The difference between ASCII and Unicode is

The difference between ASCII and Unicode is



A. Unicode is used by Java and ASCII is used by Microsoft.
B. Apple only uses ASCII
C. Unicode represents up to 256 characters, and ASCII represents up to 65536 characters.
D. ASCII is used in Java and unicode is used by Microsoft
E. Unicode can represent more characters than ASCII.
F. ASCII represents up to 256 characters, and Unicode represents up to 65536 characters.
G. ASCII is popular in foreign languages and Unicode is not


Answer:

E. Unicode can represent more characters than ASCII.
F. ASCII represents up to 256 characters, and Unicode represents up to 65536 characters.

Storage and use of decimal numbers for computation in computers is

Storage and use of decimal numbers for computation in computers is



A. Unpopular because the standards are complicated.
B. A good idea years ago, but no longer necessary because of cheap memory.
C. Never used anymore.
D. Sometimes useful in financial applications.
E. Inefficient because numbers are more accurately represented in binary
F. Becoming more likely with the advent of multicore processors
G. More difficult to implement and consumes more memory than needed.


Answer:

D. Sometimes useful in financial applications.
G. More difficult to implement and consumes more memory than needed.

What MIPS registers bound the local variable storage area for a subroutine?

What MIPS registers bound the local variable storage area for a subroutine?



A. $gp and $fp
B. The stack pointer and the frame pointer.
C. $fp and $sp
D. $ra and $sp
E. The stack pointer and the return address.
F. The frame pointer and the global pointer.
G. $sp and $gp


Answer:

B. The stack pointer and the frame pointer.
C. $fp and $sp

In a recursive procedure

In a recursive procedure 



A. $t register values must be preserved
B. Local storage must be allocated on the stack.
C. $ra does not have to be preserved.
D. JAL is never used.


Answer: B. Local storage must be allocated on the stack.

If subroutine A calls subroutine B

If subroutine A calls subroutine B



A. Subroutine B must preserve $ra.
B. Neither subroutine needs to preserve $ra; it is automatically saved.
C. Subroutine A is a non-leaf subroutine.
D. Subroutine A must preserve $ra.
E. There is no convention as long as the code works.
F. No stack space is needed.
G. Subroutine A is a leaf routine.

Answer:


C. Subroutine A is a non-leaf subroutine.
D. Subroutine A must preserve $ra.

The jal instruction is unique because it also

The jal instruction is unique because it also



A. Does not update the program counter
B. Checks the $ra before it branches
C. Writes to the $ra register
D. Always executes (i.e., it is not conditional)
E. Copies $pc to $ra
F. Operates on four registers
G. Resets the $pc register


Answer:

C. Writes to the $ra register
E. Copies $pc to $ra

A good argument for MIPS not having a hardware instruction for "branch on less than" is:

A good argument for MIPS not having a hardware instruction for "branch on less than" is: 



A. It can be produced from two simple instructions
B. The space on the silicon to implement the instruction would reduce the size of cache.
C. The complexity of the instruction would stretch the clock cycle for many more, less complicated instructions.
D. Because of its complexity the instruction would sink more power causing the chip to heat up too much.
E. The MIPS assembler can do it.
F. It gives students something to think about.
G. It is a pseudo instruction.


Answer: A. It can be produced from two simple instructions
C. The complexity of the instruction would stretch the clock cycle for many more, less complicated instructions.

To create all conditions for branches, MIPS uses which set of instructions?

To create all conditions for branches, MIPS uses which set of instructions?



A. slt, slti, beq, bne, and the $zero register
B. The $0 register, slt/slti and bne/beq
C. beqz, addi, add, sub
D. sll, srl, beq, bne, and the $zero register
E. j, jne, jeq, jal and the $zero register
F. blt, bgt, blte, bgte
G. blt, bgt, lgbt


Answer:

A. slt, slti, beq, bne, and the $zero register
B. The $0 register, slt/slti and bne/beq

A conditional branch is appropriate for

A conditional branch is appropriate for



A. Transferring control to a different part of the program.
B. A loop
C. Checking for a zero denominator.
D. Shifting a register right or left
E. Termination of a program
F. Jumping to a new location.
G. A subroutine call


Answer:

B. A loop
C. Checking for a zero denominator.

The BEQ and BNE instructions are

The BEQ and BNE instructions are



A. Offsets
B. Conditional branches
C. Jumps
D. GOTOs
E. Unconditional branches
F. Not jumps
G. Labels


Answer:

B. Conditional branches
F. Not jumps

The easiest conversion is from

The easiest conversion is from



A. hexadecimal to decimal
B. Decimal to Hexadecimal.
C. Decimal to Binary
D. binary to decimal
E. Binary to hexadecimal
F. Hexadecimal to binary.
G. positive to negative


Answer:

E. Binary to hexadecimal
F. Hexadecimal to binary.

All MIPS instructions have

All MIPS instructions have



A. Embedded memory addresses
B. A function code
C. A byte which indicates how long it is
D. An Operations Code field
E. Immediate data
F. A field for the Rd register
G. Length of 32 bits


Answer:


D. An Operations Code field
G. Length of 32 bits

The problem with one's-complement representation of negative numbers was

The problem with one's-complement representation of negative numbers was



A. There were more positive numbers than negative
B. There were two zeroes
C. It confused the programmers
D. There were more negative numbers than positive
E. It was hard to recognize the difference between positive and negative numbers
F. It was more difficult to implement than twos-complement
G. There is no such thing as one's complement.


Answer:

B. There were two zeroes
F. It was more difficult to implement than twos-complement

Immediate operands are

Immediate operands are



A. Data located in registers
B. Data located in cache
C. Data located in the instruction itself
D. Data encoded in the instruction
E. Calculated from register values
F. Obtained by adding an offset to a register
G. Data located in main memory


Answer:

C. Data located in the instruction itself
D. Data encoded in the instruction

Memory alignment means

Memory alignment means



A. All eight bits of a byte must reside on the same chip
B. 4-byte words must begin on 4-byte boundaries
C. More than one word can be read from memory at once
D. Dynamic RAM is faster than Static RAM
E. The bottom two bits of a MIPS instruction address must be zero
F. Memory chips must be placed next to each other
G. Similar data items are placed next to each other in memory

Answer:


B. 4-byte words must begin on 4-byte boundaries
E. The bottom two bits of a MIPS instruction address must be zero

What is the reason that addresses of integer data stored in main memory must have the last two bits set to 0?

What is the reason that addresses of integer data stored in main memory must have the last two bits set to 0?



A. The data bus is only 30 bits wide
B. The cache can operate more efficiently
C. There is an alignment restriction
D. Words must be eight-byte aligned
E. Word data must be four-byte aligned
F. Data can be located anywhere in memory.
G. Memory is scarce and must be used efficiently


Answer:


C. There is an alignment restriction
E. Word data must be four-byte aligned

In MIPS, data is moved to and from memory using

In MIPS, data is moved to and from memory using



A. Branch instructions
B. Load and Store instructions
C. I-type add and subtract instructions
D. Data transfer instructions
E. R-type add and subtract instructions
F. Value instructions
G. Argument instructions

Answer:


B. Load and Store instructions
D. Data transfer instructions

The C code "d = a - e" could be represented in MIPS assembly as

The C code "d = a - e" could be represented in MIPS assembly as



A. sub $t0, $t1, $t2 where d=$t0, a=$t2 and e=$t1
B. SUB a, e, d
C. sub $t0, $t1, $t2 where d=$t0, a=$t1 and e=$t2
D. SUB d, a, e
E. SUB d, e, a
F. sub $t0, $t2, $t1 where d=$t0, a=$t1 and e=$t2
G. d SUB a, e


Answer:


C. sub $t0, $t1, $t2 where d=$t0, a=$t1 and e=$t2
D. SUB d, a, e

The vocabulary of the CPU is the

The vocabulary of the CPU is the



A. Instruction set
B. Organization
C. Datapath
D. Description
E. Architecture
F. Programs
G. Instructions


Answer:

A. Instruction set
G. Instructions

What is the vocabulary of commands understood by the processor?

What is the vocabulary of commands understood by the processor?



A. The instructions
B. The instruction set architecture
C. The intermediate code
D. The instruction set
E. The assembly language
F. The byte code
G. The binary executable


Answer:


A. The instructions
D. The instruction set

Adding more cores to a processor will not improve performance if

Adding more cores to a processor will not improve performance if



A. The cores are all the same size
B. The program only contains steps which must be executed in sequence
C. Several parts of the problem can be worked on at once
D. No part of the program can be done in parallel with another part
E. More cores means more power consumption
F. Program execution speed depends on the clock frequency
G. The program can be broken into multiple parallel paths


Answer:


B. The program only contains steps which must be executed in sequence
D. No part of the program can be done in parallel with another part

To get a better picture of CPU performance

To get a better picture of CPU performance



A. The industry has standards for honesty and integrity in testing
B. Tests are run multiple times
C. Customers are allowed to assess CPU performance on their own
D. A suite of benchmark programs is used


Answer: D. A suite of benchmark programs is used

SPEC benchmarks are

SPEC benchmarks are



A. Unreliable because testers cheat
B. Obsolete because of recent innovations in chip design
C. A long-standing set of standard test programs
D. A brand new way to measure performance


Answer: C. A long-standing set of standard test programs

One of Hennessy and Patterson design rules is

One of Hennessy and Patterson design rules is



A. Make the instruction set as compact as possible
B. Make the common case fast
C. Memory is cheap
D. Get the product to market as soon as possible


Answer: B. Make the common case fast

The big problem with the switch to multi-processing is that

The big problem with the switch to multi-processing is that



A. More heat-sinking is required
B. Performance measures are very different
C. The chips are more difficult to manufacture
D. Programmers have to think differently


Answer: D. Programmers have to think differently

How can a CPI of less than 1.0 be achieved?

How can a CPI of less than 1.0 be achieved?



A. Executing fewer instructions
B. Shorter instructions
C. Faster clock cycle time
D. Issuing multiple instructions per clock cycle


Answer: D. Issuing multiple instructions per clock cycle

The execution time of a program is related to

The execution time of a program is related to



A. The number of instructions times the clock speed.
B. The average CPI times the clock speed.
C. The number of instructions times the average CPI for the program.
D. The number of instructions divided by the clock speed


Answer: C. The number of instructions times the average CPI for the program.

Which of the following is a typical challenge for computer designers

Which of the following is a typical challenge for computer designers



A. Building machines which appeal to both men and women.
B. Balancing the size of memory and the weight of the machine.
C. The tradeoff between the number of clock cycles needed for a program to execute and the length of each clock cycle.
D. Staying awake during the boring parts of class.


Answer: C. The tradeoff between the number of clock cycles needed for a program to execute and the length of each clock cycle.

Sometimes improving bandwidth as opposed to latency is a way of improving performance. Which is an example of improving bandwidth?

Sometimes improving bandwidth as opposed to latency is a way of improving performance. Which is an example of improving bandwidth?



A. Making exams shorter so they can be graded faster
B. More open cashier lanes in the food court
C. Raising the speed limit on I-25 to Denver
D. More streamlined procedures for cashiers in the food court
E. Faster cash registers in the cashier lanes
F. Adding more lanes on I-25 to Denver


Answer:


G. Moving dorms closer to classroom buildings so students can get to class faster
B. More open cashier lanes in the food court
F. Adding more lanes on I-25 to Denver

Performance and execution time are

Performance and execution time are



A. The same thing
B. proportionally related
C. Inversely related
D. exponentially related


Answer: C. Inversely related

Quantification of performance can be multi-dimensional. What difficulty does this pose?

Quantification of performance can be multi-dimensional. What difficulty does this pose?



A. Understanding the different dimensions of performance at the same time.
B. Transforming performance to a unidimensional scale so that results can be compared.
C. Knowing whether or not the measurements in different dimensions are equally accurate.
D. Trusting the numbers because statistics can lie.


Answer: B. Transforming performance to a unidimensional scale so that results can be compared.

A major problem in measuring performance of a computer is

A major problem in measuring performance of a computer is



A. It can be measured several ways
B. Laughing at the English translation of the instruction manual
C. It is impossible to match conditions from run to run
D. Variations in he manufacturing process


Answer: A. It can be measured several ways

A major difficulty in determining performance is that it

A major difficulty in determining performance is that it



A. No longer relevant in today's computing market
B. Is application dependent
C. Is heavily influenced by marketing
D. Can be measured in different ways
E. Takes a long time to do accurately
F. Can be affected by other components in the computer
G. Is largely independent of the processor itself


Answer:

B. Is application dependent
D. Can be measured in different ways

The chip manufacturing process begins with

The chip manufacturing process begins with



A. Checking the wafer for defects
B. A silicon ingot
C. A large, sausage-shaped piece of silicon
D. Slicing and dicing
E. Slices of silicon about 0.1" thick
F. Photolithography
G. Doping the silicon surface


Answer:

B. A silicon ingot
C. A large, sausage-shaped piece of silicon

Silicon is a

Silicon is a



A. Conductor
B. Insulator
C. Semiconductor
D. Transductor


Answer: C. Semiconductor

A problem with flash memory is that

A problem with flash memory is that



A. The number of writes are limited
B. It is cheaper but slower than magnetic media
C. It cannot be made dense enough (bits/mm^2) to be efficient
D. The bits wear out after too many writes
E. It is more expensive than static RAM
F. It loses its memory when power is turned off
G. The bits are easy to write but difficult to read


Answer:


A. The number of writes are limited
D. The bits wear out after too many writes

Instruction Set Architecture has to do with

Instruction Set Architecture has to do with



A. The layout of circuits on the CPU chip
B. The size and shape of the computer
C. The relationship between the number of cores in a CPU and its ability to exploit parallelism
D. The interface between the lowest level of software and the hardware
E. Die Yield
F. The heat load on the processor when it is running
G. Instructions, register use, memory addressing and I/O operations


Answer:


D. The interface between the lowest level of software and the hardware
G. Instructions, register use, memory addressing and I/O operations

Which is not a characteristic of Dynamic Random Access Memory (DRAM) (20)

Which is not a characteristic of Dynamic Random Access Memory (DRAM) (20)



A. Refresh cycles are required to retain bit settings (1 or 0)
B. It operates on a slower clock than the CPU
C. It is used for cache
D. It takes very little power
E. It uses one or two transistors per bit
F. It is the most dense in terms of bits per area on a chip
G. It is one of the fastest types of random access memory


Answer:

C. It is used for cache
G. It is one of the fastest types of random access memory