On This Page

This set of Computer Architecture Multiple Choice Questions & Answers (MCQs) focuses on Computer Architecture Set 17

Q1 | The LEA mnemonic is used to
  • load the effective address of an instruction
  • load the values of operands onto an accumulator
  • declare the values as global constants
  • store the outcome of the operation at a memory location
Q2 | The instructions of IA-32 machines are of length up to               
  • 4 bytes
  • 8 bytes
  • 16 bytes
  • 12 bytes
Q3 | The bit present in the op code, indicating which of the operands is the source is called as                   
  • src bit
  • indirection bit
  • direction bit
  • frm bit
Q4 | The instruction used to cause unconditional jump is                   
  • ujg
  • jg
  • jmp
  • goto
Q5 |                       instruction is used to check the bit of the condition flags.
  • test
  • tb
  • check
  • bt
Q6 | .data directive is used                     
  • to indicate the ending of the data section
  • to indicate the beginning of the data section
  • to declare all the source operands
  • to initialize the operands
Q7 | The instruction used to multiply operands yielding a double integer outcome is                     
  • mul
  • imul
  • dmul
  • emul
Q8 | SIMD stands for                       
  • single instruction multiple data
  • simple instruction multiple decoding
  • sequential instruction multiple decoding
  • system information mutable data
Q9 | In case of multimedia extension instructions, the pixels are encoded into a data item of                     
  • 16 bit
  • 32 bit
  • 24 bit
  • 8 bit
Q10 | The MMX (Multimedia Extension) operands are stored in                       
  • general purpose registers
  • banked registers
  • float point registers
  • graphic registers
Q11 | The division operation in IA-32 is a single operand instruction so it is assumed that                         
  • the divisor is stored in the eax register
  • the dividend is stored in the eac register
  • the divisor is stored in the accumulator
  • the dividend is stored in the accumulator
Q12 | Any condition that causes a processor to stall is called as                     
  • hazard
  • page fault
  • system error
  • none of the mentioned
Q13 | The stalling of the processor due to the unavailability of the instructions is called as                         
  • control hazard
  • structural hazard
  • input hazard
  • none of the mentioned
Q14 | The contention for the usage of a hardware device is called               
  • structural hazard
  • stalk
  • deadlock
  • none of the mentioned
Q15 | The pipeline bubbling is a method used to prevent data hazard and structural hazards.
  • true
  • false
Q16 |                           method is used in centralized systems to perform out of order execution.
  • scorecard
  • score boarding
  • optimizing
  • redundancy
Q17 | The algorithm followed in most of the systems to perform out of order execution is                       
  • tomasulo algorithm
  • score carding
  • reader-writer algorithm
  • none of the mentioned
Q18 | The problem where process concurrency becomes an issue is called as                         
  • philosophers problem
  • bakery problem
  • bankers problem
  • reader-writer problem
Q19 | The set of loosely connected computers are called as                       
  • lan
  • wan
  • workstation
  • cluster
Q20 | Each computer in a cluster is connected using                       
  • utp
  • rj-45
  • stp
  • coaxial cable
Q21 | The computer cluster architecture emerged as a result of                     
  • isa
  • workstation
  • super computers
  • distributed systems
Q22 | The software which governs the group of computers is                       
  • driver rd45
  • interface ui
  • clustering middleware
  • distributor
Q23 | The cluster formation in which the work is divided equally among the systems is               
  • load-configuration
  • load-division
  • light head
  • both load-configuration and load- division
Q24 | In the client server model of the cluster                     approach is used.
  • load configuration
  • fifo
  • bankers algorithm
  • round robin
Q25 | The most common modes of communication in clusters are               
  • message queues
  • message passing interface
  • pvm
  • both message passing interface and pvm