On This Page
This set of Computer Architecture Multiple Choice Questions & Answers (MCQs) focuses on Computer Architecture Set 17
Q1 | The LEA mnemonic is used to
- load the effective address of an instruction
- load the values of operands onto an accumulator
- declare the values as global constants
- store the outcome of the operation at a memory location
Q2 | The instructions of IA-32 machines are of length up to
- 4 bytes
- 8 bytes
- 16 bytes
- 12 bytes
Q3 | The bit present in the op code, indicating which of the operands is the source is called as
- src bit
- indirection bit
- direction bit
- frm bit
Q4 | The instruction used to cause unconditional jump is
- ujg
- jg
- jmp
- goto
Q5 | instruction is used to check the bit of the condition flags.
- test
- tb
- check
- bt
Q6 | .data directive is used
- to indicate the ending of the data section
- to indicate the beginning of the data section
- to declare all the source operands
- to initialize the operands
Q7 | The instruction used to multiply operands yielding a double integer outcome is
- mul
- imul
- dmul
- emul
Q8 | SIMD stands for
- single instruction multiple data
- simple instruction multiple decoding
- sequential instruction multiple decoding
- system information mutable data
Q9 | In case of multimedia extension instructions, the pixels are encoded into a data item of
- 16 bit
- 32 bit
- 24 bit
- 8 bit
Q10 | The MMX (Multimedia Extension) operands are stored in
- general purpose registers
- banked registers
- float point registers
- graphic registers
Q11 | The division operation in IA-32 is a single operand instruction so it is assumed that
- the divisor is stored in the eax register
- the dividend is stored in the eac register
- the divisor is stored in the accumulator
- the dividend is stored in the accumulator
Q12 | Any condition that causes a processor to stall is called as
- hazard
- page fault
- system error
- none of the mentioned
Q13 | The stalling of the processor due to the unavailability of the instructions is called as
- control hazard
- structural hazard
- input hazard
- none of the mentioned
Q14 | The contention for the usage of a hardware device is called
- structural hazard
- stalk
- deadlock
- none of the mentioned
Q15 | The pipeline bubbling is a method used to prevent data hazard and structural hazards.
- true
- false
Q16 | method is used in centralized systems to perform out of order execution.
- scorecard
- score boarding
- optimizing
- redundancy
Q17 | The algorithm followed in most of the systems to perform out of order execution is
- tomasulo algorithm
- score carding
- reader-writer algorithm
- none of the mentioned
Q18 | The problem where process concurrency becomes an issue is called as
- philosophers problem
- bakery problem
- bankers problem
- reader-writer problem
Q19 | The set of loosely connected computers are called as
- lan
- wan
- workstation
- cluster
Q20 | Each computer in a cluster is connected using
- utp
- rj-45
- stp
- coaxial cable
Q21 | The computer cluster architecture emerged as a result of
- isa
- workstation
- super computers
- distributed systems
Q22 | The software which governs the group of computers is
- driver rd45
- interface ui
- clustering middleware
- distributor
Q23 | The cluster formation in which the work is divided equally among the systems is
- load-configuration
- load-division
- light head
- both load-configuration and load- division
Q24 | In the client server model of the cluster approach is used.
- load configuration
- fifo
- bankers algorithm
- round robin
Q25 | The most common modes of communication in clusters are
- message queues
- message passing interface
- pvm
- both message passing interface and pvm