Beruflich Dokumente
Kultur Dokumente
4. What is a program?
A set of instructions for solving a particular problem is called a program.
8. Define RAM.
RAM stands for Random Access Memory, which is used to store program and data. It is very
faster.
9. What is the function of memory unit? How will you classify it?
Memory unit is used to store programs and data. There are two classes of storage namely
primary and secondary
62. What are the four basic types of operations that needed to be supported by an instructor
set?
The basic types of operations are:
(i) Data transfer between memory and the processor register.
(ii) Arithmetic and logic operations on Data.
(iii) Program sequencing and control.
(iv) I/O transfer.
64. Consider a two level indirection instruction such as MOV A,[Ind], where Ind points to the
memory location that contains the address of the operand that needs to be moved to
register A. Give an application of such two level indirection.
Handling of pointers is easy with indirection. With two level indirections, it becomes easier
to handle pointer of pointers and makes implementation of pointer manipulations easy.
65. What are condition codes? Can a processor be designed without any condition code?
Explain.
Condition codes are 1-bit flags that store the information regarding the results of various
operations. These are made use of by subsequent conditional branch instructions.
They give an elegant way of handling conditional control flow. A processor may be designed
without condition codes, but it must have some other means of handling change in flow control -
may be instructions like Compare and Branch if equal to zero
66. Discuss the stored program concept. What are its advantages and disadvantages?
Programs are stored in the main memory. The processor will fetch and execute the
instructions in sequence.
Advantage: It facilitates the programming process.
Disadvantage: The instructions can be modified themselves during program execution. Hence,
writing, debugging programs will be difficult and error prone.
67. Define the terms software compatibility and hardware compatibility. What role have they
played in the evolution of computers?
Software Compatibility: Instruction set will be same for more than one machine.
Hardware compatibility: Same hardware components are used to build up one machine.
17. Give the IEEE standard for floating point numbers for single precision and double
precision number.
23. In floating point numbers when so you say that an underflow or overflow has occurred?
In single precision numbers when an exponent is less than – 126 then we say that an
underflow has occurred. In single precision numbers when an exponent is greater than + 127 then we
say that an overflow has occurred.
24. Give the logic expression for sum and carry out functions for adding equally weighted bits
xi. and yi in two numbers x and y.
S i = x i y i c i + x i y i c i + x i y i ci + xi y i c i = xi ⊕ y i ⊕ c i
C i +1 = y i ci + xi ci + xi y i
25. When does an overflow occur?
Overflow can occur when the signs of two operands are the same. It obviously occurs if the
sign of the result is different. A circuit to detect overflow can be added to the n-bit adder by
implementing the logic expression.
8. An instruction can be executed by performing one or more operations in, some specified
sequence. What are those operations?
• Transfer a word of data from one processor register to another or to the ALU
• Perform an arithmetic or a logic operation and store the result in a processor register.
• Fetch the contents of a given memory location and load them into a processor register.
• Store a word of data from a processor register into a given memory location.
9. What are the steps accomplished when we wish to transfer the contents of register RI to
register R4?
• Enable the output of register R1 by setting R1 out to 1. This places the contents of R1 on
the processor bus.
• Enable the input of register, R4 by setting R4 into 1. This loads data from the processor
bus into register R4.
10. Define ALU.
ALU stands for Arithmetic and Logic Unit. It is a combinational circuit that has no internal
storage. It performs arithmetic and logic operations on two operands applied as the input.
11. What are the actions needed to execute the instruction ADD (R1) R2?
To execute the instruction ADD (R2) R1, the steps followed are:
13. How will you determine the required control signals for hardwired control?
For hardwired control, the required control signals are determined by,
• Contents of the control step counter
• Contents of the instruction register
• Contents of the condition code flags
• External input signals, such as MFC and interrupt requests.
15. What is the difference between hard wired and micro programmed control unit?
19. List any two situations where a PC is not incremented every time a new micro instruction is
fetched.
• When a new instruction is loaded into the IR, the PC is loaded with the starting address of the
micro routine for that instruction.
• When a branch instruction is encountered and the branch condition is satisfied, the PC is
loaded with the branch address.
20. Define vertical organization.
It is used to specify only a small number of control functions in each macro instruction are
referred to as a vertical organization
22. Why does vertical micro programming organization result in slower operating speeds?
Because more micro instructions are needed to perform the desired control functions.
24. What are the alternatives for the bit-OR ing technique?
• Use the two conditional branch micro instructions at certain locations.
• To include two next address fields within a branch micro instruction, one for the
direct and one for indirect addressing modes.
37 Faster operations can be achieved, by pre-fetching the next micro-instruction, while the
current one being executed. What are the complexities involved in pre-fetching micro-
instructions?
Whenever status flags need to be checked to determine the next address of the micro-
instruction, pre-fetching may get the incorrect instruction. More compllex hardware required to
correct for such cases.
7. Write short notes on READ, WRITE and REFRESH operation in DRAM? '
WRITE: To enable write R/W line is made LOW, which enables input buffer and disables
output buffer.
READ : To read data from the cell, the R/W line is made HIGH, which enables output buffer
and disables input buffer.
REFRESH: To enable refresh operation R/W line, ROW line and REFRESH line are made
HIGH.
PROM (Programmable ROM): The PROMs are one time programmable. Once programmed, the
information stored is permanent.
EPROM (Erasable PROM): Here, one erase the stored data in the EPROMs by exposing the chip
to ultraviolet light through its quartz window for 15 to 20 minutes.
EEPROM (Electrically EPROM): EEPROM allows selective erasing at the register level rather
than erasing all the information since the information can be
changed by using electrical signals. The EEPROM memory also
has a special chip erase mode by which entire chip can be erased in
10 ms. .
20. What is program locality and locality of reference and mention its types?
The prediction of next memory address from the current memory address is known as program
locality. It enables cache controller to get a block of memory instead of getting just a single address.
Many instructions in localized area of the program are executed repeatedly during some time
period, and the remainder of the program is accessed relatively infrequently. This is referred to as
locality of reference.
14. What are the elements needed for the cache design?
The elements needed for the cache design are
Cache size, Mapping function, Replacement algorithm, Write policy, Block size, and Number of
Caches
17. What is cache coherency and name the different approaches to prevent data inconsistency?
In multiprocessor systems, another bus master can take over control of the system bus. This bus
master could write data into a main memory blocks which are already held in the cache of another
processor. When this happens, the data in the cache no longer match those held in main memory
creating inconsistency. The different approaches to prevent data inconsistency are
Bus watching (snooping), Hardware transparency, Non-cacheable memory and Cache flushing.
21. What is address translation page fault routine, page fault and demand paging?
If the page required by the processor is not in the main memory, the page fault occurs and the
required page is loaded into main memory from the secondary storage memory by special routine
called page routine.
30. What are the two registers involved in data transfer between the memory and the
processor?
The registers used to transfer data are
MAR (Memory Address Register), MBR/MDR (Memory Buffer/Data Register)
31. Define rotational latency?
The time is consumed for the cell to reach the read write head for the data transfer to begin. The
average time for this movement to take place is the latency of the memory. In memories where
information rotates around a closed track is called the rotational latency.
32. Define seek time?
The time required to move the read write had to the proper track is called seek time.
33. What are called as the destructive read out and non destructive read out?
In some memories, the method of reading the memory destroys the stored information, this
phenomenon is called DRO. Memories in which, reading does not affect the stored data are called
NDRO.
38. What are the two ways in which the system using cache can proceed for a write operation?
• Write through protocol technique.
• Write - back or copy back protocol technique.
44. In many computers the Cache block size is in the range of 32 to 128 bytes. What would be
the main advantages and disadvantages of making the size of Cache blocks larger or
smaller?
Larger size cache would imply fewer misses if most of the data in the block are actually used,
and wasteful if much of the data are not used before the cache block is ejected from the cache.
Smaller size would mean more misses.
45. A two level memory (Ml, M2) has the access times tAl = 10-8 sec. and tA2 = 10-3 sec. What
must the hit ratio H be in order for the access efficiency to be at least 65% of its maximum
possible value?
0.65x10 −8 − 10 −3
Hit Ratio H =
10 −8 + 10 −3
3. Give the comparison between memory mapped I/O and I/O mapped I/O.
S.No Memory mapped I/O I/O Mapped I/O
1 Memory and Input/Output share the Processor provides separate address range
address range of address range of of address range for memory and I/O
processor. devices
2 Processor provides more address lines for Processor provides less address lines for
accessing memory. accessing Input/Output.
3 Memory control signals are used to I/O control signals are used to control
control read and write units I/O operations real/write
unit I/O operations
10. List down the arbitration schemes used in centralized bus arbitration approach.
• Daisy chaining.
• Polling method
• Independent Request.
11. Bring out the merits and demerits of Daisy chaining method.
Merits:
• It is simple and cheaper method.
• It requests the least number of lines and this number is independent of the number of
masters in the system.
Demerits:
• The propagation delay of bus grant signal is proportional to the number of masters in
the system. This makes arbitration time slow and hence limits the number of masters
in the system.
• The priority of the master is fixed by its physical location.
• Failure of any one master causes the whole system to fail.
21. What is the advantage and disadvantage of independent request bus arbitration method.
Advantage: Due to separate pain of bus request and bus grant signals, arbitration is fast and is
independent of the number of master in the system. .
Disadvantages: It requires more bus request and grant signals.
44. A computer has one delay slot. The instruction in this slot is always executed, but only on a
speculative basis. If a branch does not take place, the results of that instruction are
discarded. Suggest a way to implement program loops efficiently on this computer.
The instruction executed on a speculative basis should be one that is likely to be the correct
choice most often. Thus, the conditional branch should be placed at the end of the loop, with an
instruction from the body of the loop moved to the delay slot if possible. Alternatively, a copy of the
first instruction in the loop body can be placed in the delay slot and the branch address changed to
that of the second instruction in the loop.
45. RISC processors typically have all instructions of equal size. What is the advantage of such
a choice?
This makes the decoding easier, and hence faster. Fixed field decoders can be used.
48.What is meant by reliability? How is it defined for a series and parallel system?
Reliability : It is defined as the probability of a unit or system surviving (functioning
correctly) for a period of time t.
n
Serial System : Reliability is a product of the component reliabilities. R = ∏R
i =1
i
n
Parallel System: R = 1 - ∏ (1 − R )
i =1
i