

97. Physical address used by program, and which OS must translate into virtual address o True o False

• False

99. Pipelining can only be implemented on hardware o True o False

• False

93. At storage systems Gray and Siewiorek classify faults what does mean "Design faults"? : o Faults in software (usually) and hardware design (occasionally) o Devices that fail, such as perhaps due to an alpha particle hitting a memory cell o Mistakes by operations and maintenance personnel

• Faults in software (usually) and hardware design (occasionally)

85. In Non-Blocking Caches what does mean "Early restart"? o Fetch the words in normal order, but as soon as the requested word of the block arrives, send it to the processor and let the processor continue execution o Request the missed word first from memory and send it to the processor as soon as it arrives; let the processor continue execution while filling the rest of the words in the block

• Fetch the words in normal order, but as soon as the requested word of the block arrives, send it to the processor and let the processor continue execution

51. What is about Superscalar means "F-D-X-M-W"? o Fetch, Decode, Execute, Memory, Writeback o Fetch, Decode, Instruct, Map, Write o Fetch, Decode, Excite, Memory, Write o Fetch, Decode, Except, Map, Writeback

• Fetch, Decode, Execute, Memory, Writeback

47. What is a FSB? o Finished Store Buffer o Finished Stack Buffer o Finished Stall Buffer o Finished Star Buffer

• Finished Store Buffer

95. At storage systems Gray and Siewiorek classify faults what does mean "Environmental faults"? : o Fire, flood, earthquake, power failure, and sabotage o Faults in software (usually) and hardware design (occasionally) o Devices that fail, such as perhaps due to an alpha particle hitting a memory cell

• Fire, flood, earthquake, power failure, and sabotage

130. Choose the type(s) of auxiliary memory o Flash Memory o Optical Disk o Hard Drive o SSD o RAM

• Flash Memory • Optical Disk

147. Choose the component of SSD for the following definition: Individual NAND flash chips o Flash Memory Components o Addressing o Data buffer/cache o Controller o Error Correction

• Flash Memory Components

56. What is a FL? o Free List o Free Last o Free Leg o Free Launch

• Free List

129. Which of the following descriptions corresponds to static power? o Grows proportionally to the transistor count (whether or not the transistors are switching) o Proportional to the product of the number of switching transistors and the switching rate Probability o Proportional to the product of the number of switching transistors and the switching rate o All of the above

• Grows proportionally to the transistor count (whether or not the transistors are switching)

49. How is called the permanent physical defect when the memory cell or cells affected cannot reliably store data but become stuck at 0 or 1 or switch erratically between 0 and 1? o Soft error o Hard error o Hard failure o Soft failure o Epic failure

• Hard failure

95. Choose advanced cache optimizations o Giving Reads Priority over Writes o Larger Cache Size o Hardware Prefetching of Instructions and Data o Merging Write Buffer o Critical Word First and Early Restart

• Hardware Prefetching of Instructions and Data • Merging Write Buffer • Critical Word First and Early Restart

65. Speculative Execution, which of this solution is true about problem: Possible memory hazards limit code scheduling: o Hardware to check pointer hazards o Speculative operations that don't cause exceptions

• Hardware to check pointer hazards

60. Choose two types of models for a computing machine o Harvard architecture o Von Neumann architecture o Oxford architecture o Stanford architecture

• Harvard architecture / • Von Neumann architecture

137. Choose the physical characteristic(s) of disk systems o Disk system implementstion o Disk Size o Head Mechanism o Head Motion o Disk Portability

• Head Mechanism • Head Motion • Disk Portability

136. Choose the physical characteristic(s) of disk systems o Head Mechanism o Platters o Disk Size o Sides o Disk system implementstion

• Head Mechanism • Platters • Sides

53. Choose the feature(s) of second generation computer architecture o High level languages o Transistors o 2 Kb memory, 10 KIPS o 2 Mb memory, 5 MIPS o Different types of supported instructions

• High level languages / • Transistors

7. Average Memory Access Time is equal: o Hit Time * ( Miss Rate + Miss Penalty ) o Hit Time - ( Miss Rate + Miss Penalty ) o Hit Time / ( Miss Rate - Miss Penalty ) o Hit Time + ( Miss Rate * Miss Penalty )

• Hit Time + ( Miss Rate * Miss Penalty )

188. Choose the correct answer for the following definition "A process may hold some resources while waiting for others" o Hold and wait o Mutual exclusion o Circular wait o No pre-emption

• Hold and wait

22. Reduce Miss Rate: Large Cache Size. Empirical Rule of Thumb: o If cache size is doubled, miss rate usually drops by about √2 o Direct-mapped cache of size N has about the same miss rate as a two-way set- associative cache of size N/2 o None of them

• If cache size is doubled, miss rate usually drops by about √2

131. Which of the written below is NOT increase power consumption? o Increasing multithreading o Increasing performance o Increasing multiple cores o Increasing multithreading

• Increasing multithreading

86. A virus classification by target includes the following categories, What is a File infector? o Infects files that the operating system or shell consider to be executable o A typical approach is as follows o The key is stored with the virus o Far more sophisticated techniques are possible

• Infects files that the operating system or shell consider to be executable

132. Choose the performance factor(s) o Cache Size o Line Size o Instruction Count o Number of Processor Cycles o Mapping function o Latency

• Instruction Count • Number of Processor Cycles

133. Choose the performance factor(s) o Cache Size o Line Size o Instruction Count o Number of Processor Cycles o Number of memory references

• Instruction Count • Number of Processor Cycles • Number of memory references

104. Stage in which the instruction is fetched from memory and placed in the instruction register called o Memory read/write o Instruction Decode o Execution o Write Back o Instruction Fetch

• Instruction Fetch

44. Which of the following formula is true about Issue Queue for "Instruction Ready": o Instruction Ready = (!Vsrc0 || !Psrc0)&&(!Vsrc1 || !Psrc1)&& no structural hazards o Instruction Ready = (!Vsrc1 || !Psrc1)&&(!Vsrc0 || !Psrc1)&& no structural hazards o Instruction Ready = (!Vsrc0 || !Psrc1)&&(!Vsrc1 || !Psrc0)&& no structural hazards o Instruction Ready = (!Vsrc1 || !Psrc1)&&(!Vsrc0 || !Psrc0)&& no structural hazards

• Instruction Ready = (!Vsrc0 || !Psrc0)&&(!Vsrc1 || !Psrc1)&& no structural hazards

219. Employed to hold temporarily the right-hand instruction from a word in memory o Instruction buffer register (IBR) o Memory buffer register (MBR) o Memory address register (MAR) o Instruction register (IR) o Program counter (PC)

• Instruction buffer register (IBR)

213. A processor is driven by a clock with a constant frequency f or, equivalently, a constant cycle time t, where t = 1/f: o Instruction execution rate o Instruction execution cycle o Instruction execution time o Instruction execution period o None of the above

• Instruction execution rate

218. Contains the 8-bit opcode instruction being executed o Instruction register (IR) o Memory buffer register (MBR) o Memory address register (MAR) o Instruction buffer register (IBR) o Program counter (PC)

• Instruction register (IR)

60. Out-of-Order Control Complexity MIPS R10000 which element is not in Control Logic? o Integer Datapath o CLK o Free List o Address Queue

• Integer Datapath

154. What does IDE stand for?

• Integrated Development Environment

57. What is an IQ? o Issue Queue o Internal Queue o Interrupt Queue o Instruction Queue

• Issue Queue

87. What is a RAID 0? o It has no redundancy and is sometimes nicknamed JBOD, for "just a bunch of disks," although the data may be striped across the disks in the array o Also called mirroring or shadowing, there are two copies of every piece of data o This organization was inspired by applying memory-style error correcting codes to disks

• It has no redundancy and is sometimes nicknamed JBOD, for "just a bunch of disks," although the data may be striped across the disks in the array

146. Examples of EPIC: o Itanium o Pentium 4, MIPS R12K, IBM, Power5 o MIPS and ARM o TI C6x

• Itanium

75. What does LRU stand for? o Least Right Used o Last Recently User o Last Recently Used o Least Recently Used

• Least Recently Used

112. Choose the key characteristics of computer memory systems o Stalling o Unit of Transfer o Hazards o Location o Access Method

• Location • Unit of Transfer • Access Method

62. At VLIW by "performance and loop iteration" which time is longer? o Loop Unrolled o Software Pipelined

• Loop Unrolled

111. Floating point performance is expressed as o CPI o FLOPS o MIPS o MFLOPS

• MFLOPS

110. A common measure of performance for a processor is the rate at which instructions are executed, called o CPI o Clock Rate o MFLOPS o MIPS

• MIPS

147. Examples of superscalar(static): o MIPS and ARM o Pentium 4, MIPS R12K, IBM, Power5 o Itanium o TI C6x

• MIPS and ARM

91. What is a RAID 4? o Many applications are dominated by small accesses o Since the higher-level disk interfaces understand the health of a disk, it's easy to figure out which disk failed o Also called mirroring or shadowing, there are two copies of every piece of data

• Many applications are dominated by small accesses

124. Choose the element(s) of cache design o Tag o Latency o AMAT o Mapping Function o Replacement Algorithm o Number of Caches

• Mapping Function • Replacement Algorithm • Number of Caches

217. Specifies the address in memory of the word to be written from or read into the MBR o Memory address register (MAR) o Memory buffer register (MBR) o Instruction register (IR) o Instruction buffer register (IBR) o Program counter (PC)

• Memory address register (MAR)

216. Contains a word to be stored in memory or sent to the I/O unit, or is used to receive a word from memory or from the I/O unit o Memory buffer register (MBR) o Memory address register (MAR) o Instruction register (IR) o Instruction buffer register (IBR) o Program counter (PC)

• Memory buffer register (MBR)

225. The basic element of a semiconductor memory is: o Memory cell o Cache memory o RAM o DRAM o None of the above

• Memory cell

105. Which stage is responsible for storing and loading values to and from memory? o Instruction Fetch o Memory read/write o Instruction Decode o Execution o Write Back

• Memory read/write

193. In which of the following approaches there is no shared data? o Message passing o Mutual exclusion o Monitors o Semaphores

• Message passing

194. Choose the correct answer for the following definition "Synchronization between processes is defined by the blocking policy attached to the sending and receiving of messages" o Message passing o Mutual exclusion o Monitors o Semaphores

• Message passing

160. Choose the correct answer for the following characteristics: 1. Depend mainly on its peripherals 2. Used for a few dedicated functions 3. Usually used as a part of a larger system o Microcontroller o General purpose microprocessor

• Microcontroller

78. What does MAF? o Miss Address File o Map Address File o Memory Address File

• Miss Address File

77. What does mean MSHR? o Miss Status Handling Register o Map Status Handling Reload o Mips Status Hardware Register o Memory Status Handling Register

• Miss Status Handling Register

94. At storage systems Gray and Siewiorek classify faults what does mean "Operation faults"? : o Mistakes by operations and maintenance personnel o Devices that fail, such as perhaps due to an alpha particle hitting a memory cell o Faults in software (usually) and hardware design (occasionally)

• Mistakes by operations and maintenance personnel

94. Choose basic cache optimizations o Compiler-Controlled Prefetching o Nonblocking Caches o Small and Simple First-Level Caches o Multilevel Caches o Avoiding Address Translation during Cache Indexing

• Multilevel Caches • Avoiding Address Translation during Cache Indexing

90. Select cache optimizations to reduce miss penalty o Multilevel Caches o Giving Reads Priority over Writes o Way Prediction o Higher associativity

• Multilevel Caches • Giving Reads Priority over Writes

6. How the central termination point for data channels, the CPU, and memory is called. It schedules access to the memory from the CPU and data channels, allowing these devices to act independently. o Transistor o Multiplexor o Integrated circuit o Resistors o Capacitors

• Multiplexor

207. Choose the correct answer for the following definition "multiple processes on a system with multiple processors" o Multiprocessing o Multiprogramming o Distributed processing

• Multiprocessing

208. Choose the correct answer for the following definition "multiple processes on a system with a single processor" o Multiprogramming o Multiprocessing o Distributed processing

• Multiprogramming

189. Choose the correct answer for the following definition "Only one process may use a resource at one time" o Mutual exclusion o Circular wait o No preemption o Hold and wait

• Mutual exclusion

200. Choose the correct answer for the following definition "When one process is inside a critical section of code, other processes must be prevented from entering that section" o Mutual exclusion o Semaphores o Monitors o Message passing o Critical section

• Mutual exclusion

6. Cache MISS: o No Write Allocate, Write Allocate o Write Through, Write Back

• No Write Allocate, Write Allocate

187. Choose the correct answer for the following definition: "No process can be forced to release a resource" o No preemption o Mutual exclusion o Hold and wait o Circular wait

• No preemption

91. Select cache optimizations to increase the Cache Bandwidth o Nonblocking Caches o Multibanked Caches o Pipelined Cache Access o Multilevel Caches o Small and Simple First-Level Caches

• Nonblocking Caches • Multibanked Caches • Pipelined Cache Access

148. Examples of superscalar(dynamic) : o None at the present o Pentium 4, MIPS R12K, IBM, Power5 o MIPS and ARM o TI C6x

• None at the present

71. CPU Time = I * CPI / R. Which parameter requires special profiling software? o Cycles Per instruction o Clock Rate o Numbers of instructions o Execution time

• Numbers of instructions

54. Choose the feature(s) of fourth generation computer architecture o Wide spread use of data communications o Use of cache memory o Smallest in size o Use of drum memory or magnetic core memory o Object-Oriented programming

• Object-Oriented programming • Wide spread use of data communications • Smallest in size

83. Storage Systems, "Higher associativity to reduce miss rate" - o Obviously, increasing associativity reduces conflict misses o The obvious way to reduce capacity misses is to increase cache capacity o The simplest way to reduce the miss rate is to take advantage of spatial locality and increase the block size

• Obviously, increasing associativity reduces conflict misses

89. Choose the definition for conflict misses o Occurs if the block placement strategy is not fully associative o Occurs if the cache cannot contain all the blocks needed during execution of a program o The very first access to a block cannot be in the cache

• Occurs if the block placement strategy is not fully associative

88. Choose the definition for capacity misses o Occurs if the cache cannot contain all the blocks needed during execution of a program o The very first access to a block cannot be in the cache o Occurs if the block placement strategy is not fully associative

• Occurs if the cache cannot contain all the blocks needed during execution of a program

54. Speculating on Exceptions "Recovery mechanism" is - o Only write architectural state at commit point, so can throw away partially executed instructions after exception o Exceptions are rare, so simply predicting no exceptions is very accurate o An entity capable of accessing objects o None of them

• Only write architectural state at commit point, so can throw away partially executed instructions after exception

19. PCI stands for: o Power Control Interface o Peripheral component interconnect o Property Casualty Insurers o Programmable Communications Interface

• Peripheral component interconnect

191. What is the deadlock? o Permanent blocking of a set of processes that either compete for global resources or communicate with each other o Interleaving of processes in time to give the appearance of simultaneous execution o When one process is inside a critical section of code, other processes must be prevented from entering that section o Processes "communicate" via global counters that are initialized to a positive integer and that can be accessed only through two atomic operations

• Permanent blocking of a set of processes that either compete for global resources or communicate with each other

48. What is a PRF? o Physical Register File o Pending Register File o Pipeline Register File o Pure Register File

• Physical Register File

114. Choose the key characteristics of computer memory systems o Physical Type o Physical Characteristics o Access Method o Unit of Transfer o Performance

• Physical Type • Physical Characteristics • Access Method • Unit of Transfer • Performance

235. Processor can simultaneously work on multiple instructions. How this technique called? o Pipelining o Branch prediction o Data flow analysis o Speculative execution o None of the above

• Pipelining

8. Which technique allows to processor simultaneously work on multiple instructions? o Branch prediction o Data flow analysis o Pipelining o Speculative execution

• Pipelining

137. What is a hash table? o Popular data structure for organizing a large collection of data items so that one can quickly answer questions o Popular data structure for updating large collections, so that one can hardly answer questions o Popular tables for organizing a large collection of data structure o Popular data structure for deletingsmall collections of data items so that one can hardly answer questions

• Popular data structure for organizing a large collection of data items so that one can quickly answer questions

11. Algorithm for Cache HIT: o Processor issues load request to cache -> Replace victim block in cache with new block -> return copy of data from cache o Processor issues load request to cache -> Read block of data from main memory -> return copy of data from cache o Processor issues load request to cache -> Compare request address to cache tags and see if there is a match -> return copy of data from cache

• Processor issues load request to cache -> Compare request address to cache tags and see if there is a match -> return copy of data from cache

220. Contains the address of the next instruction pair to be fetched from memory o Program counter (PC) o Memory buffer register (MBR) o Memory address register (MAR) o Instruction register (IR) o Instruction buffer register (IBR)

• Program counter (PC)

130. Which of the following descriptions corresponds to dynamic power? o Proportional to the product of the number of switching transistors and the switching rate o Grows proportionally to the transistor count (whether or not the transistors are switching) o Certainly a design concern o None of the above

• Proportional to the product of the number of switching transistors and the switching rate

33. What is kernel process? o Provide at least two modes, indicating whether the running process is a user process or an operating system process o Provide at least five modes, indicating whether the running process is a user process or an operating system process o Provide a portion of the processor state that a user process can use but not write o None of them

• Provide at least two modes, indicating whether the running process is a user process or an operating system process

78. Choose the access method(s) o Parallel Access o Indirect Access o Random Access o Direct Access o Sequential Access

• Random Access • Direct Access • Sequential Access

108. Choose data dependences o Read-After-Read o Read-After-Write o Write-After-Write o Write-After-Read

• Read-After-Write • Write-After-Write • Write-After-Read

224. RAID stands for o Redundant Array Independent Disk o Random Access Integral Disk o Redundant Access Integral Disk o Random Array Independent Disk o Redundant Access Independent Disk

• Redundant Array Independent Disk

138. What does RAID stand for? o Random Array of Independent Disks o Redundant Array of Independent Disks o Redundant Array of Interoperable Disks o Random Access to Independent Disks

• Redundant Array of Independent Disks

59. Out-of-Order Control Complexity MIPS R10000 which element is in Control Logic? o Register name o Instruction cache o Data tags o Data cache

• Register name

3. What provides storage internal to the CPU? o Registers o Arithmetic and logic unit o CPU interconnection o Control unit

• Registers

55. What is a RT? o Rename Table o Recall Table o Relocate Table o Remove Table

• Rename Table

46. What is a ROB? o Reorder Buffer o Read Only Buffer o Reload Buffer o Recall Buffer

• Reorder Buffer

84. In Non-Blocking Caches what does mean "Critical Word First"? o Request the missed word first from memory and send it to the processor as soon as it arrives; let the processor continue execution while filling the rest of the words in the block o Fetch the words in normal order, but as soon as the requested word of the block arrives, send it to the processor and let the processor continue execution

• Request the missed word first from memory and send it to the processor as soon as it arrives; let the processor continue execution while filling the rest of the words in the block

49. What is a SB? o Scoreboard o Scorebased o Scaleboard o Scalebit

• Scoreboard

151. How external nonvolatile memory is called? o Secondary memory o Main memory o Cache memory o Virtual memory

• Secondary memory

152. What is included into physical type characteristic of computer memory systems? o Semiconductor o Magnetic o Word o Access Time o Number of bytes

• Semiconductor • Magnetic

228. Memory is organized into units of data, called records; access must be made in a specific linear sequence o Sequential access o Word o Addressable units o Unit of transfer o Direct access

• Sequential access

20. The methods of accessing units of data: o Sequential access o Pseudo access o Direct access o Indirect access o Single access o Random access o Associative access

• Sequential access / • Direct access / • Associative access / • Random access

83. In which cache memory mapping technique any memory block mapped to subset of cache locations? o Set Associative Mapping o Direct Mapping o Associative Mapping

• Set Associative Mapping

90. What is a RAID 3? o Since the higher-level disk interfaces understand the health of a disk, it's easy to figure out which disk failed o Many applications are dominated by small accesses o Also called mirroring or shadowing, there are two copies of every piece of data

• Since the higher-level disk interfaces understand the health of a disk, it's easy to figure out which disk failed

223. The use of the _______ defines the third generation of computers. o Small and medium-scale integration o Transistor o Vacuum tube o Large-scale integration o Very-large-scale integration

• Small and medium-scale integration

50. How is called a random, nondestructive event that alters the contents of one or more memory cells without damaging the memory? o Soft error o Hard error o Hard failure o Soft failure o Epic failure

• Soft error

63. At VLIW by "performance and loop iteration" which time is shorter? o Software Pipelined o Loop Unrolled

• Software Pipelined

144. SSD stands for o Solid State Drive o Solid State Driver o Speed State Drive o Speed State Driver

• Solid State Drive

11. This technique enables the processor to keep its execution engines as busy as possible by executing instructions that are likely to be needed. o Branch prediction o Data flow analysis o Pipelining o Speculative execution

• Speculative execution

64. At VLIW Speculative Execution, which of this solution is true about problem: Branches restrict compiler code motion? o Speculative operations that don't cause exceptions o Hardware to check pointer hazards

• Speculative operations that don't cause exceptions

41. What measures the ability of a computer to complete a single task? o Clock rate o Speed metric o Clock speed o Clock cycle o Execution speed

• Speed metric

23. Amdahl's law: o Speed up= 1/(1 + f ) * f/N o Speed up= 1/(1 - f ) * f/N o Speed up= 1/(1 - f ) - f/N o Speed up= 1/(1 - f ) + f/N o Speed up= 1/(1 + f ) + f/N

• Speed up= 1/(1 - f ) + f/N

128. (Performance for entire task using the enhancement when possible) / (Performance for entire task without using the enhancement) is equals to: o Speedup o Efficiency o Probability o Ration

• Speedup

134. If speculation were perfect, it could save power, since it would reduce the execution time and save _____________, while adding some additional overhead to implement o Static power o Dynamic power o Processing rate o Processor state

• Static power

100. Choose hazard for the following definition: different instructions in different stages (or the same stage) conflicting for the same resource o Structural o Data o Control

• Structural

44. How we call the thing that is connects major computer components (processor, memory, I/O)? o System connector o System controllers o System bus o System interconnector

• System bus

149. Examples of VLIW/LIW: o TI C6x o MIPS and ARM o Itanium o Pentium 4, MIPS R12K, IBM, Power5

• TI C6x

29. What is the cycle time? o The minimum time between requests to memory. o Time between when a read is requested and when the desired word arrives o The maximum time between requests to memory. o None of them

• The minimum time between requests to memory.

196. In atomic operations semSignal(x) and semWait(x), what is the 'x'? o The number of processes that can execute critical section o The number of processes o The number of monitors o No correct answer

• The number of processes that can execute critical section

132. Growing performance gap between peak and sustained performance translates to increasing energy per unit of performance, when: o The number of transistors switching will be proportional to the peak issue rate, and the performance is proportional to the sustained rate o The number of transistors switching will be proportionalto the sustained rate, and the performance is proportionalto the peak issue rate o The number of transistors switching will be proportional to the sustained rate o The performance is proportional to the peak issue rate

• The number of transistors switching will be proportional to the peak issue rate, and the performance is proportional to the sustained rate

82. Storage Systems, "Bigger caches to reduce miss rate" - o The obvious way to reduce capacity misses is to increase cache capacity o Obviously, increasing associativity reduces conflict misses o The simplest way to reduce the miss rate is to take advantage of spatial locality and increase the block size

• The obvious way to reduce capacity misses is to increase cache capacity

81. Storage Systems, "Larger block size to reduce miss rate" - o The simplest way to reduce the miss rate is to take advantage of spatial locality and increase the block size o The obvious way to reduce capacity misses is to increase cache capacity o Obviously, increasing associativity reduces conflict misses

• The simplest way to reduce the miss rate is to take advantage of spatial locality and increase the block size

34. If we talk about storage systems an interaction or transaction with a computer is divided for first what is an "System response time" - ?: o The time between when the user enters the command and the complete response is displayed o The time for the user to enter the command o The time from the reception of the response until the user begins to enter the next command

• The time between when the user enters the command and the complete response is displayed

97. If we talk about storage systems an interaction or transaction with a computer is divided for first what is an "System response time" - ?: o The time between when the user enters the command and the complete response is displayed o The time for the user to enter the command o The time from the reception of the response until the user begins to enter the next command

• The time between when the user enters the command and the complete response is displayed

96. If we talk about storage systems an interaction or transaction with a computer is divided for first what is an "Entry time" - ? : o The time for the user to enter the command o The time between when the user enters the command and the complete response is displayed o The time from the reception of the response until the user begins to enter the next command

• The time for the user to enter the command

35. If we talk about storage systems an interaction or transaction with a computer is divided for first what is an "Think time" - ?: • The time from the reception of the response until the user begins to enter the next command o The time for the user to enter the command o The time between when the user enters the command and the complete response is displayed

• The time from the reception of the response until the user begins to enter the next command

98. If we talk about storage systems an interaction or transaction with a computer is divided for first what is an "Think time" - ?: o The time from the reception of the response until the user begins to enter the next command o The time for the user to enter the command o The time between when the user enters the command and the complete response is displayed

• The time from the reception of the response until the user begins to enter the next command

87. Choose the definition for compulsory misses o Occurs if the cache cannot contain all the blocks needed during execution of a program o Occurs if the block placement strategy is not fully associative o The very first access to a block cannot be in the cache

• The very first access to a block cannot be in the cache

89. What is a RAID 2? o This organization was inspired by applying memory-style error correcting codes to disks o It has no redundancy and is sometimes nicknamed JBOD, for "just a bunch of disks," although the data may be striped across the disks in the array o Also called mirroring or shadowing, there are two copies of every piece of data

• This organization was inspired by applying memory-style error correcting codes to disks

28. What is the access time? o Time between when a read is requested and when the desired word arrives o The minimum time between requests to memory. o Describes the technology inside the memory chips and those innovative, internal organizations o None of them

• Time between when a read is requested and when the desired word arrives

52. Choose the feature(s) of third generation computer architecture o Object-Oriented programming o Floating point arithmetic o Graphics o Timesharing o Use of cache memory

• Timesharing / • Use of cache memory

140. For what the reorder buffer is used : o To pass results among instructions that may be speculated. o To pass parameters through instructions that may be speculated o To get additional registers in the same way as the reservation stations o To control registers

• To pass results among instructions that may be speculated.

121. The rate at which data can be transferred into or out of a memory unit is called o Transfer time o Transfer Rate o MIPS o FLOPS o MFLOPS

• Transfer Rate

221. The use of the _______ defines the second generation of computers. o Transistor o Vacuum tube o Small and medium-scale integration o Large-scale integration o Very-large-scale integration

• Transistor

115. Word is the "natural" unit of organization of memory o True o False

• True

119. When using microprocessor based systems, it is enough to update the software o True o False

• True

122. The particular block is currently being stored is called tag o True o False

• True

139. The RAID scheme consists of 7 levels o True o False

• True

141. SSD is over 10 times faster than the spinning disks in HDD o True o False

• True

150. The basic element of a semiconductor memory is the memory cell o True o False

• True

162. The assembler translates names into memory addresses o True o False

• True

163. Name field of assembly statement is not case sensitive o True o False

• True

168. You should use a radix symbol in order to differentiate between binary, octal or hexadecimal o True o False

• True

170. In assembly language, you can skip the name of variable o True o False

• True

176. There is no memory allocated for constants in assembly language o True o False

• True

181. There are 2 policies of deadlock prevention o True o False

• True

192. Deadlock occurs when each process in the set is blocked awaiting an event that can be triggered only by another blocked process in the set o True o False

• True

195. Monitors are similar to classes in java and has methods and fields o True o False

• True

198. We can implement mutex through the OS or using programming languages o True o False

• True

201. In concurrency optimal allocation of resources is difficult o True o False

• True

203. In concurrency, sharing global resources safely is difficult o True o False

• True

232. Moore's law: "The computer becomes smaller, making it more convenient to place in a variety of environments" o True o False

• True

233. Moore's law: "There is a reduction in power and cooling requirements" o True o False

• True

234. Moore's law: "The interconnections on the integrated circuit are much more reliable than solder connections. With less circuitry on each chip, there are fewer interchip connections" o True o False

• True

236. The L2 cache is slower and typically larger than the L1 cache, and the L3 cache is slower and typically larger than the L2 cache o True o False

• True

35. Basic memory elements hold only two states: Zero / One o True o False

• True

59. IBM System/360 Model 91 was introduced in 1966 o True o False

• True

222. The use of the _______ defines the first generation of computers. o Vacuum tube o Transistor o Small and medium-scale integration o Large-scale integration o Very-large-scale integration

• Vacuum tube

51. Choose the feature(s) of first generation computer architecture o Magnetic core memory o Semiconductor memory o Machine code o Vacuum tubes o Assembly language

• Vacuum tubes / • Assembly language

61. What is "VLIW"? o Very Long Instruction Word o Very Less Interpreter Word o Very Light Internal Word o Very Low Invalid Word

• Very Long Instruction Word

. Expand the abbreviation VLSI o Very-large-scale integration o Very-little-scale integration o Very-large-scale interactions o Very-large-scale integrator

• Very-large-scale integration

22. What kind of memory type stores data using virtual addresses: o Logical o Virtual o Peripheral o Main o Buffer

• Virtual

159. Which of the following architectures differs by memory accessing? o Von Neumann o Harvard o Complex Instruction Set Computers o Reduced Instruction Set Computers

• Von Neumann • Harvard

133. If we want to sustain four instructions per clock o We must fetch more, issue more, and initiate execution on more than four instructions o We must fetch less, issue more, and initiate execution on more than two instructions o We must fetch more, issue less, and initiate execution on more than three instructions o We must fetch more, issue more, and initiate execution on less than five instructions

• We must fetch more, issue more, and initiate execution on more than four instructions

58. At VLIW "Superscalar Control Logic Scaling" which parameters are used? o Width and Lifetime o Width and Height o Time and Cycle o Length and Addition

• Width and Lifetime

229. The "natural" unit of organization of memory o Word o Sequential access o Addressable units o Unit of transfer o Direct access

• Word

106. How the stage in which the results of the operation are written to the destination register is called? o Instruction Fetch o Write Back o Instruction Decode o Execution o Memory read/write

• Write Back

21. Cache Hit - o Write Through - write both cache and memory, generally higher traffic but simpler to design o write cache only, memory is written when evicted, dirty bit per block avoids unnecessary write backs, more complicated o No Write Allocate - only write to main memory

• Write Through - write both cache and memory, generally higher traffic but simpler to design

5. Cache HIT: o No Write Allocate, Write Allocate o Write Through, Write Back

• Write Through, Write Back

17. What is a Bandwidth: o a is the number of accesses per unit time - If m instructions are loads/stores, 1 + m memory accesses per instruction, CPI = 1 requires at least 1 + m memory accesses per cycle o is time for a single access - Main memory latency is usually >> than processor cycle time o is amount of data that can be in flight at the same time (Little's Law)

• a is the number of accesses per unit time - If m instructions are loads/stores, 1 + m memory accesses per instruction, CPI = 1 requires at least 1 + m memory accesses per cycle

210. Operations performed by a processor, such as fetching an instruction, decoding the instruction, performing an arithmetic operation, and so on, are governed by: o a system clock o a system processor o a clock processor o a processor o a clock

• a system clock

116. Total amount of work done in a given time ,such as megabytes per second for disk transfer... o bandwidth o latency o throughput o performance

• bandwidth

62. How a binary digit is called? o byte o digit o kilobyte o bit

• bit

25. Exploit spatial locality: o by fetching blocks of data around recently accessed locations o by remembering the contents of recently accessed locations o None of them

• by fetching blocks of data around recently accessed locations

24. Exploit temporal locality: o by remembering the contents of recently accessed locations o by fetching blocks of data around recently accessed locations o None of them

• by remembering the contents of recently accessed locations

69. What is a Capacity? o cache is too small to hold all data needed by program, occur even under perfect replacement policy o first-reference to a block, occur even with infinite cache o misses that occur because of collisions due to less than full associativity

• cache is too small to hold all data needed by program, occur even under perfect replacement policy

9. Capacity - o cache is too small to hold all data needed by program, occur even under perfect replacement policy (loop over 5 cache lines) o misses that occur because of collisions due to less than full associativity (loop over 3 cache lines) o first-reference to a block, occur even with infinite cache

• cache is too small to hold all data needed by program, occur even under perfect replacement policy (loop over 5 cache lines)

20. Least Recently Used (LRU): o cache state must be updated on every access o Used in highly associative caches o FIFO with exception for most recently used block(s)

• cache state must be updated on every access

118. Products that are sold by multiple vendors in large volumes and are essentialy identical o commodities o boxes o folders o files

• commodities

17. What is used to manage the access to and the use of the data and address lines? o address bus o control lines o memory write o bus grant o address lines

• control lines

139. How this process called: "Operations execute as soon as their operands are available" o data flow execution o instruction execution o data control execution o instruction field execution

• data flow execution

39. A single, self-contained transistor is called ________. o integrated circuit o microchip o discrete component o single transistor o small-scale integration

• discrete component

120. For CMOS chips, the traditional dominant energy consumption has been in switching transistors, called ____ o dynamic power o physical energy o constant supply o simple battery

• dynamic power

119. Integrated circuit processes are charecterized by the o feature size o permanent size n o compex size o fixed size

• feature size

68. What is a Compulsory? o first-reference to a block, occur even with infinite cache o cache is too small to hold all data needed by program, occur even under perfect replacement policy o misses that occur because of collisions due to less than full associativity

• first-reference to a block, occur even with infinite cache

8. Compulsory - o cache is too small to hold all data needed by program, occur even under perfect replacement policy (loop over 5 cache lines) o first-reference to a block, occur even with infinite cache o misses that occur because of collisions due to less than full associativity (loop over 3 cache lines)

• first-reference to a block, occur even with infinite cache

10. Conflict - o first-reference to a block, occur even with infinite cache o misses that occur because of collisions due to less than full associativity (loop over 3 cache lines) o cache is too small to hold all data needed by program, occur even under perfect replacement policy (loop over 5 cache lines)

• first-reference to a block, occur even with infinite cache (NOT CORRECT!!!)

40. GPU stands for: o graphical processing unit o graphical performing units o graphics processing units o graphics processing utility

• graphics processing units

15. The processor responds by suspending operation of the current program, branching off to a program to service that particular I/O device, known as _________________, and resuming the original execution after the device is serviced. Which of the following will be the missing word: o interrupt handler o interrupt cycle o disabled interrupt o interrupt request

• interrupt handler

18. What is a Bandwidth-Delay Product: o is amount of data that can be in flight at the same time (Little's Law) o is time for a single access - Main memory latency is usually >> than processor cycle time o is the number of accesses per unit time - If m instructions are loads/stores, 1 + m memory accesses per instruction, CPI = 1 requires at least 1 + m memory accesses per cycle

• is amount of data that can be in flight at the same time (Little's Law)

19. What is Computer Architecture? o is the design of the abstraction/implementation layers that allow us to execute information processing applications efficiently using manufacturing technologies o is a group of computer systems and other computing hardware devices that are linked together through communication channels to facilitate communication and resource-sharing among a wide range of users o the programs used to direct the operation of a computer, as well as documentation giving instructions on how to use them

• is the design of the abstraction/implementation layers that allow us to execute information processing applications efficiently using manufacturing technologies

1. What is a Latency: o is time for a single access - Main memory latency is usually >> than processor cycle time o is the number of accesses per unit time - If m instructions are loads/stores, 1 + m memory accesses per instruction, CPI = 1 requires at least 1 + m memory accesses per cycle o is amount of data that can be in flight at the same time (Little's Law)

• is time for a single access - Main memory latency is usually >> than processor cycle time

72. Select the correct interpretation(s) of Amdahl's Law o is used to compare computers' performance o is used calculate the execution time of a program o is used to find the maximum expected improvement o it means that it is the algorithm that decides the speedup not the number of processors

• is used to find the maximum expected improvement • it means that it is the algorithm that decides the speedup not the number of processors

143. Choose the steps of instruction execution: o issue, execute, write result, commit o execution, commit, rollback o issue, execute, override, exit o begin, write, interrupt, commit

• issue, execute, write result, commit

155. Choose the characteristics of CISC processors o large number of instructions o support many addressing modes o more elaborate way of accessing data o less number of instructions o instructions are of fixed length o few addressing modes

• large number of instructions • support many addressing modes • more elaborate way of accessing data

115. The time between the start and the completion of an event ,such as milliseconds for a disk access is... o latency o bandwidth o throughput o performance

• latency

156. Choose the characteristics of RISC processors o less number of instructions o large number of instructions o instructions are of fixed length o support many addressing modes o more elaborate way of accessing data o few addressing modes

• less number of instructions • instructions are of fixed length • few addressing modes

29. MIC stands for: o mini integrated core o many integrated core o main integrated core o many interaction core o main interaction core

• many integrated core

126. What MTTF means: o mean time to failure o mean time to feauture o mean this to failure o my transfers to failure

• mean time to failure

72. In Multilevel Caches "Global miss rate" equals = o misses in cache / CPU memory accesses o misses in cache / accesses to cache o misses in cache / number of instructions

• misses in cache / CPU memory accesses

71. In Multilevel Caches "Local miss rate" equals = o misses in cache / accesses to cache o misses in cache / CPU memory accesses o misses in cache / number of instructions

• misses in cache / accesses to cache

73. In Multilevel Caches "Misses per instruction" equals = o misses in cache / number of instructions o misses in cache / accesses to cache o misses in cache / CPU memory accesses

• misses in cache / number of instructions

70. What is a Conflict? o misses that occur because of collisions due to less than full associativity o first-reference to a block, occur even with infinite cache o cache is too small to hold all data needed by program, occur even under perfect replacement policy

• misses that occur because of collisions due to less than full associativity

2. What occurs at Instruction fetches when we speak about Common And Predictable Memory Reference Patterns? o n loop iterations o subroutine call o vector access

• n loop iterations

161. Choose the correct syntax of assembly statements o name operation operand(s) comments o operation name operand(s) comments o operation operand(s) name comments o comments name operation operand(s)

• name operation operand(s) comments

157. Choose the characteristics of Von Neumann architecture o one memory for data and program o CPU provides address to get data or instructions o data and instructions must have the same width o separate busses, can be accessed simultaneously o separated buses allow one instruction to execute while the next instruction is fetched o data and instructions mustn't have the same width

• one memory for data and program • CPU provides address to get data or instructions • data and instructions must have the same width

114. Network performance depends of what? o performance of swithes and transmission system o performance of switches o performance of transmission system o has no dependensies

• performance of swithes and transmission system

98. Process of instruction execution is divided into two or more steps, called o pipelining o pipe stages o pipe segments o instruction execution o pipeline hazard

• pipe stages • pipe segments

16. What is the data line? o provide a path for moving data among system modules o is used to designate the source or destination of the data on the data bus o is used to control the access to and the use of the data and address lines o indicates that a module needs to gain control of the bus

• provide a path for moving data among system modules

211. Typically all operations performed by a processor begin with the: o pulse of the clock o pulse of the processor o it begins by itself o both of clock and processor pulse o none of the above

• pulse of the clock

122. Volume is a ________ key factor in determining cost. o second o first o fifth o third

• second

158. Choose the characteristics of Harvard architecture o separate program and data memories o separated buses allow one instruction to execute while the next instruction is fetched o data and instructions mustn't have the same width o one memory for data and program o CPU provides address to get data or instruction o data and instructions must have the same width

• separate program and data memories • separated buses allow one instruction to execute while the next instruction is fetched • data and instructions mustn't have the same width

109. Halting the flow of instructions until the required result is ready to be used is called o waiting o delaying o halting o stalling

• stalling

144. Which one is not the major flavor of Multiple-issue processors: o statistically superscalar processors o dynamically scheduled superscalar processors o statically scheduled superscalar processors o VLIW (very long instruction word) processors

• statistically superscalar processors

3. What occurs at Stack access when we speak about Common And Predictable Memory Reference Patterns? o subroutine call o n loop iterations o vector access

• subroutine call

142. Choose correct fields of entry in the ROB: • the instruction type, the destination field, the value field, and the ready field o the source type, the destination field, the value field, and the ready field o the program type, the ready field, the parameter field, the destination field o the instruction type, the destination field, and the ready field

• the instruction type, the destination field, the value field, and the ready field

121. Manufacturing costs that decrease over time are ____ o the learning curve o the cycled line o the regular option o the final loop

• the learning curve

13. The formula of "Iron Law" of Processor Performance: o time/program = instruction/program * (cycles/instruction)* time/cycle o time/program = instruction/program * (cycles/instruction) + time/cycle o time/program = instruction/program + (cycles/instruction) * time/cycle

• time/program = instruction/program * (cycles/instruction) * time/cycle

125. Desktop benchmarks divide into __ broad classes: o two o three o four o five

• two

171. Choose the correct syntax of variable declaration in assembly o variable_name type initial_value o type variable_name initial_vaule o variable_name type initial_value o type initial_value variable_name

• variable_name type initial_value

4. What occurs at Data access when we speak about Common And Predictable Memory Reference Patterns? o subroutine call o n loop iterations o vector access

• vector access

117. Learning curve itself is best measured by change in... o yeld o bytes o bits o seconds

• yeld


Set pelajaran terkait

Peds Neurologic Alterations 3 from Mom

View Set

quiz 1 Ch.1 & Ch.2 operating systems

View Set

BIOLOGY - UNIT 3: CELLS CELL DESIGN

View Set

CHAPTER 8 - SOCIOEMOTIONAL DEVELOPMENT IN EARLY CHILDHOOD

View Set

Statistics-Chapter 4 Study Questions

View Set

Data Quality Characteristics & stats

View Set

Midterm: chapters 1-7 Society the basics

View Set