Hello World
Quiz by , created more than 1 year ago

Quiz on CSA IITU Part 1 (235), created by Hello World on 20/12/2017.

1734
22
0
No tags specified
Hello World
Created by Hello World over 6 years ago
Close

CSA IITU Part 1 (235)

Question 1 of 118

1

130. How many bytes equals Petabyte (PB)?

Select one of the following:

  • · Quadrillion

  • · Million

  • · Trillion

  • · Billion

  • · 1000

Explanation

Question 2 of 118

1

129. Which one of the following is a memory whose duty is to store most frequently used data?

Select one of the following:

  • · Main memory

  • · Cache

  • · ROM

  • · Auxiliary memory

  • · PROM

Explanation

Question 3 of 118

1

128. The digital circuit that generates the arithmetic sum of two binary numbers of any length is ___.

Select one of the following:

  • · Binary Adder

  • · Full Adder

  • · Half Adder

  • · Adder

  • · OR gate

Explanation

Question 4 of 118

1

127. The key technology used in IV generation computers is ___.

Select one of the following:

  • · MSI

  • · SSI

  • · LSI & VLSI

  • · Transistors

  • · Vacuum Tubes

Explanation

Question 5 of 118

1

126. The computer architecture having stored program is ___.

Select one of the following:

  • · Harvard

  • · Von Neumann

  • · Pascal

  • · Ada

  • · Cobol

Explanation

Question 6 of 118

1

125. Stack is a ___list.

Select one of the following:

  • · FIFO

  • · LIFO

  • · FILO

  • · OFLI

Explanation

Question 7 of 118

1

124. CACHE memory is implemented using ___.

Select one of the following:

  • · Dynamic RAM

  • · Static RAM

  • · EA RAM

  • · ED RAM

  • · EP RAM

Explanation

Question 8 of 118

1

123. What does D stand for in a D flip-flop?

Select one of the following:

  • · Direct

  • · Don’t care

  • · Data

  • · Device

  • · Disk

Explanation

Question 9 of 118

1

104. What is a Capacity?

Select one of the following:

  • · cache is too small to hold all data needed by program, occur even under perfect replacement policy

  • · first-reference to a block, occur even with infinite cache

  • · misses that occur because of collisions due to less than full associativity

Explanation

Question 10 of 118

1

103. What is a Compulsory?

Select one of the following:

  • · first-reference to a block, occur even with infinite cache

  • · cache is too small to hold all data needed by program, occur even under perfect replacement policy

  • · misses that occur because of collisions due to less than full associativity

Explanation

Question 11 of 118

1

39. 74. How many elements of the Instruction Set Architecture (ISA)

Select one of the following:

  • 8

  • 7

  • 6

Explanation

Question 12 of 118

1

38. 73. What is the MISD one of the categories of computers?

Select one of the following:

  • Multiple Instruction Streams, Multiple Data Streams

  • Multiple Instructions Streams, Single Data Stream

  • Multiple Instruction Streams, Set Data Stream

Explanation

Question 13 of 118

1

36. 72. What is the Instruction Level Parallelism

Select one of the following:

  • Exploits data-level parallelism at modest levels with computer help using ideas like pipelining and at medium levels using ideas like speculative execution

  • Exploit data-level parallelism by applying a single instruction to a collection of data in parallel

  • Exploits parallelism among largely decoupled tasks specified by the programmer or operating system

Explanation

Question 14 of 118

1

35. 71. What is the Request Level Parallelism

Select one of the following:

  • Exploit data-level parallelism by applying a single instruction to a collection of data in parallel

  • Exploits either data-level parallelism or task-level parallelism in a tightly coupled hardware model that allows for interaction among parallel threads

  • Exploits parallelism among largely decoupled tasks specified by the programmer or operating system

Explanation

Question 15 of 118

1

34. 70. What is the Thread Level Parallelism

Select one of the following:

  • Exploits either data-level parallelism or task-level parallelism in a tightly coupled hardware model that allows for interaction among parallel threads

  • Exploits parallelism among largely decoupled tasks specified by the programmer or operating system

  • Exploit data-level parallelism by applying a single instruction to a collection of data in parallel

Explanation

Question 16 of 118

1

33. 69. What is the Vector Architectures and Graphic Processor Units (GPUs)

Select one of the following:

  • Exploits data-level parallelism at modest levels with computer help using ideas like pipelining and at medium levels using ideas like speculative execution

  • Exploit data-level parallelism by applying a single instruction to a collection of data in parallel

  • Exploits parallelism among largely decoupled tasks specified by the programmer or operating system

Explanation

Question 17 of 118

1

32. 68. The Application of Brokerage operations how many cost of downtime per hour?

Select one of the following:

  • 8.870.000$

  • 7.550.000$

  • 6.450.000$

Explanation

Question 18 of 118

1

31. 67. What is the PMD in computer classes?

Select one of the following:

  • Percentage map device

  • Personal mobile device

  • Peak maze development

  • Powerful markup distance

Explanation

Question 19 of 118

1

30. 66. Which distance of price has Clusters/warehouse-scale computers?

Select one of the following:

  • 100 – 100.000$

  • 100.000 – 200.000.000$

  • 5.000 – 10.000.000$

Explanation

Question 20 of 118

1

29. 65. How many classes of computers classified?

Select one of the following:

  • 7

  • 3

  • 5

Explanation

Question 21 of 118

1

28. 64. What is the RLP?

Select one of the following:

  • Request Level Parallelism

  • Research Level Parallelism

  • Random Level Parallelism

Explanation

Question 22 of 118

1

27. 63. How much in percentage single-processor performance improvement has dropped to less than?

Select one of the following:

  • 22%

  • 33%

  • 11%

Explanation

Question 23 of 118

1

26. 62. When single-processor performance improvement has dropped?

Select one of the following:

  • 2003

  • 2002

  • 2004

Explanation

Question 24 of 118

1

25. 61. What is a RISC computers?

Select one of the following:

  • Rational Interruptible Security Computer

  • Research Interconnect Several Computer

  • Reduced Instruction Set Computer

Explanation

Question 25 of 118

1

24. 56. Choose the right formula of AMAT(в базе был неверный ответ можете попробовать подать апелляцию)

Select one of the following:

  • Average Memory Access time = Hit Time + Miss Rate * Miss penalty

  • Average Memory Access time = Hit Rate + Miss Rate * Miss penalty

  • Average Memory Access time = Hit Time + Miss time * Miss penalty

  • Average Memory Access time = Hit Rate + Miss time * Miss penalty

Explanation

Question 26 of 118

1

23. What is the total number of writes that hit in the cache?

Select one of the following:

  • 588

  • 784

  • 12.5%

  • 0.25%

Explanation

Question 27 of 118

1

22. 30. Definition of Block address:

Select one of the following:

  • minimum unit that is presented or not present

  • location of block in memory

  • percentage of item not found in upper level

  • time to access upper level

  • memory closer to processor

Explanation

Question 28 of 118

1

20. 28. Definition of Block:

Select one of the following:

  • minimum unit that is presented or not present

  • location of block in memory

  • percentage of item not found in upper level

  • memory closer to processor

  • time to access upper level

Explanation

Question 29 of 118

1

19. 27. What do you call the given statement as for type of memory?: “High density, low power, cheap, slow, need to be “refreshed” regularly”

Select one of the following:

  • SRAM

  • DRAM

  • RAM

Explanation

Question 30 of 118

1

18. 26. Performance of a machine is determined by:

Select one of the following:

  • Instruction count, Clock cycle time, Correlating predictors

  • Instruction count, Clock cycle time, Clock cycle per instruction

  • Clock cycle time, Correlating predictors, Aggressive instruction

  • Clock cycle time, Clock cycles per instruction, Correlating Predictors

Explanation

Question 31 of 118

1

17. 25. Pipe-lining is a unique feature of ___.

Select one of the following:

  • CISC

  • IANA

  • ISA

  • RISC

Explanation

Question 32 of 118

1

16. 24. The iconic feature of the RISC machine among the following are

Select one of the following:

  • Increased memory size

  • Reduced number of addressing modes

  • Having a branch delay slot

  • All of the above

Explanation

Question 33 of 118

1

15. 23. The Sun micro systems processors usually follow ___ architecture.

Select one of the following:

  • CISC

  • ISA

  • ULTRA SPARC

  • RISC

Explanation

Question 34 of 118

1

14. 22. Of the following, identify the memory usually written by the manufacturer.

Select one of the following:

  • RAM

  • DRAM

  • SRAM

  • ROM

  • Cache Memory

Explanation

Question 35 of 118

1

13. 21. What do you call the given statement as “The number successful accesses to memory stated as a fraction.”

Select one of the following:

  • Hit rate

  • Miss rate

  • Access rate

  • Success rate

Explanation

Question 36 of 118

1

12. 20. How many instructions can be implemented in MIPS?

Select one of the following:

  • 2 clock cycles

  • 3 clock cycles

  • 4 clock cycles

  • 5 clock cycles

Explanation

Question 37 of 118

1

19. The secondary effect that results from instruction scheduling in large code segments is called ___?

Select one of the following:

  • Aggressive instruction

  • Correlating predictors

  • Register predictors

  • Register pressure

Explanation

Question 38 of 118

1

10. 18. The CISC stands for?

Select one of the following:

  • Computer Instruction Set Compliment

  • Complete Instruction Set Compliment

  • Computer Indexed Set Components

  • Complex Instruction Set Computer

Explanation

Question 39 of 118

1

9. Assembly line operation is also called as?

Select one of the following:

  • Pipelining process

  • Superscalar operation

  • None of the mentioned

  • Von Neumann cycle

Explanation

Question 40 of 118

1

8. 16. Can you solve the Dining Philosophers’ Problem using monitors?

Select one of the following:

  • Yes

  • No

  • Yes, but only if there are less than five philosophers

  • No, unless there are more than five philosophers

Explanation

Question 41 of 118

1

7. 15. The central themes of operating system design are all concerned with the management of processes and threads?

Select one of the following:

  • Multiprogramming, multiprocessing, distributed processing

  • Multitasking, multiprogramming, multithreading

  • Multiprocessing, uniprocessing, multitasking

  • Multithreading, distributed processing, uniprocessing

Explanation

Question 42 of 118

1

6. 14. Much of the work in security and protection as it relates to operating systems can be roughly grouped into four categories?

Select one of the following:

  • Availability, confidentiality, data integrity, authenticity

  • Safety, accountability, reliability, density

  • Usability, integrity, confidentiality, reliability

  • Flexibility, availability, accountability, authenticity

Explanation

Question 43 of 118

1

5. 13. Which of the following principles has Deadlock?

Select one of the following:

  • Execution, Association, Starvation

  • Prevention, Avoidance, Detection

  • Starvation, Detection, Exclusion

  • Exclusion, Avoidance, Starvation

Explanation

Question 44 of 118

1

4. 12. How many principles has Deadlock?

Select one of the following:

  • 3

  • 5

  • 2

  • 6

Explanation

Question 45 of 118

1

3. 11. Three techniques are possible for I/O operations:

Select one of the following:

  • Programmed I/O, Interrupt-driven I/O, Direct memory access(DMA)

  • Machine I/O, Architecture I/O, Hardware I/O

  • Object-oriented I/O, Design I/O, Usable I/O

  • Control I/O, Status I/O, Transfer I/O

Explanation

Question 46 of 118

1

2. 10. Cache Design has these properties?

Select one of the following:

  • Size, search function, write function, read policy, vector algorithm

  • Size, mapping algorithm, vector function, write policy, replacement function

  • Size, blocking algorithm, search function, replacement vector, read policy

  • Size, block size, mapping function, replacement algorithm, write policy

Explanation

Question 47 of 118

1

1. In Memory Hierarchy, at the Inboard storage which of the following are included:

Select one of the following:

  • Magnetic disk

  • Magnetic tape

  • Optical disk

  • Main memory

Explanation

Question 48 of 118

1

180. In Memory Hierarchy, at the Off-line storage which of the following are included:

Select one of the following:

  • • Cache

  • • Magnetic disk

  • • Magnetic tape

  • • Main memory

Explanation

Question 49 of 118

1

179. In Memory Hierarchy, at the Outboard storage which of the following are included:

Select one of the following:

  • • Cache

  • • Main memory

  • • Magnetic tape

  • • Magnetic disk

Explanation

Question 50 of 118

1

178. How many parts of Memory Hierarchy?

Select one of the following:

  • • 5

  • • 4

  • • 2

  • • 3

Explanation

Question 51 of 118

1

177. Which one is concerning to fallacy?

Select one of the following:

  • o Predicting cache performance of one program from another

  • o Simulating enough instructions to get accurate performance measures of the memory hierarchy

  • o Implementing a virtual machine monitor on an instruction set architecture that wasn’t designed to be virtualizable

  • o Over emphasizing memory bandwidth in DRAMs

Explanation

Question 52 of 118

1

176. Which one is NOT concerning to pitfall?

Select one of the following:

  • o Simulating enough instructions to get accurate performance measures of the memory hierarchy

  • o Implementing a virtual machine monitor on an instruction set architecture that wasn’t designed to be virtualizable

  • o Over emphasizing memory bandwidth in DRAMs

  • o Predicting cache performance of one program from another

Explanation

Question 53 of 118

1

175. ChoosetheEleventhOptimization

Select one of the following:

  • o Compiler-Controlled Prefetching to Reduce Miss Penalty or Miss Rate

  • o Merging Write Buffer to Reduce Miss Penalty

  • o Hardware Prefetching of Instructions and Data to Reduce Miss Penalty or Miss Rate

  • o None of them

Explanation

Question 54 of 118

1

174. ChoosetheEightOptimization

Select one of the following:

  • o Merging Write Buffer to Reduce Miss Penalty

  • o Critical word first

  • o Nonblocking Caches to Increase Cache Bandwidth

  • o Trace Caches to Reduce Hit Time

Explanation

Question 55 of 118

1

173. Choose the strategy of Seventh Optimization.

Select one of the following:

  • o Critical restart

  • o Critical word first

  • o Sequential inter leaving

  • o Merging Write Buffer to Reduce Miss Penalty

Explanation

Question 56 of 118

1

172. Choose the benefit of Cache Optimization.

Select one of the following:

  • o Larger block size to reduce miss rate

  • o Bigger caches to increase miss rat

  • o Single level caches to reduce miss penalty

  • o None of them

Explanation

Question 57 of 118

1

171. What is conflict in Cs model?

Select one of the following:

  • o If the block placement strategy is not fully associative, conflict misses (in addition to compulsory and capacity misses) will occur because a block may be discarded and later retrieved if conflicting blocks map to its set

  • o The very first access to a block cannot be in the cache, so the block must be brought into the cache. Compulsory misses are those that occur even if you had an infinite cache.

  • o If the cache cannot contain all the blocks needed during execution of a program, capacity misses (in addition to compulsory misses) will occur because of blocks being discarded and later retrieved

  • o None of them

Explanation

Question 58 of 118

1

170. What is capacityin Cs model?

Select one of the following:

  • o If the cache cannot contain all the blocks needed during execution of a program, capacity misses (in addition to compulsory misses) will occur because of blocks being discarded and later retrieved

  • o The very first access to a block cannot be in the cache, so the block must be brought into the cache. Compulsory misses are those that occur even if you had an infinite cache.

  • o The number of accesses that miss divided by the number of accesses.

  • o None of them

Explanation

Question 59 of 118

1

169. What is the compulsory in Cs model?

Select one of the following:

  • o The very first access to a block cannot be in the cache, so the block must be brought into the cache. Compulsory misses are those that occur even if you had an infinite cache.

  • o The number of accesses that miss divided by the number of accesses.

  • o None of them

  • o If the cache cannot contain all the blocks needed during execution of a program, capacity misses (in addition to compulsory misses) will occur because of blocks being discarded and later retrieved

Explanation

Question 60 of 118

1

168. How many branch-selected entries are in a (2,2) predictor that has a total of 8K bits in the prediction buffer? If we know that Number of prediction entries selected by the branch = 8K

Select one of the following:

  • o the number of prediction entries selected by the branch = 1K.

  • o the number of prediction entries selected by the branch = 2K.

  • o the number of prediction entries selected by the branch = 8K.

  • o the number of prediction entries selected by the branch = 4K.

Explanation

Question 61 of 118

1

167. Branch predictors that use the behavior of other branches to make a prediction are called

Select one of the following:

  • o correlating predictors or two-level predictors

  • o branch-prediction buffer

  • o branch table

  • o three level loop

Explanation

Question 62 of 118

1

166. The simplest dynamic branch-prediction scheme is a

Select one of the following:

  • o branch-prediction buffer

  • o branch buffer

  • o All answers correct

  • o registrationo registration

Explanation

Question 63 of 118

1

165. Effect that results from instruction scheduling in large code segments is called…?

Select one of the following:

  • o register pressure

  • o loop unrolling

  • o loop-level

  • o registration

Explanation

Question 64 of 118

1

164. A simple scheme for increasing the number of instructions relative to the branch and overhead instructions is…?

Select one of the following:

  • o loop unrolling

  • o RAR

  • o loop-level

  • o loop rolling

Explanation

Question 65 of 118

1

163. What is given is not a hazard?

Select one of the following:

  • o RAR

  • o WAR

  • o WAW

  • o LOL

Explanation

Question 66 of 118

1

162. What is RAW (read after write)?

Select one of the following:

  • o when j tries to read a source before i writes it, so j incorrectly gets the old value

  • o when j tries to write a source before i writes it

  • o when i tries to read a source before j writes it, so j correctly gets the old value

  • o when a tries to write a source before b read it, so a incorrectly gets the old value

Explanation

Question 67 of 118

1

161. When occurs an output dependence?

Select one of the following:

  • o When i and instruction j write the same register or memory location

  • o when i and instruction j write the same adress or memory location

  • o when i and instruction j write the same name

  • o All answers is correct

Explanation

Question 68 of 118

1

160. What is Name dependence?

Select one of the following:

  • o name dependence occurs when two instructions use the same register or memory location

  • o name dependence occurs when five or more instructions use the same register or memory location

  • o name dependence occurs when instructions use the same name

  • o All answers is correct

Explanation

Question 69 of 118

1

159. In parallelism have three different types of dependences, tagging him:

Select one of the following:

  • o data dependences , name dependences , and surname dependences

  • o datagram dependences , name dependences , and animal dependences

  • o no correct answers

  • o data dependences , name dependences , and control dependences

Explanation

Question 70 of 118

1

158. The simplest and most common way to increase the ILP is to exploit parallelism among iterations of a loop. How is often called?

Select one of the following:

  • o loop-level parallelism

  • o exploit-level parallelism

  • o high-level minimalism

  • o low-level minimalism

Explanation

Question 71 of 118

1

157. The simplest and most common way to increase the ILP is …?

Select one of the following:

  • o to exploit parallelism among iterations of a loop

  • o to exploit minimalism among iterations of a loop

  • o to destroy iterations of a loop

  • o to decrease the minimalism of risk

Explanation

Question 72 of 118

1

156. What is the Pipeline CP = ?

Select one of the following:

  • o deal pipeline CPI + Structural stalls + Data hazard stalls + Control stalls

  • o deal pipeline CPU + Data hazard stalls + Control stalls

  • o deal pipeline CPU + deal pipeline CPI + Data hazard stalls + Control stalls

  • o Structural stalls + Data hazard stalls + Control stalls

Explanation

Question 73 of 118

1

155. The ideal pipeline CPI is a measure of …

Select one of the following:

  • o the maximum performance attainable by the implementation

  • o the maximum performance attainable by the instruction

  • o the minimum performance attainable by the implementation

  • o the minimum performance attainable by the instruction

Explanation

Question 74 of 118

1

154. How to decrypt RISC?

Select one of the following:

  • o Reduced Instruction Set Computer

  • o Recall Instruction Sell Communication

  • o Rename Instruction Sequence Corporation

  • o Red Instruction Small Computer

Explanation

Question 75 of 118

1

153. What is the simple technique that predicts whether two stores or a load and a store refer to the same memory address:

Select one of the following:

  • o Address aliasing prediction

  • o Branch prediction

  • o Integrated branch prediction

  • o Dynamic branch prediction

Explanation

Question 76 of 118

1

152. Which is not the function of integrated instruction fetch unit:

Select one of the following:

  • o Instruction memory commit

  • o Integrated branch prediction

  • o Instruction memory access and buffering

  • o Instruction prefetch

Explanation

Question 77 of 118

1

151. Buffering the actual target instructions allows us to perform an optimization which called:

Select one of the following:

  • o branch folding

  • o Branch prediction

  • o Target instructions

  • o Target address

Explanation

Question 78 of 118

1

150. A branch-prediction cache that stores the predicted address for the next instruction after a branch

Select one of the following:

  • o branch-target buffer

  • o data buffer

  • o frame buffer

  • o optical buffer

Explanation

Question 79 of 118

1

149. Examples of VLIW/LIW:

Select one of the following:

  • o TI C6x

  • o MIPS and ARM

  • o Itanium

  • o Pentium 4, MIPS R12K, IBM, Power5

Explanation

Question 80 of 118

1

148. Examples of superscalar(dynamic) :

Select one of the following:

  • o None at the present

  • o Pentium 4, MIPS R12K, IBM, Power5

  • o MIPS and ARM

  • o TI C6x

Explanation

Question 81 of 118

1

147. Examples of superscalar(static):

Select one of the following:

  • • MIPS and ARM

  • o Itanium

  • o Pentium 4, MIPS R12K, IBM, Power5

  • o TI C6x

Explanation

Question 82 of 118

1

146. Examples of EPIC:

Select one of the following:

  • o Itanium

  • o MIPS and ARM

  • o Pentium 4, MIPS R12K, IBM, Power5

  • o TI C6x

Explanation

Question 83 of 118

1

145. Which Multiple-issue processors has not the hardware hazard detection:

Select one of the following:

  • o EPIC

  • o Superscalar(dynamic)

  • o Superscalar(static)

  • o Superscalar(speculative)

Explanation

Question 84 of 118

1

144. Which one is not the major flavor of Multiple-issue processors:

Select one of the following:

  • o statistically superscalar processors

  • o dynamically scheduled superscalar processors

  • o statically scheduled superscalar processors

  • o VLIW (very long instruction word) processors

Explanation

Question 85 of 118

1

143. Choose the steps of instruction execution:

Select one of the following:

  • o issue, execute, write result, commit

  • o execution, commit, rollback

  • o issue, execute, override, exit

  • o begin, write, interrupt, commit

Explanation

Question 86 of 118

1

142. Choose correct fields of entry in the ROB:

Select one of the following:

  • o the instruction type, the destination field, the value field, and the ready field

  • o the source type, the destination field, the value field, and the ready field

  • o the program type, the ready field, the parameter field, the destination field

  • o the instruction type, the destination field, and the ready field

Explanation

Question 87 of 118

1

141. How many fields contains the entry in the ROB:

Select one of the following:

  • 4

  • 6

  • 5

  • 3

Explanation

Question 88 of 118

1

140. For what the reorder buffer is used :

Select one of the following:

  • o To pass parameters through instructions that may be speculated

  • o To pass results among instructions that may be speculated.

  • o To get additional registers in the same way as the reservation stations

  • o To control registers

Explanation

Question 89 of 118

1

139. How this process called: “Operations execute as soon as their operands are available”

Select one of the following:

  • o data flow execution

  • o data control execution

  • o instruction execution

  • o instruction field execution

Explanation

Question 90 of 118

1

138. Which of these is NOT characteristics of recent highperformance microprocessors?

Select one of the following:

  • o Color

  • o Functional unit capability

  • o Clock rate

  • o Power

Explanation

Question 91 of 118

1

• Popular data structure for organizing a large collection of data items so that one can quickly

Select one of the following:

  • o Popular data structure for organizing a large collection of data items so that one can quickly answer questions

  • o Popular tables for organizing a large collection of data structure

  • o Popular data structure for updating large collections, so that one can hardly answer questions

  • o Popular data structure for deletingsmall collections of data items so that one can hardly answer questions

Explanation

Question 92 of 118

1

136. Which of these concepts is NOT illustrated case study by Wen-mei W. Hwu and John W. Sias

Select one of the following:

  • o Achievable ILP with software resource constraints

  • o Limited ILP due to software dependences

  • o Achievable ILP with hardware resource constraints

  • o Variability of ILP due to software and hardware interaction

Explanation

Question 93 of 118

1

135. When speculation is not perfect, it rapidly becomes energy inefficient, since it requires additional ___________ both for the incorrect speculation and for the resetting of the processor state

Select one of the following:

  • o Dynamic power

  • o Processing rate

  • o Static power

  • o Processor state

Explanation

Question 94 of 118

1

134. If speculation were perfect, it could save power, since it would reduce the execution time and save _____________, while adding some additional overhead to implement

Select one of the following:

  • o Static power

  • o Dynamic power

  • o Processing rate

  • o Processor state

Explanation

Question 95 of 118

1

133. If we want to sustain four instructions per clock

Select one of the following:

  • o We must fetch more, issue more, and initiate execution on more than four instructions

  • o We must fetch less, issue more, and initiate execution on more than two instructions

  • o We must fetch more, issue more, and initiate execution on less than five instructions

  • o We must fetch more, issue less, and initiate execution on more than three instructions

Explanation

Question 96 of 118

1

132. Growing performance gap between peak and sustained performance translates to increasing energy per unit of performance, when:

Select one of the following:

  • o The number of transistors switching will be proportional to the peak issue rate, and the performance is proportional to the sustained rate

  • o The number of transistors switching will be proportionalto the sustained rate, and the performance is proportionalto the peak issue rate

  • o The number of transistors switching will be proportional to the sustained rate

  • o The performance is proportional to the peak issue rate

Explanation

Question 97 of 118

1

131. Which of the written below is NOT increase power consumption?

Select one of the following:

  • o Increasing multithreading

  • o Increasing performance

  • o Increasing multiple cores

  • o Increasing multithreading(повторяется хз что тут )

Explanation

Question 98 of 118

1

130. Which of the following descriptions corresponds to dynamic power?

Select one of the following:

  • o Proportional to the product of the number of switching transistors and the switching rate

  • o Grows proportionally to the transistor count (whether or not the transistors are switching)

  • o Certainly a design concern

  • o None of the above

Explanation

Question 99 of 118

1

129. Which of the following descriptions corresponds to static power?

Select one of the following:

  • o Grows proportionally to the transistor count (whether or not the transistors are switching)

  • o Proportional to the product of the number of switching transistors and the switching rate Probability

  • o Proportional to the product of the number of switching transistors and the switching rate

  • o All of the above

Explanation

Question 100 of 118

1

128. (Performance for entire task using the enhancement when possible) / (Performance for entire task without using the enhancement) is equals to:

Select one of the following:

  • o Speedup

  • o Efficiency

  • o Probability

  • o Ration

Explanation

Question 101 of 118

1

127. A widely held rule of thumb is that a program spends __ of its execution time in only __ of the code.

Select one of the following:

  • • 90% 10%

  • o 70% 30%

  • o 50% 50%

  • o 89% 11%

Explanation

Question 102 of 118

1

126. What MTTF means:

Select one of the following:

  • o mean time to failure

  • o mean time to feauture

  • o mean this to failure

  • o my transfers to failure

Explanation

Question 103 of 118

1

125. Desktop benchmarks divide into __ broad classes:

Select one of the following:

  • o two

  • o three

  • o four

  • o five

Explanation

Question 104 of 118

1

124. Systems alternate between two states of service with respect to an SLA:

Select one of the following:

  • o 1. Service accomplishment, where the service is delivered as specified
    2. Service interruption, where the delivered service is different from the SLA

  • o 1. Service accomplishment, where the service is not delivered as specified
    2. Service interruption, where the delivered service is different from the SLA

  • o 1. Service accomplishment, where the service is not delivered as specified
    2. Service interruption, where the delivered service is not different from the SLA

  • o 1. Service accomplishment, where the service is delivered as specified
    2. Service interruption, where the delivered service is not different from the SLA

Explanation

Question 105 of 118

1

123. The most companies spend only ____________ of their income on R&D, which includes all engineering.

Select one of the following:

  • o 30% to 48%

  • o 4% to 12%

  • o 15% to 30%

  • o 1% to 17%

Explanation

Question 106 of 118

1

122. Volume is a ________ key factor in determining cost.

Select one of the following:

  • o second

  • o first

  • o fifth

  • o third

Explanation

Question 107 of 118

1

121. Manufacturing costs that decrease over time are ____

Select one of the following:

  • o the learning curve

  • o the cycled line

  • o the regular option

  • o the final loop

Explanation

Question 108 of 118

1

120. For CMOS chips, the traditional dominant energy consumption has been in switching transistors, called ____

Select one of the following:

  • o dynamic power

  • o physical energy

  • o constant supply

  • o simple battery

Explanation

Question 109 of 118

1

119. Integrated circuit processes are charecterized by the

Select one of the following:

  • o feature size

  • o permanent size n

  • o compex size

  • o fixed size

Explanation

Question 110 of 118

1

118. Products that are sold by multiple vendors in large volumes and are essentialy identical

Select one of the following:

  • o boxes

  • o files

  • o folders

  • o commodities

Explanation

Question 111 of 118

1

117. Learning curve itself is best measured by change in...

Select one of the following:

  • o bytes

  • o bits

  • o seconds

  • o yeld

Explanation

Question 112 of 118

1

116. Total amount of work done in a given time ,such as megabytes per second for disk transfer...

Select one of the following:

  • o bandwidth

  • o throughput

  • o latency

  • o performance

Explanation

Question 113 of 118

1

115. The time between the start and the completion of an event ,such as milliseconds for a disk access is...

Select one of the following:

  • o bandwidth

  • o latency

  • o throughput

  • o performance

Explanation

Question 114 of 118

1

1. Network performance depends of what?

Select one of the following:

  • o performance of swithes and transmission system

  • o performance of switches

  • o has no dependensies

  • o performance of transmission system

Explanation

Question 115 of 118

1

113. What is a “Kernel” in Cache Memory?

Select one of the following:

  • o Execution in the OS that is neither idle nor in synchronization access

  • o Execution or waiting for synchronization variables

  • o Execution in user code

Explanation

Question 116 of 118

1

112. What is a “Synchronization” in Cache Memory?

Select one of the following:

  • o Execution in user code

  • o Execution in the OS that is neither idle nor in synchronization access

  • o Execution or waiting for synchronization variables

Explanation

Question 117 of 118

1

111. What is a “Kernel” in Cache Memory?

Select one of the following:

  • o Execution or waiting for synchronization variables

  • o Execution in the OS that is neither idle nor in synchronization access

  • o Execution in user code

Explanation

Question 118 of 118

1

110. What is a “Synchronization” in Cache Memory?

Select one of the following:

  • o Execution in the OS that is neither idle nor in synchronization access

  • o Execution in user code

  • o Execution or waiting for synchronization variables

Explanation