CS 2810 Computer Architecture
What is the decimal equivalent of the signed integer 8596?
-1,430
What is the decimal equivalent of the 16-bit signed integer FACE?
-1330
What is the decimal signed integer equivalent of the hexadecimal number BEAD?
-16.723
What is the Decimal 16-bit Signed Integer Equivalent of Hex number B6B3?
-18,765
What is the decimal equivalent of the Signed Integer F895?
-1899
What is the decimal equivalent of the Signed Integer F852
-1966
What is the Decimal 16-bit Signed Integer Equivalent of Hex number A6B3?
-22,861
What is the decimal equivalent of the Signed Integer F052
-4014
Convert the floating point hexadecimal number C5948100 to decimal.
-4752.125
What is the hex equivalent of the signed integer 2658?
0A62
How many drives does RAID-3 use for parity information?
1
To what power of 10 prefix does "giga" refer?
1 Billion
To what power of 10 prefix does "micro" refer?
1 Millionth
What is the decimal 16-bit Signed Integer Equivalent of 3317
13,079
In the floating point number C732D200, what is the value of the Exponent. (Think, is there a difference between the exponent and the bias?)
142
In the hexadecimal floating point number 47C69200, what is the value of it's bias?
16
What is the Hex Signed Integer equivalent of 12854?
3236
What is the Signed Integer equivalent of the Hex number 7FFF?
32767
What is the hexadecimal equivalent of the signed integer 13,739?
35AB
What is the Hex equivalent of the 16-bit Signed Integer 18,765
494D
What is the decimal equivalent of EFCD16?
61389
What is the decimal equivalent of FACE16?
64206
What is the Hex equivalent of the signed integer -32760?
8008
What is the Hexadecimal equivalent of 3851210?
9670
What formula can you use to calculate the speedup of a system?
Amdahl's Law
What is the Hexadecimal floating point equivalent of -1234.125
C49A440
Convert the floating point decimal number -28765.75 to Hexadecimal.
C6E0BB80
An ______________ language processes one source statement at a time when producing a binary stream.
Compiled
In associative memory, such as cache, information is accessed by its _________.
Content
When the CPU switches between processes, it is called a ______________.
Context Switch
Which digit determines whether the signed integer number is positive or negative?
Digit with greatest place-value
What is the Hexadecimal 16-bit Signed Integer equivalent of -4,758?
ED6A
What is the Hex Signed Integer equivalent of the decimal number -1330?
FACE
ASCII utilizes syndrome's to detect errors. (T/F)?
False
Each bit in the computer typically has its own address. (T/F)?
False
Moore's Law states that "The density of transistors in an integrated circuit will double every four years." (T/F)?
False
Parity is able to compensate for multiple bit errors in the same data block. (T/F)?
False
Programmed I/O uses IRQ lines to notify the CPU of data. (T/F)?
False
Raid Level 0 provides for excellent data redundancy.
False
Synchronous busses must use a handshaking protocol.
False
The Von Neumann architecture allows multiple paths from main memory to the control unit of the CPU. (T/F)?
False
What is an ISA?
Instruction Set Architecture
RISC has ______________ instructions than a CISC architecture.
Less
Which RAID level gives the best failure protection?
Level 1
For caching to be effective, we are dependent upon the idea of _________?
Locality
The purpose of the Control Unit is to:
Monitor and direct the flow of instructions and data
Based on a given truth table, what logic is represented?
NA
Given the Boot Sector dump below, how many bytes per sector are there? (Hint: Number of Bytes per Sector is at offset 0Bh, and the length is 2.)
NA
Given the Boot Sector dump below, what is the number of sectors per track? (Hint: Number of sectors per track is at offset 18h, and the length is 2.)
NA
Given the root area dump below, what is the date for the file PROGRAMS? (Hint: The date is stored at offset 18h, and its length is 2. The bit pattern is: Year = 1980+Left 7, Month = Middle 4, Day = Right 5)
NA
Using the Hex Dump below, what is the 20-bit address for Interrupt 12h?
NA
Which Error Detection and Correction Scheme is able to compensate for Burst Errors?
Reed Solomon
In the memory hierarchy, which of the following is fastest.
Registers
The time it takes for sectors to come underneath the read/write heads is called:
Rotational Delay
Which of the Following is not one of the possible combinations resulting from Flynn's Taxonomy? (SISD, MIMD, MISD, SIMD, SMPP)
SMPP
Which is faster SRAM or DRAM?
SRAM
Which of the following is not part of the Central Processing Unit? (System Bus, Registers, CU, ALU)
System Bus
Amdahl's Law allows you to calculate the speed up of what?
The overall system
Anything that can be done with software can also be done with hardware. (T/F)?
True
Compile-time binding requires code to be loaded into the same location each time it is executed. (T/F)?
True
Dynamic Link Libraries (DLL's) allow us to share code between several programs without having to include a full copy of external module's code. (T/F)?
True
Hamming Codes are able to detect and correct errors. (T/F)?
True
The maximum number we can store in an UNSIGNED integer is 65535. (T/F)?
True
A ___________ allows us to emulate multiple physical computers through the use of a single computer.
Virtual Machine
If an architecture is byte addressable, and the instruction set architecture word size is larger than 1 byte we must address the issue of byte ________.
alignment
Embedded systems differ from general-purpose machines in that they:
carry out a limited set of tasks