On This Page
This set of Computer Architecture Multiple Choice Questions & Answers (MCQs) focuses on Computer Architecture Set 7
Q1 | What are the different modes of operation of a computer?
- user and system mode
- user and supervisor mode
- supervisor and trace mode
- supervisor, user and trace mode
Q2 | The instructions which can be run only supervisor mode are?
- non-privileged instructions
- system instructions
- privileged instructions
- exception instructions
Q3 | How is a privilege exception dealt with?
- the program is halted and the system switches into supervisor mode and restarts the program execution
- the program is stopped and removed from the queue
- the system switches the mode and starts the execution of a new process
- the system switches mode and runs the debugger
Q4 | The DMA differs from the interrupt mode by
- the involvement of the processor for the operation
- the method of accessing the i/o devices
- the amount of data transfer possible
- none of the mentioned
Q5 | The DMA transfers are performed by a control circuit called as
- device interface
- dma controller
- data controller
- overlooker
Q6 | In DMA transfers, the required signals and addresses are given by the
- processor
- device drivers
- dma controllers
- the program itself
Q7 | After the completion of the DMA transfer, the processor is notified by
- acknowledge signal
- interrupt signal
- wmfc signal
- none of the mentioned
Q8 | When the R/W bit of the status register of the DMA controller is set to 1.
- read operation is performed
- write operation is performed
- read & write operation is performed
- none of the mentioned
Q9 | The controller is connected to the
- processor bus
- system bus
- external bus
- none of the mentioned
Q10 | Can a single DMA controller perform operations on two different disks simultaneously?
- true
- false
Q11 | The technique whereby the DMA controller steals the access cycles of the processor to operate is called
- fast conning
- memory con
- cycle stealing
- memory stealing
Q12 | The technique where the controller is given complete access to main memory is
- cycle stealing
- memory stealing
- memory con
- burst mode
Q13 | The controller uses to help with the transfers when handling network interfaces.
- input buffer storage
- signal enhancers
- bridge circuits
- all of the mentioned
Q14 | To overcome the conflict over the possession of the BUS we use
- optimizers
- bus arbitrators
- multiple bus structure
- none of the mentioned
Q15 | The registers of the controller are
- 64 bits
- 24 bits
- 32 bits
- 16 bits
Q16 | When the process requests for a DMA transfer?
- then the process is temporarily suspended
- the process continues execution
- another process gets executed
- process is temporarily suspended & another process gets executed
Q17 | The DMA transfer is initiated by
- processor
- the process being executed
- i/o devices
- os
Q18 | To resolve the clash over the access of the system BUS we use
- multiple bus
- bus arbitrator
- priority access
- none of the mentioned
Q19 | The device which is allowed to initiate data transfers on the BUS at any time is called
- bus master
- processor
- bus arbitrator
- controller
Q20 | BUS arbitration approach uses the involvement of the processor.
- centralised arbitration
- distributed arbitration
- random arbitration
- all of the mentioned
Q21 | The circuit used for the request line is a
- open-collector
- ex-or circuit
- open-drain
- nand circuit
Q22 | The Centralised BUS arbitration is
- acknowledge signal
- bus grant signal
- response signal
- none of the mentioned
Q23 | Once the BUS is granted to a device
- it activates the bus busy line
- performs the required operation
- raises an interrupt
- all of the mentioned
Q24 | When the processor receives the request from a device, it responds by sending
- open-drain circuit
- open-collector circuit
- ex-or circuit
- nor circuit
Q25 | After the device completes its operation assumes the control of the BUS.
- another device
- processor
- controller
- none of the mentioned