COA Multiple Choice Questions and Answers PDF
COA Multiple Choice Questions and Answers PDF
COA Multiple Choice Questions and Answers PDF
3. Suppose that a bus has 16 data lines and requires 4 cycles of 250 nsecs each to
transfer data. The bandwidth of this bus would be 2 Megabytes/sec. If the cycle time
of the bus was reduced to 125 nsecs and the number of cycles required for transfer
stayed the same what would the bandwidth of the bus?
(A) 1 Megabyte/sec (B) 4 Megabytes/sec
(C) 8 Megabytes/sec (D) 2 Megabytes/sec
Ans: D
4. Assembly language
(A) uses alphabetic codes in place of binary numbers used in machine language
(B) is the easiest language to write programs
(C) need not be translated into machine language
(D) None of these
Ans: A
6. The amount of time required to read a block of data from a disk into memory is
composed of seek time, rotational latency, and transfer time. Rotational latency
refers to
(A) the time its takes for the platter to make a full rotation
(B) the time it takes for the read-write head to move into position over the
appropriate track
(C) the time it takes for the platter to rotate the correct sector under the head
(D) none of the above
Ans: A
7. What characteristic of RAM memory makes it not suitable for permanent storage?
(A) too slow (B) unreliable (C) it is volatile (D) too bulky
Ans: C
10. The average time required to reach a storage location in memory and obtain its
contents is called the
(A) seek time (B) turnaround time (C) access time (D) transfer time
Ans: C
14. If memory access takes 20 ns with cache and 110 ns with out it, then the ratio (
cache uses a 10 ns memory) is
(A) 93% (B) 90% (C) 88% (D) 87%
Ans: B
15. In a memory-mapped I/O system, which of the following will not be there?
(A) LDA (B) IN (C) ADD (D) OUT
Ans: A
16. In a vectored interrupt.
(A) the branch address is assigned to a fixed location in memory.
(B) the interrupting source supplies the branch information to the processor through
an interrupt vector.
(C) the branch address is obtained from a register in the processor
(D) none of the above
Ans: B
20. Write Through technique is used in which memory for updating the data
(A) Virtual memory (B) Main memory
(C) Auxiliary memory (D) Cache memory
Ans: D
26. If the main memory is of 8K bytes and the cache memory is of 2K words. It uses
associative mapping. Then each word of cache memory shall be
(A) 11 bits (B) 21 bits (C) 16 bits (D) 20 bits
Ans: C
27. When CPU is executing a Program that is part of the Operating System, it is said to
be in (A) Interrupt mode (B) System mode (C) Half mode (D) Simplex mode
Ans: B
33. The multiplicand register & multiplier register of a hardware circuit implementing
booth’s algorithm have (11101) & (1100). The result shall be
(A) (812) 10 (B) (-12) 10 (C) (12) 10 (D) (-812) 10
Ans: A
-----------------------------------------------------------------------------------------------------------------
128. If the main memory is of 8K bytes and the cache memory is of 2K words. It
uses associative mapping. Then each word of cache memory shall be_____.
A. 11 bits B. 21 bits
C. 16 bits D. 20 bits
Ans: C
129. A Stack-organised Computer uses instruction of _____.
A. Indirect addressing B. Two-addressing
C. Zero addressing D. Index addressing
Ans: C
130. In a program using subroutine call instruction, it is necessary______.
A. initialize program counter B. Clear the accumulator
C. Reset the microprocessor D. Clear the instruction register
Ans: D
131. Virtual memory consists of _______.
A. Static RAM B. Dynamic RAM
C. Magnetic memory D. None of these
Ans: A
132. In signed-magnitude binary division, if the dividend is (11100)2 and divisor is
(10011)2 then the result is ______.
A. (00100)2 B. (10100)2
C. (11001)2 D. (01100)2
Ans: B
133. Generally Dynamic RAM is used as main memory in a computer system as
it______.
A. Consumes less power B. has higher speed
C. has lower cell density D. needs refreshing circuitry
Ans: B
134. Write Through technique is used in which memory for updating the data
_____.
A. Virtual memory B. Main memory
C. Auxiliary memory D. Cache memory
Ans: D
135. Cache memory acts between_______.
A. CPU and RAM B. RAM and ROM
C. CPU and Hard Disk D. None of these
Ans: A
136. The circuit used to store one bit of data is known as ______.
A. Encoder B. OR gate
C. Flip Flop D. Decoder
Ans: C
137. Von Neumann architecture is ______.
A. SISD B. SIMD
C. MIMD D. MISD
Ans: A
138. In a vectored interrupt.
A. the branch address is assigned to a fixed location in memory.
B. the interrupting source supplies the branch information to the processor through
an interrupt vector.
C. the branch address is obtained from a register in the processor
D. none of the above
Ans: B
139. . In a memory-mapped I/O system, which of the following will not be there?
A. LDA B. IN
C. ADD D. OUT
Ans: A
140. If memory access takes 20 ns with cache and 110 ns without it, then the ratio
(cache uses a 10 ns memory) is _____.
A. 93% B. 90%
C. 88% D. 87%
Ans: B
141. The addressing mode used in an instruction of the form ADD X Y, is _____.
A. Absolute B. indirect
C. index D. none of these
Ans: C
142. _________ register keeps track of the instructions stored in program stored
in memory.
A. AR (Address Register) B. XR (Index Register)
C. PC (Program Counter) D. AC (Accumulator)
Ans: C
143. The idea of cache memory is based ______.
A. on the property of locality of reference
B. on the heuristic 90-10 rule
C. on the fact that references generally tend to cluster
D. all of the above
Ans: A
145. The average time required to reach a storage location in memory and obtain
its contents is called the _____.
A. seek time B. turnaround time
C. access time D. transfer time
Ans: C
147. The circuit used to store one bit of data is known as_______.
A. Register B. Encoder
C. Decoder D. Flip Flop
Ans: D
148. . Computers use addressing mode techniques for ____________.
A. giving programming versatility to the user by providing facilities as pointers to
memory counters for loop control
B. to reduce no. of bits in the field of instruction
C. specifying rules for modifying or interpreting address field of the instruction
D. All the above
Ans: D
149. What characteristic of RAM memory makes it not suitable for permanent
storage?
A. too slow B. unreliable
C. it is volatile D. too bulky
Ans: C
150. The amount of time required to read a block of data from a disk into memory
is composed of seek time, rotational latency, and transfer time. Rotational latency
refers to ______.
A. the time its takes for the platter to make a full rotation
B. the time it takes for the read-write head to move into position over the
appropriate track
C. the time it takes for the platter to rotate the correct sector under the head
D. none of the above
Ans: A
157. Processors of all computers, whether micro, mini or mainframe must have
a. ALU b. Primary Storage
c. Control unit d. All of above
Ans b
158. What is the control unit’s function in the CPU?
a. To transfer data to primary storage
b. to store program instruction
c. to perform logic operations
d. to decode program instruction
Ans e
159. What is meant by a dedicated computer?
a. which is used by one person only
b. which is assigned to one and only one task
c. which does one kind of software
d. which is meant for application software only
Ans f
160. The most common addressing techiniques employed by a CPU is
a. immediate b. direct
c. indirect d. register e. all of the above
Ans d
161. Pipeline implement
a. fetch instruction b. decode instruction
c. fetch operand d. calculate operand
e. execute instruction f. all of abve
Ans d
162. Which of the following code is used in present day computing was developed
by IBM corporation?
a. ASCII b. Hollerith Code
c. Baudot code d. EBCDIC code
Ans d
163. When a subroutine is called, the address of the instruction following the CALL
instructions stored in/on the
a. stack pointer b. accumulator
c. program counter d. stack
Ans d
164. A microprogram written as string of 0’s and 1’s is a
a. symbolic microinstruction b. binary microinstruction
c. symbolic microprogram d. binary microprogram
Ans d
165. Interrupts which are initiated by an instruction are
a. internal b. external c. hardware d. software
Ans b
166. Memory access in RISC architecture is limited to instructions
a. CALL and RET b. PUSH and POP
c. STA and LDA d. MOV and JMP
Ans c
167. A collection of lines that connects several devices is called …………..
A) bus B) peripheral connection wires
C) Both a and b D) internal wires
Ans A
168. A complete microcomputer system consist of ………..
A) microprocessor B) memory
C) peripheral equipment D) all of the above
Ans D
169. PC Program Counter is also called ……………….
A) instruction pointer B) memory pointer
C) data counter D) file pointer
Ans A
170. In a single byte how many bits will be there?
A) 8 B) 16 C) 4 D) 32
Ans A
171. CPU does not perform the operation ………………
A) data transfer B) logic operation
C) arithmetic operation D) all of the above
Ans A
172. The access time of memory is …………… the time required for performing
any single CPU operation.
A) Longer thanB) Shorter than
C) Negligible than D) Same as
Ans A
173. Memory address refers to the successive memory words and the machine is
called as …………
A) word addressable B) byte addressable
C) bit addressable D) Tera byte addressable
Ans A
174. A microprogram written as string of 0’s and 1’s is a ………….
A) Symbolic microinstruction B) binary microinstruction
C) symbolic microinstruction D) binary microprogram
Ans D
175. A pipeline is like ………………..
A) an automobile assembly line B) house pipeline
C) both a and b D) a gas line
Ans A
176. Data hazards occur when ……
A) Greater performance loss
B) Pipeline changes the order of read/write access to operands
C) Some functional unit is not fully pipelined
D) Machine size is limited
Ans B
177. Where does a computer add and compare data?
A. Hard disk B. Floppy disk
C. CPU chip D:Memory chip
Ans C
178. Which of the following registers is used to keep track of address of the
memory location where the next instruction is located?
A. Memory Address Register
B. Memory Data Register
C. Instruction Register
D. Program Register
Ans D
179. A complete microcomputer system consists of
A) microprocessor
B) memory
C) peripheral equipment
D) all of above
Ans D
180. CPU does not perform the operation
A. data transfer
B. logic operation
C. arithmetic operation
D. all of above
Ans B
181. Pipelining strategy is called implement
A. instruction execution
B. instruction prefetch
C. instruction decoding
D. instruction manipulation
Ans C
182. A stack is
A. an 8-bit register in the microprocessor
B. a 16-bit register in the microprocessor
C. a set of memory locations in R/WM reserved for storing information temporarily
during the execution of computer
D. a 16-bit memory address stored in the program counter
Ans A
183. A stack pointer is
A. a 16-bit register in the microprocessor that indicate the beginning of the stack
memory.
B. a register that decodes and executes 16-bit arithmetic expression.
C. The first memory location where a subroutine address is stored.
D. a register in which flag bits are stored
Ans A
184. The branch logic that provides decision making capabilities in the control
unit is known as
A. controlled transfer
B. conditional transfer
C. unconditional transfer
D. none of above
Ans C
185. Interrupts which are initiated by an instruction are
A. internal
B. external
C. hardware
D. software
Ans D
186. A time sharing system imply
A. more than one processor in the system
B. more than one program in memory
C. more than one memory in the system
D. None of above
Ans B
187.Virtual memory is –
(1) an extremely large main memory
(2) an extremely large secondary memory
(3) an illusion of an extremely large memory
(4) a type of memory used in super computers
(5) None of these
Answers:
3
188.Fragmentation is –
(1) dividing the secondary memory into equal sized f ragments
(2) dividing the main memory into equal size f ragments
(3) f ragments of memory words used in a page
(4) f ragments of memory words unused in a page
(5) None of these
Answers:: 2
189.Which memory unit has lowest access time?
(1) Cache (2) Registers
(3) Magnetic Disk (4) Main Memory
(5) Pen drive
Answer :2
190.Cache memory-
(1) has greater capacity than RAM
(2) is f aster to access than CPU Registers
(3) is permanent storage
(4) f aster to access than RAM
(5) None of these
Answer 4
191.When more than one processes are running concurrently on a system-
(1) batched system
(2) real-time system
(3) multi programming system
(4) multiprocessing system
(5) None of these
Answers:
3
192.Which of the following memories must be refreshed many times per second?
a. Static RAM b. Dynamic RAM c. EPROM
d. ROM e. None of these
ans Static RAM
193.RAM stands for
a. Random origin money b. Random only memory
c. Read only memory d. Random access memory
e. None of these
ans Random access memory
194.CPU fetches the instruction from memory according to the value of
a) program counter
b) status register
c) instruction register
d) program status word
Answer:a.
195.A memory buffer used to accommodate a speed differential is called
a) stack pointer
b) cache
c) accumulator
d) disk buffer
Answer:b.
196.Which one of the following is the address generated by CPU?
a) physical address
b) absolute address
c) logical address
d) none of the mentioned
Answer:c.
197.Run time mapping from virtual to physical address is done by
a) memory management unit
b) CPU
c) PCI
d) none of the mentioned
Answer:a.
198.Memory management technique in which system stores and retrieves
data from secondary storage for use in main memory is called
a) fragmentation
b) paging
c) mapping
d) none of the mentioned
Answer:b
199.The address of a page table in memory is pointed by
a) stack pointer
b) page table base register
c) page register
d) program counter
200.Program always deals with
a) logical address
b) absolute address
c) physical address
d) relative address
Answer:a
Computer Organization Questions and
Answers – Addressing Modes
This set of Computer Organization and Architecture Multiple Choice Questions & Answers
(MCQs) focuses on “Addressing Modes”.
Answer: b
Explanation: The instruction is using immediate addressing mode hence the value is stored in the
location 45 is added.
2. In case of, Zero-address instruction method the operands are stored in _____
a) Registers
b) Accumulators
c) Push down stack
d) Cache
View Answer
Answer: c
Explanation: In this case the operands are implicitly loaded onto the ALU.
3. Add #45, when this instruction is executed the following happen/s _______
a) The processor raises an error and requests for one more operand
b) The value stored in memory location 45 is retrieved and one more operand is requested
c) The value 45 gets added to the value on the stack and is pushed onto the stack
d) None of the mentioned
View Answer
Answer: b
Explanation: None.
Answer: a
Explanation: In this addressing mode, the value of the register serves as another memory location
and hence we use pointers to get the data.
5. In the following indexed addressing mode instruction, MOV 5(R1),LOC the effective address
is ______
a) EA = 5+R1
b) EA = R1
c) EA = [R1] d) EA = 5+[R1] View Answer
Answer: d
Explanation: This instruction is in Base with offset addressing mode.
6. The addressing mode/s, which uses the PC instead of a general purpose register is ______
a) Indexed with offset
b) Relative
c) direct
d) both Indexed with offset and direct
View Answer
Answer: b
Explanation: In this the contents of the PC are directly incremented.
7. When we use auto increment or auto decrements, which of the following is/are true?
1) In both, the address is used to retrieve the operand and then the address gets altered
2) In auto increment the operand is retrieved first and then the address altered
3) Both of them can be used on general purpose registers as well as memory locations
a) 1, 2, 3
b) 2
c) 1, 3
d) 2, 3
View Answer
Answer: d
Explanation: In case of, auto increment the increment is done afterwards and in auto decrement
the decrement is done first.
8. The addressing mode, where you directly specify the operand value is _______
a) Immediate
b) Direct
c) Definite
d) Relative
View Answer
Answer: a
Explanation: None.
Answer: c
Explanation: The addressing mode used is base with offset and index.
10. _____ addressing mode is most suitable to change the normal sequence of execution of instructions.
a) Relative
b) Indirect
c) Index with Offset
d) Immediate
Answer: a
Explanation: The relative addressing mode is used for this since it directly updates the PC.
11. Physical memory is divided into sets of finite size called as ______
a) Frames
b) Pages
c) Blocks
d) Vectors
View Answer
Answer: a
Explanation: None.
12. _____ method is used to map logical addresses of variable length onto physical memory.
a) Paging
b) Overlays
c) Segmentation
d) Paging with segmentation
View Answer
Answer: c
Explanation: Segmentation is a process in which memory is divided into groups of variable
length called segments.
13. In memory interleaving, the lower order bits of the address is used to
a) Get the data
b) Get the address of the module
c) Get the address of the data within the module
d) None of the mentioned
View Answer
Answer: b
Explanation: To implement parallelism in data access we use interleaving.
14. The number successful accesses to memory stated as a fraction is called as _____
a) Hit rate
b) Miss rate
c) Success rate
d) Access rate
View Answer
Answer: a
Explanation: The hit rate is a important factor in performance measurement.
15. The number failed attempts to access memory, stated in the form of fraction is called as
_________
a) Hit rate
b) Miss rate
c) Failure rate
d) Delay rate
View Answer
Answer: b
Explanation: The miss rate is key factor in deciding the type of replacement algorithm.
16. In associative mapping during LRU, the counter of the new block is set to ‘0’ and all the
others are incremented by one,when _____ occurs.
a) Delay
b) Miss
c) Hit
d) Delayed hit
View Answer
Answer: b
Explanation: Miss usually occurs when the memory block requiered is not present in the cache.
17. In LRU, the refrenced blocks counter is set to’0′ and that of the previous blocks are
incremented by one and others remain same, in case of ______
a) Hit
b) Miss
c) Delay
d) None of the mentioned
View Answer
Answer: a
Explanation: If the referenced block is present in the memory it is called as hit.
18. If hit rates are well below 0.9, then they’re called as speedy computers.
a) True
b) False
View Answer
Answer: b
Explanation: It has to be above 0.9 for speedy computers.
19. The extra time needed to bring the data into memory in case of a miss is called as _____
a) Delay
b) Propagation time
c) Miss penalty
d) None of the mentioned
View Answer
Answer: c
Explanation: None.
20. The miss penalty can be reduced by improving the mechanisms for data transfer between the
different levels of hierarchy.
a) True
b) False
View Answer
Answer: a
Explanation: The extra time needed to bring the data into memory in case of a miss is called as
miss penalty.
Answer: a
Explanation: This is one of the main reasons for the usage of virtual memories.
Answer: b
Explanation: The program is divided into parts called as segments for ease of execution.
3. The techniques which move the program blocks to or from the physical memory is called as
______
a) Paging
b) Virtual memory organisation
c) Overlays
d) Framing
View Answer
Answer: b
Explanation: By using this technique the program execution is accomplished with usage of less
space.
Answer: d
Explanation: The logical address is the random address generated by the processor.
Answer: a
Explanation: The MMU translates the logical address into physical address by adding an offset.
Answer: d
Explanation: None.
8. The DMA doesn’t make use of the MMU for bulk data transfers.
a) True
b) False
View Answer
Answer: b
Explanation: The DMA stands for Direct Memory Access,in which a block of data gets directly
transferred from the memory.
9. The virtual memory basically stores the next segment of data to be executed on the _________
a) Secondary storage
b) Disks
c) RAM
d) ROM
View Answer
Answer: a
Explanation: None.
Answer: a
Explanation: TLB stands for Translation Look-aside Buffer.
1. The main reason for the discontinuation of semi conductor based storage devices for providing
large storage space is _________
a) Lack of sufficient resources
b) High cost per bit value
c) Lack of speed of operation
d) None of the mentioned
View Answer
Answer: b
Explanation: In case of semi conductor based memory technology, we get speed but the increase
in the integration of various devices the cost is high.
Answer: a
Explanation: The digital data is sorted on the magnetized discs by magnetizing the areas.
Answer: d
Explanation: The space required to represent each bit must be large enough to accommodate two
changes in magnetization.
6. The read/write heads must be near to disk surfaces for better storage.
a) True
b) False
View Answer
Answer: a
Explanation: By maintaining the heads near to the surface greater bit densities can be achieved.
7. _____ pushes the heads away from the surface as they rotate at their standard rates.
a) Magnetic tension
b) Electric force
c) Air pressure
d) None of the mentioned
View Answer
Answer: c
Explanation: Due to the speed of rotation of the discs air pressure develops in the hard disk.
8. The air pressure can be countered by putting ______ in the head-disc surface arrangement.
a) Air filter
b) Spring mechanism
c) coolant
d) None of the mentioned
View Answer
Answer: b
Explanation: The spring mechanism pushes the head along the surface to reduce the air pressure
effect.
9. The method of placing the heads and the discs in an air tight environment is called as ______
a) RAID Arrays
b) ATP tech
c) Winchester technology
d) Fleming reduction
View Answer
Answer: c
Explanation: The Disks and the heads operate faster due to the absence of the dust particles.
Answer: b
Explanation: None.
2. The set of corresponding tracks on all surfaces of a stack of disks form a ______
a) Cluster
b) Cylinder
c) Group
d) Set
View Answer
Answer: b
Explanation: The data is stored in the these sections called as cylinders.
Answer: d
Explanation: None.
4. The read and write operations usually start at ______ of the sector.
a) Center
b) Middle
c) From the last used point
d) Boundaries
View Answer
Answer: d
Explanation: The heads read and write data from the ends to the center.
Answer: a
Explanation: This means that we leave a little gap between each sectors to differentiate between
them.
6. The _____ process divides the disk into sectors and tracks.
a) Creation
b) Initiation
c) Formatting
d) Modification
View Answer
Answer: c
Explanation: The formatting process deletes the data present and does the creation of sectors and
tracks.
7. The access time is composed of __________
a) Seek time
b) Rotational delay
c) Latency
d) Both Seek time and Rotational delay
View Answer
Answer: d
Explanation: The seek time refers to the time required to move the head to the required disk.
Answer: b
Explanation: None.
9. _______ is used to deal with the difference in the transfer rates between the drive and the bus.
a) Data repeaters
b) Enhancers
c) Data buffers
d) None of the mentioned
View Answer
Answer: c
Explanation: The buffers are added to store the data from the fast device and to send it to the
slower device at its rate.
10. _______ is used to detect and correct the errors that may occur during data transfers.
a) ECC
b) CRC
c) Checksum
d) None of the mentioned
View Answer
Answer: a
Explanation: ECC stands for Error Correcting Code.