You are on page 1of 16

Model Question Paper

Subject Code: BCA 2050

Book ID: B1642

Subject Name: Computer Organization


Credits: 4

Part A (Descriptive questions)

Marks: 140

(4*10 = 40 marks)

1. What is RAID technology? What are its most commonly used levels? [10 marks]
2. A) Discuss the three types of contentions in a multiprocessor system. [5 marks]
B) What are the different techniques used for reducing contention? [5marks]
3. A) Define the basic elements of the processor. [4 marks]
B) Describe the micro-operations that the processor performs. [6marks]
4. A) Discuss the different types of mapping functions. [5 marks]

B) Describe the various replacement algorithms in detail. [5 marks]

Part B (One mark questions)

(50*1 = 50 marks)

1. A ............... is a processor designed with complete computer instruction set to provide


maximum capabilities in the most efficient way.
a. UMA
b. NUMA
c. RISC
d. CISC
2. Which of the following is not an approach to enhance the vector-processing capability?
a. Using a vectorizing compiler
b. Choosing suitable algorithms
c. Combining scalar instructions
d. Diluting the vector instruction set
3. Conventional CISC architecture uses a ............. for holding both instructions and data.
a. Unified cache

b. Unified register
c. Varied cache
d. Varied register
4. Which of the following is not a technique for reducing contention?
a. Better interconnection network
b. Cache memory
c. Read-only memory
d. Memory allocation
5. Coprocessors are capable of enhancing the system performance by relieving the main
processor of ................ tasks.
a. Data-intensive
b. Processor-intensive
c. Function-intensive
d. Operation-intensive
6. Attaching a separate cache memory to each processor in a multiprocessor system may help in
.............. the memory traffic.
a. Scanning
b. Maintaining
c. Reducing
d. Increasing
7. In ............., all I/O is performed under the control of an I/O handling procedure.
a. I/O Bus
b. I/O Interfaces
c. Serial I/O
d. Program-controlled I/O
8. There are three kinds of the ................ mode, that is, Mode 0, 1, and 2.
a. Single-cycle
b. Burst
c. Bit set/reset
d. Input/output
9. The PCI bus utilizes its internal ................ system for handling requests from the cards on the
bus.
a. Processing
b. Memory
c. Database
d. Interrupt

10. ................... is a removable cartridge storage device that may be used to store compressed
data.
a. DVD drive
b. Zip drive
c. CD-ROM
d. CD-RW
11. The technique of ................. has improved the fidelity of the recorded audio signal by
increasing the effective linearity of the recording medium.
a. AC biasing
b. DC biasing
c. Compact cassettes
d. Digital audio tape
12. .............. is now used as an umbrella term for computer data storage schemes that can divide
and replicate data among multiple physical drives.
a. CRT
b. DDC
c. DAT
d. RAID
13. In ............., whole capacity needs to be erased by ultraviolet radiation before a new
programming activity.
a. ROM
b. DRAM
c. EPROM
d. SRAM
14. A priority is given to the ................ over the CPU bus to ensure that no information is lost,
during simultaneous requests.
a. Read/write circuits
b. Refresh
c. Sense/write circuit
d. Decoder block
15. In a/an ................, information decays naturally or is lost when electrical power is switched
off.
a. Erasable memory
b. Volatile memory
c. Non-volatile memory
d. Non-erasable memory
16. ................ are those registers that may seem like operands of the logical, arithmetic, and
associated instructions.

a. Flag registers
b. Index registers
c. Segment registers
d. General purpose registers
17. The ax register is known as the ............... .
a. Base register
b. Accumulator
c. Count register
d. Data register
18. The .............. saves the physical memory address on which the subsequent instruction is
placed or on which the subsequent piece of data will be written.
a. Memory Data Register
b. Memory Address Register
c. Program Counter
d. Operand
19. IEEE 754-1985 was an industry standard for representing .............. numbers in computers,
officially adopted in 1985 and superseded in 2008 by IEEE 754-2008.
a. Normalized
b. Mantissa
c. Exponent
d. Floating-point
20. A floating-point number is said to be normalized if the most significant digit of the mantissa
is ............ .
a. One
b. Zero
c. Nonzero
d. Three
21. The ones' complement form of a negative binary number is the bitwise ............ applied to it.
a. NOT
b. OR
c. AND
d. NOR
22. The ............... was designed to calculate the entries of a table automatically and transfer them
through steel punches to an engineers plate from which the tables could be printed.
a. Analytical engine
b. Difference engine
c. EDVAC
d. UNIVAC

23. The ............... corresponds to a modern Arithmetic Logic Unit. It was capable of performing
four basic arithmetic operations.
a. Variable card
b. 90 Operation card
c. Store
d. Mill
24. ............. provide/provides a means of communication among the control unit, ALU, and
registers of the CPU.
a. Arithmetic Logic Unit
b. Control Unit
c. CPU interconnections
d. Registers
25. ................ are small, simple devices that are often used to control other devices.
a. Embedded computers
b. Supercomputers
c. Laptop computers
d. Electronic computers
26. Which of the following is not a fundamental design issue in designing an instruction set?
a. Registers
b. Logical Data
c. Data Types
d. Operation Repertoire
27. Which of the following factors does not determine the use of addressing bits?
a. Number of register sets
b. Register versus address range
c. Number of operands
d. Number of addressing modes
28. ............. are a straight forward, simple binary representation.
a. Decimals
b. Floating-point numbers
c. Unsigned integers
d. Signed integers
29. ............... is concerned with addresses that refer to the memory other than registers.
a. Operand
b. Register set
c. Address range
d. Address granularity

30. The ............... occurs at the beginning of every instruction.


a. Fetch cycle
b. Instruction cycle
c. Execute cycle
d. Indirect cycle
31. ................ is a sequence of control words corresponding to the control sequence of a machine
instruction that constitute the micro routine for that instruction.
a. Micro program Counter
b. Micro program Memory
c. Micro Routine
d. Control Word
32. At the beginning of the fetch cycle, the address of the next instruction is in the ................ .
a. Control Word
b. Program counter
c. Memory Buffer Register
d. Memory Address Register
33. In a hardwired implementation, the control unit is essentially a/an ............. circuit.
a. Combinatorial
b. Closed
c. Open
d. Effective
34. Which of the following is not a mapping function?
a. Indirect mapping
b. Set associative Mapping
c. Associative Mapping
d. Direct Mapping
35. When a block is to be overwritten, the block that has not been referenced for the longest time
is overwritten. This is called .................. block.
a. Random
b. FIFO
c. Least-recently-used
d. Least-frequently-used
36. Transferring data in blocks between the main memory and the ............... enables an
interleaved memory to operate at its maximum possible speed.
a. Erasable memory
b. Volatile memory
c. Secondary memory

d. Cache memory
37. ................ is a compromise that exhibits the strengths of both the direct and associative
approaches while reducing their disadvantages.
a. Dissociative Mapping
b. Direct Mapping
c. Set associative Mapping
d. Associative Mapping
38. With ................., the CPU issues a command to I/O module, and it does not wait until I/O
operation gets completed but instead continues to execute other instructions.
a. Interrupt-driven I/O
b. Controller
c. Channel or I/O processor
d. Programmed I/O
39. A ............... causes the I/O module to obtain an item of data from the peripheral and place it
in an internal buffer.
a. Control command
b. Test command
c. Write command
d. Read command
40. The Testbit instruction tests the state of one bit in the destination location, where the bit
position to be tested is indicated by the ............ operand.
a. Fourth
b. Third
c. Second
d. First

41. Peripherals often use different data formats and ................ from the computer system to
which they are attached.
a. Data type
b. Volume
c. Word lengths
d. Data lengths
42. Name the printer that uses impact technology.
a. Thermal Printer
b. Chain Printer
c. Laser Printer
d. Ink-jet Printer

43. ............... allow you to scan photographic slides, which are small and need higher scanning
resolutions than images and documents.
a. Flatbed scanners
b. Drum scanners
c. Film scanners
d. Photo scanners
44. ................ depicts the distance between pixels.
a. Scale pitch
b. Point pitch
c. Parallel pitch
d. Dot pitch
45. The peripheral increases the computer's capability to interact with the ........... .
a. Processor
b. User
c. Hardware
d. Software
46. ................ is read-only in nature because it consists of micro programs that are written and
stored into it permanently.
a. Main Memory
b. Control memory
c. Cache Memory
d. Secondary Memory
47. The control signals happen to be fully encoded in the control word in ............ microcode.
a. Cross
b. Parallel
c. Fully horizontal
d. Fully vertical
48. Once the control unit tracks the op-code of the current instruction from the IR, it sends it to
the address bus of that .............. .
a. MPC
b. CU
c. RAM
d. ROM
49. The ............. technique of the CU determines which circuit to utilize for the current
instruction.
a. Programming
b. Decoding
c. Communication

d. Encoding
50. Electronic data communications between elements can be broadly classified into two
categories: single-ended and ............... .
a. Differential
b. Integrated
c. Open-ended
d. Double-ended

Part B (Two marks questions)

(25*2 = 50 marks)

51. In ................, a set of ................ simultaneously execute different instruction sequences on different
data sets.
a. SISD stream, processors
b. SIMD stream, machine instructions
c. MIMD stream, processors
d. MISD stream, machine instructions
52. To achieve higher performance, superscalar processors have introduced intricate instruction issue
policies, involving advanced techniques, such as .............., .................., and speculative branch
processing.
a. Decoding, memory renaming
b. Decoding, register renaming
c. Shelving, memory renaming
d. Shelving, register renaming
53. The contention ratio in computer networking refers to the ratio of the probable .............. to the
............. .
a. Minimum demand, virtual band width
b. Minimum demand, real band width
c. Maximum demand, virtual band width
d. Maximum demand, real band width
54. Various types of operations that may be performed by the coprocessor are floating-point arithmetic,
signal processing, ..............., and ............... .
a. String processing, encryption
b. String processing, decryption
c. Data processing, encryption

d. Data processing, decryption


55. Several techniques are used for SCSI bus termination. These are ............. termination, Low Voltage
Differential (LVD) termination, High Voltage Differential (HVD) termination, and ................ .
a. Forced imperfect, direct termination
b. Forced imperfect, direct termination
c. Forced perfect, active termination
d. Forced perfect, direct termination
56. A bus is ................ when data transfer on the bus depends upon the accessibility of the data and not on
............ signal.
a. Synchronous, clock
b. Synchronous, output
c. Asynchronous, clock
d. Asynchronous, output
57. Consider the following statements about RAID 0:
(i) Any drive failure destroys the array, and the likelihood of failure increases with no drives in the array.
(ii) A single drive failure destroys the entire array, because when data is written to a RAID 0 volume, the
data is broken into fragments called blocks.
State True or False.
a. (i) True, (ii) False
b. (i) True, (ii) True
c. (i) False, (ii) False
d. (i) False, (ii) True

58. ............ is identical to ............. but confines all parity data to a single drive.
a. RAID 2, RAID 3
b. RAID 3, RAID 4
c. RAID 4, RAID 5
d. RAID 5, RAID 6
59. Consider the following statements about the operations of the control circuitry for a memory read
cycle:

(i) The timing and control circuit sends a busy signal to prevent the access control box from accepting the
new requests until the current cycle starts.
(ii) The timing and control block then loads the row and column address into the memory chips by
activating RAS and CAS.
State True or False.
a. (i) True, (ii) True
b. (i) False, (ii) False
c. (i) False, (ii) True
d. (i) True, (ii) False

60. Consider the following statements about DRAM chips:


i.

A DRAM memory cell uses multiple transistors and a capacitor to store a bit of data.

In a DRAM cell, the 1 and 0 states correspond to the presence of a stored charge in a capacitor
controlled by the transistor switching circuit.
State True or False.
ii.

a. (i) True, (ii) True


b. (i) True, (ii) False
c. (i) False, (ii) False
d. (i) False, (ii) True

61. When the instruction contains a/an ............... address, the actual address is read from the main
memory, any needed data is obtained from the main memory and thereafter positioned in the .............. .
a. Direct, program counter
b. Indirect, program counter
c. Indirect, data registers
d. Direct, data registers
62. Which of the following statements are true about the functions of flag registers?
i.

Carry Flag (CF): As soon as there is an unsigned overflow, it is positioned to 1.

ii.

Parity Flag (PF): As soon as there exists even number of 1 bits in the outcome, as well as to 0 at
the time there exists odd number of 1 bits, it is positioned to 1.

State True or False.

a. (i) True, (ii) True


b. (i) True, (ii) False
c. (i) False, (ii) False
d. (i) False, (ii) True

63. Consider the following statements about numbers:


i.

Floating point describes a method of representing whole numbers in a way that can support a
wide range of values.

ii.

Numbers are, in general, represented approximately to a fixed number of significant digits and
scaled using an exponent.

State True or False.


a. (i) True, (ii) True
b. (i) True, (ii) False
c. (i) False, (ii) False
d. (i) False, (ii) True

64. Modern CPUs are typically .............. or .............. machines.


a. 2-operand, 3-operand
b. 4-operand, 5-operand
c. 3-operand, 4-operand
d. 1-operand, 2-operand

65. ............... refers to a set of CPU registers. These serve as a working memory, storing ............. results
during the computation process.
a. Internal memory, temporary
b. Secondary memory, permanent
c. Internal memory, permanent
d. Secondary memory, temporary

66. CPU contains one or more registers that may be referenced by ................. . If only ................. register
exists, reference to it may be implicit.
a. Instruction format, two
b. Instruction format, one
c. Machine instructions, two
d. Machine instructions, one

67. The instruction is divided into ............., corresponding to the constituent elements of the instruction.
This layout of the instruction is called ............... .
a. Operation codes, instruction format
b. Operation codes, mnemonics
c. Fields, instruction format
d. Fields, mnemonics

68. Consider the following statements about branching in the Microprogram:


i.
ii.

When the End microinstruction is encountered, the PC is loaded with the address of the first CW
in the instruction set for the instruction fetch cycle.
When a new instruction is loaded into the IR, PC is loaded with the starting address of the
microinstruction for that instruction.

State True or False.


a. (i) True, (ii) True
b. (i) False, (ii) True
c. (i) True, (ii) False
d. (i) False, (ii) False

69. Fetch cycle occurs at the beginning of every instruction. Four main registers that are used in this cycle
are Memory Address Register, Memory Buffer Register, ............., and ................. .
a. Program Counter, Feedback Register
b. Program Counter, Instruction Register
c. ax register, Instruction Register
d. ax register, Feedback Register

70. When a ................ occurs, the Read or Write operation is performed in cache, the main memory is not
involved. In the case of a ..............., the required data is brought from the main memory into cache.
a. Cache miss, cache hit
b. Cache hit, cache miss
c. Cache hit, cache tag
d. Cache miss, cache tag

71. Consider the following statements about recovery from errors:


(i). Many computers include a parity check code in the secondary memory, which allows the detection of
errors in the stored data.
(ii) If an error occurs, the control application detects it and informs the CPU by raising an interrupt.
State True or False.
a. (i) True, (ii) True
b. (i) False, (ii) False
c. (i) False, (ii) True
d. (i) True, (ii) False

72. Consider the following statements about data buffering:


(i). Data coming from ROM is sent to an I/O module in a rapid burst.
(ii) The data is buffered in the I/O module and then sent to the peripheral device at its rate.
State True or False.
a. (i) True, (ii) True
b. (i) False, (ii) True
c. (i) True, (ii) False
d. (i) False, (ii) False
73. ................ are small, light, and consume less power than any other type of printers, making them
perfect for ........... and portable applications.
a. Laser printers, retail
b. Laser printers, commercial

c. Thermal printers, retail


d. Thermal printers, commercial
74. Consider the following statements about visual display:
i.

Multichrome monitors are increasingly becoming an obsolete technology as majority applications


today need colour screen.

ii.

A graphics adapter board (also called video card) is required to connect a monitor to a projector.

State True or False.


a. (i) False, (ii) True
b. (i) False, (ii) False
c. (i) True, (ii) True
d. (i) True, (ii) False

75. Consider the following statements about control memory:


i.

Control memory is write-only in nature, because it consists of micro programs that are written
and stored into it permanently.

ii.

It must be faster, because to run a machine instruction, several microinstructions have to be


fetched and executed.

State True or False


a. (i) False, (ii) True
b. (i) False, (ii) False
c. (i) True, (ii) False
d. (i) True, (ii) True

Answer Keys (Part A & Part B)


Subject Code: BCA 2050

Book ID: B1642

Part - B

Part - B

Q.
No.

Ans. Key

Unit no./
Page no.

Q.
No.

Ans. Key

Unit no./
Page no.

Q.
No.

Ans. Key

Unit no./
Page no.

14/328

26

3/57

51

13/324

27

52

14/341

28

53

12/281

12/283

29

3/73

54

12/285

12/285

30

5/107

55

10/240

12/283

31

5/136

56

10/231

10/242

32

5/139

57

8/191

10/236

33

5/133

58

8/192

10/238

34

7/173

59

6/157

10

35

60

6/151

11

36

61

4/94

12

37

62

4/92

13

6/146

38

9/209

63

2/30

14

6/158

39

9/211

64

2/46

15

6/145

40

9/214

65

1/15

16

4/76

41

9/202

66

3/54

17

4/88

42

11/262

67

3/54

18

43

68

5/134

19

44

69

5/107

20

45

70

7/165

21

2/32

46

13/300

71

9/221

22

1/3

47

5/115

72

9/203

23

1/5

48

13/312

73

11/267

24

1/12

49

13/299

74

11/261

25

1/5

50

10/240

75

13/300

14/336
14/332

8/196
8/186
8/190

4/93
2/44
2/31

3/73
3/59

7/176
7/168
7/172

11/254
11/259
11/250