Hello World
Quiz by , created more than 1 year ago

Quiz on CSA IITU PART 2 (235), created by Hello World on 20/12/2017.

1135
17
0
No tags specified
Hello World
Created by Hello World over 6 years ago
Close

CSA IITU PART 2 (235)

Question 1 of 106

1

109. What is a “Kernel” in Cache Memory?

Select one of the following:

  • o Execution in the OS that is neither idle nor in synchronization access

  • o Execution or waiting for synchronization variables

  • o Execution in user code

Explanation

Question 2 of 106

1

108. What is a “Synchronization” in Cache Memory?

Select one of the following:

  • o Execution in the OS that is neither idle nor in synchronization access

  • o Execution in user code

  • o Execution or waiting for synchronization variables

Explanation

Question 3 of 106

1

107. How many main levels of Cache Memory?

Select one of the following:

  • 3

  • 2

  • 6

  • 8

Explanation

Question 4 of 106

1

106. How many size of Cache L3 is true approximately? :

Select one of the following:

  • o 3 MB

  • o 256 KB

  • o 256 MB

Explanation

Question 5 of 106

1

105. How many size of Cache L2 is true approximately? :

Select one of the following:

  • o 256 KB

  • o 4 KB

  • o 32 MB

Explanation

Question 6 of 106

1

104. How many size of Cache L1 is true approximately? :

Select one of the following:

  • o 8 KB

  • o 256 KB

  • o 2 MB

Explanation

Question 7 of 106

1

103. Little’s Law and a series of definitions lead to several useful equations for

Select one of the following:

  • o Average length of queue

  • o Average number of tasks in service

Explanation

Question 8 of 106

1

102. Little’s Law and a series of definitions lead to several useful equations for “Length server” - :

Select one of the following:

  • o Average number of tasks in service

  • o Average length of queue

Explanation

Question 9 of 106

1

101. Little’s Law and a series of definitions lead to several useful equations for “Time system” - :

Select one of the following:

  • o Average time/task in the system, or the response time, which is the sum of Time queue and Time server

  • o Average time to service a task; average service rate is 1/Time server traditionally represented by the symbol µ in many queuing texts

  • o Average time per task in the queue

Explanation

Question 10 of 106

1

100. Little’s Law and a series of definitions lead to several useful equations for “Time queue” - :

Select one of the following:

  • o Average time per task in the queue

  • o Average time to service a task; average service rate is 1/Time server traditionally represented by the symbol µ in many queuing texts

  • o Average time/task in the system, or the response time, which is the sum of Time queue and Time server

Explanation

Question 11 of 106

1

99. Little’s Law and a series of definitions lead to several useful equations for “Time server” - :

Select one of the following:

  • o Average time to service a task; average service rate is 1/Time server traditionally represented by the symbol µ in many queuing texts

  • o Average time per task in the queue

  • o Average time/task in the system, or the response time, which is the sum of Time queue and Time server

Explanation

Question 12 of 106

1

98. If we talk about storage systems an interaction or transaction with a computer is divided for first what is an “Think time” - ?:

Select one of the following:

  • o The time from the reception of the response until the user begins to enter the next command

  • o The time for the user to enter the command

  • o The time between when the user enters the command and the complete response is displayed

Explanation

Question 13 of 106

1

97. If we talk about storage systems an interaction or transaction with a computer is divided for first what is an “System response time” - ?:

Select one of the following:

  • o The time between when the user enters the command and the complete response is displayed

  • o The time for the user to enter the commando The time for the user to enter the command

  • o The time from the reception of the response until the user begins to enter the next command

Explanation

Question 14 of 106

1

96. If we talk about storage systems an interaction or transaction with a computer is divided for first what is an “Entry time” - ? :

Select one of the following:

  • o The time for the user to enter the command

  • o The time between when the user enters the command and the complete response is displayed

  • o The time from the reception of the response until the user begins to enter the next command

Explanation

Question 15 of 106

1

95. At storage systems Gray and Siewiorek classify faults what does mean “Environmental faults”? :

Select one of the following:

  • o Fire, flood, earthquake, power failure, and sabotage

  • o Faults in software (usually) and hardware design (occasionally)

  • o Devices that fail, such as perhaps due to an alpha particle hitting a memory cell

Explanation

Question 16 of 106

1

94. At storage systems Gray and Siewiorek classify faults what does mean “Operation faults”? :

Select one of the following:

  • o Mistakes by operations and maintenance personnel

  • o Devices that fail, such as perhaps due to an alpha particle hitting a memory cell

  • o Faults in software (usually) and hardware design (occasionally)

Explanation

Question 17 of 106

1

93. At storage systems Gray and Siewiorek classify faults what does mean “Design faults”? :

Select one of the following:

  • o Faults in software (usually) and hardware design (occasionally)

  • o Devices that fail, such as perhaps due to an alpha particle hitting a memory cell

  • o Mistakes by operations and maintenance personnel

Explanation

Question 18 of 106

1

92. At storage systems Gray and Siewiorek classify faults what does mean “Hardware faults”? :

Select one of the following:

  • o Faults in software (usually) and hardware design (occasionally)

  • o Mistakes by operations and maintenance personnel

  • o Devices that fail, such as perhaps due to an alpha particle hitting a memory cell

Explanation

Question 19 of 106

1

91. What is a RAID 4?

Select one of the following:

  • o Many applications are dominated by small accesses

  • o Since the higher-level disk interfaces understand the health of a disk, it’s easy to figure out which disk failed

  • o Also called mirroring or shadowing, there are two copies of every piece of data

Explanation

Question 20 of 106

1

90. What is a RAID 3?

Select one of the following:

  • o Since the higher-level disk interfaces understand the health of a disk, it’s easy to figure out which disk failed

  • o Many applications are dominated by small accesses

  • o Also called mirroring or shadowing, there are two copies of every piece of data

Explanation

Question 21 of 106

1

89. What is a RAID 2?

Select one of the following:

  • o This organization was inspired by applying memory-style error correcting codes to disks

  • o It has no redundancy and is sometimes nicknamed JBOD, for “just a bunch of disks,” although the data may be striped across the disks in the array

  • o Also called mirroring or shadowing, there are two copies of every piece of data

Explanation

Question 22 of 106

1

88. What is a RAID 1?

Select one of the following:

  • o Also called mirroring or shadowing, there are two copies of every piece of data

  • o It has no redundancy and is sometimes nicknamed JBOD, for “just a bunch of disks,” although the data may be striped across the disks in the array

  • o This organization was inspired by applying memory-style error correcting codes to disks

Explanation

Question 23 of 106

1

87. What is a RAID 0?

Select one of the following:

  • o It has no redundancy and is sometimes nicknamed JBOD, for “just a bunch of disks,” although the data may be striped across the disks in the array

  • o Also called mirroring or shadowing, there are two copies of every piece of data

  • o This organization was inspired by applying memory-style error correcting codes to disks

Explanation

Question 24 of 106

1

86. A virus classification by target includes the following categories, What is a File infector?

Select one of the following:

  • o Infects files that the operating system or shell consider to be executable

  • o A typical approach is as follows

  • o The key is stored with the virus

  • o Far more sophisticated techniques are possible

Explanation

Question 25 of 106

1

85. In Non-Blocking Caches what does mean “Early restart”?

Select one of the following:

  • o Fetch the words in normal order, but as soon as the requested word of the block arrives, send it to the processor and let the processor continue execution

  • o Request the missed word first from memory and send it to the processor as soon as it arrives; let the processor continue execution while filling the rest of the words in the block

Explanation

Question 26 of 106

1

84. In Non-Blocking Caches what does mean “Critical Word First”?

Select one of the following:

  • o Fetch the words in normal order, but as soon as the requested word of the block arrives, send it to the processor and let the processor continue execution

  • o Request the missed word first from memory and send it to the processor as soon as it arrives; let the processor continue execution while filling the rest of the words in the block

Explanation

Question 27 of 106

1

83. Storage Systems, “Higher associativity to reduce miss rate” -

Select one of the following:

  • o Obviously, increasing associativity reduces conflict misses

  • o The obvious way to reduce capacity misses is to increase cache capacity

  • o The simplest way to reduce the miss rate is to take advantage of spatial locality and increase the block size

Explanation

Question 28 of 106

1

82. Storage Systems, “Bigger caches to reduce miss rate” -

Select one of the following:

  • o The obvious way to reduce capacity misses is to increase cache capacity

  • o Obviously, increasing associativity reduces conflict misses

  • o The simplest way to reduce the miss rate is to take advantage of spatial locality and increase the block size

Explanation

Question 29 of 106

1

81. Storage Systems, “Larger block size to reduce miss rate” -

Select one of the following:

  • o The simplest way to reduce the miss rate is to take advantage of spatial locality and increase the block size

  • o The obvious way to reduce capacity misses is to increase cache capacity

  • o Obviously, increasing associativity reduces conflict misses

Explanation

Question 30 of 106

1

80. At Critical Word First for Miss Penalty chose correct sequence of Blocking Cache with Critical Word first “Order of fill”:

Select one of the following:

  • o 3,4,5,6,7,0,1,2

  • o 0,1,2,3,4,5,6,7

Explanation

Question 31 of 106

1

79. At Critical Word First for Miss Penalty chose correct sequence of Basic Blocking Cache “Order of fill”:

Select one of the following:

  • o 0,1,2,3,4,5,6,7

  • o 3,4,5,6,7,0,1,2

Explanation

Question 32 of 106

1

78. What does MAF?

Select one of the following:

  • o Miss Address File

  • o Map Address File

  • o Memory Address File

Explanation

Question 33 of 106

1

77. What does mean MSHR?

Select one of the following:

  • o Miss Status Handling Register

  • o Map Status Handling Reload

  • o Mips Status Hardware Register

  • o Memory Status Handling Register

Explanation

Question 34 of 106

1

76. Non-Blocking Cache Timeline for “Miss Under Miss” the sequence is -?

Select one of the following:

  • o CPU time->Cache Miss->Miss->Stall on use->Miss Penalty->Miss Penalty->CPU time

  • o CPU time->Cache Miss->Hit->Stall on use->Miss Penalty->CPU time

  • o CPU time-Cache Miss-Miss Penalty-CPU time

Explanation

Question 35 of 106

1

75. Non-Blocking Cache Timeline for “Hit Under Miss” the sequence is -?

Select one of the following:

  • o CPU time->Cache Miss->Hit->Stall on use->Miss Penalty->CPU time

  • o CPU time->Cache Miss->Miss->Stall on use->Miss Penalty->CPU time

  • o CPU time-Cache Miss-Miss Penalty-CPU time

Explanation

Question 36 of 106

1

74. Non-Blocking Cache Timeline for “Blocking Cache” the sequence is - ?

Select one of the following:

  • o CPU time-Cache Miss-Miss Penalty-CPU time

  • o CPU time->Cache Miss->Hit->Stall on use->Miss Penalty->CPU time

  • o CPU time->Cache Miss->Miss->Stall on use->Miss Penalty->CPU time

Explanation

Question 37 of 106

1

73. In Multilevel Caches “Misses per instruction” equals =

Select one of the following:

  • o misses in cache / number of instructions

  • o misses in cache / accesses to cache

  • o misses in cache / CPU memory accesses

Explanation

Question 38 of 106

1

72. In Multilevel Caches “Global miss rate” equals =

Select one of the following:

  • o misses in cache / CPU memory accesses

  • o misses in cache / accesses to cache

  • o misses in cache / number of instructions

Explanation

Question 39 of 106

1

71. In Multilevel Caches “Local miss rate” equals =

Select one of the following:

  • o misses in cache / accesses to cache

  • o misses in cache / number of instructions

  • o misses in cache / CPU memory accesses

Explanation

Question 40 of 106

1

70. What is a Conflict?

Select one of the following:

  • o misses that occur because of collisions due to less than full associativity

  • o first-reference to a block, occur even with infinite cache

  • o cache is too small to hold all data needed by program, occur even under perfect replacement policy

Explanation

Question 41 of 106

1

67. At VLIW Multi-Way Branches, which of this solution is true about problem: Long instructions provide few opportunities for branches:

Select one of the following:

  • o Allow one instruction to branch multiple directions

  • o Speculative operations that don’t cause exceptions

Explanation

Question 42 of 106

1

66. What is an ALAT? :

Select one of the following:

  • o Advanced Load Address Table

  • o Allocated Link Address Table

  • o Allowing List Address Table

  • o Addition Long Accessibility Table

Explanation

Question 43 of 106

1

65. h Speculative Execution, which of this solution is true about problem: Possible memory hazards limit code scheduling:

Select one of the following:

  • o Hardware to check pointer hazards

  • o Speculative operations that don’t cause exceptions

Explanation

Question 44 of 106

1

64. At VLIW Speculative Execution, which of this solution is true about problem: Branches restrict compiler code motion?

Select one of the following:

  • o Speculative operations that don’t cause exceptions

  • o Hardware to check pointer hazards

Explanation

Question 45 of 106

1

63. At VLIW by “performance and loop iteration” which time is shorter?

Select one of the following:

  • o Software Pipelined

  • o Loop Unrolled

Explanation

Question 46 of 106

1

62. At VLIW by “performance and loop iteration” which time is longer?

Select one of the following:

  • o Loop Unrolled

  • o Software Pipelined

Explanation

Question 47 of 106

1

61. What is “VLIW”?

Select one of the following:

  • o Very Long Instruction Word

  • o Very Light Internal Word

  • o Very Less Interpreter Word

  • o Very Low Invalid Word

Explanation

Question 48 of 106

1

60. Out-of-Order Control Complexity MIPS R10000 which element is not in Control Logic?

Select one of the following:

  • o Integer Datapath

  • o CLK

  • o Free List

  • o Address Queue

Explanation

Question 49 of 106

1

59. Out-of-Order Control Complexity MIPS R10000 which element is in Control Logic?

Select one of the following:

  • o Register name

  • o Instruction cache

  • o Data tags

  • o Data cache

Explanation

Question 50 of 106

1

58. At VLIW “Superscalar Control Logic Scaling” which parameters are used?

Select one of the following:

  • o Width and Lifetime

  • o Width and Height

  • o Time and Cycle

  • o Length and Addition

Explanation

Question 51 of 106

1

57. What is an IQ?

Select one of the following:

  • o Issue Queue

  • o Internal Queue

  • o Interrupt Queue

  • o Instruction Queue

Explanation

Question 52 of 106

1

56. What is a FL?

Select one of the following:

  • o Free List

  • o Free Last

  • o Free Launch

  • o Free Leg

Explanation

Question 53 of 106

1

55. What is a RT?

Select one of the following:

  • o Rename Table

  • o Recall Table

  • o Relocate Table

  • o Remove Table

Explanation

Question 54 of 106

1

54. Speculating on Exceptions “Recovery mechanism” is -

Select one of the following:

  • o Only write architectural state at commit point, so can throw away partially executed instructions after exception

  • o Exceptions are rare, so simply predicting no exceptions is very accurate

  • o An entity capable of accessing objects

  • o None of them

Explanation

Question 55 of 106

1

1. Speculating on Exceptions “Check prediction mechanism” is -

Select one of the following:

  • o Exceptions detected at end of instruction execution pipeline, special hardware for various exception types

  • o Exceptions are rare, so simply predicting no exceptions is very accurate

  • o The way in which an object is accessed by a subject

  • o None of them

Explanation

Question 56 of 106

1

52. Speculating on Exceptions “Prediction mechanism” is -

Select one of the following:

  • o Exceptions are rare, so simply predicting no exceptions is very accurate

  • o Exceptions detected at end of instruction execution pipeline, special hardware for various exception types

  • o Only write architectural state at commit point, so can throw away partially executed instructions after exception

  • o None of them

Explanation

Question 57 of 106

1

51. What is about Superscalar means “F-D-X-M-W”?

Select one of the following:

  • o Fetch, Decode, Execute, Memory, Writeback

  • o Fetch, Decode, Instruct, Map, Write

  • o Fetch, Decode, Excite, Memory, Write

  • o Fetch, Decode, Except, Map, Writeback

Explanation

Question 58 of 106

1

50. How many stages used in Superscalar (Pipeline)?

Select one of the following:

  • 5

  • 4

  • 6

  • 7

Explanation

Question 59 of 106

1

49. What is a SB?

Select one of the following:

  • o Scoreboard

  • o Scorebased

  • o Scalebit

  • o Scaleboard

Explanation

Question 60 of 106

1

48. What is a PRF?

Select one of the following:

  • o Physical Register File

  • o Pending Register File

  • o Pipeline Register File

  • o Pure Register File

Explanation

Question 61 of 106

1

47. What is a FSB?

Select one of the following:

  • o Finished Store Buffer

  • o Finished Stack Buffer

  • o Finished Stall Buffer

  • o Finished Star Buffer

Explanation

Question 62 of 106

1

46. What is a ROB?

Select one of the following:

  • o Reorder Buffer

  • o Read Only Buffer

  • o Reload Buffer

  • o Recall Buffer

Explanation

Question 63 of 106

1

45. What is a ARF:

Select one of the following:

  • o Architectural Register File

  • o Architecture Relocation File

  • o Architecture Reload File

  • o Architectural Read File

Explanation

Question 64 of 106

1

44. Which of the following formula is true about Issue Queue for “Instruction Ready”:

Select one of the following:

  • o Instruction Ready = (!Vsrc0 || !Psrc0)&&(!Vsrc1 || !Psrc1)&& no structural hazards

  • o Instruction Ready = (!Vsrc0 || !Psrc1)&&(!Vsrc1 || !Psrc0)&& no structural hazards

  • o Instruction Ready = (!Vsrc1 || !Psrc1)&&(!Vsrc0 || !Psrc1)&& no structural hazards

  • o Instruction Ready = (!Vsrc1 || !Psrc1)&&(!Vsrc0 || !Psrc0)&& no structural hazards

Explanation

Question 65 of 106

1

43. How many instructions used in Distributed Superscalar 2 and Exceptions?

Select one of the following:

  • 4

  • 3

  • 2

  • 1

Explanation

Question 66 of 106

1

42. How many issue queue used in Distributed Superscalar 2 and Exceptions:

Select one of the following:

  • 4

  • 3

  • 2

  • 1

Explanation

Question 67 of 106

1

41. How many issue queue used in Centralized Superscalar 2 and Exceptions?

Select one of the following:

  • 4

  • 3

  • 2

  • 1

Explanation

Question 68 of 106

1

40. Little’s Law and a series of definitions lead to several useful equations for “Length queue” -:

Select one of the following:

  • o Average length of queue

  • o Average number of tasks in service

Explanation

Question 69 of 106

1

39. Little’s Law and a series of definitions lead to several useful equations for “Length server” - :

Select one of the following:

  • o Average number of tasks in service

  • o Average length of queue

Explanation

Question 70 of 106

1

38. Little’s Law and a series of definitions lead to several useful equations for “Time system” - :

Select one of the following:

  • o Average time/task in the system, or the response time, which is the sum of Time queue and Time server

  • o Average time to service a task; average service rate is 1/Time server traditionally represented by the symbol µ in many queuing texts

  • o Average time per task in the queue

Explanation

Question 71 of 106

1

37. Little’s Law and a series of definitions lead to several useful equations for “Time queue” - :

Select one of the following:

  • o Average time per task in the queue

  • o Average time to service a task; average service rate is 1/Time server traditionally represented by the symbol µ in many queuing texts

  • o Average time/task in the system, or the response time, which is the sum of Time queue and Time server

Explanation

Question 72 of 106

1

36. Little’s Law and a series of definitions lead to several useful equations for “Time server” - :

Select one of the following:

  • o Average time to service a task; average service rate is 1/Time server traditionally represented by the symbol µ in many queuing texts

  • o Average time per task in the queue

  • o Average time/task in the system, or the response time, which is the sum of Time queue and Time server

Explanation

Question 73 of 106

1

35. If we talk about storage systems an interaction or transaction with a computer is divided for first what is an “Think time” - ?:

Select one of the following:

  • o The time from the reception of the response until the user begins to enter the next command

  • o The time for the user to enter the command

  • o The time between when the user enters the command and the complete response is displayed

Explanation

Question 74 of 106

1

34. If we talk about storage systems an interaction or transaction with a computer is divided for first what is an “System response time” - ?:

Select one of the following:

  • o The time between when the user enters the command and the complete response is displayed

  • o The time for the user to enter the command

  • o The time from the reception of the response until the user begins to enter the next command

Explanation

Question 75 of 106

1

33. What is kernel process?

Select one of the following:

  • o Provide at least two modes, indicating whether the running process is a user process or an operating system process

  • o Provide at least five modes, indicating whether the running process is a user process or an operating system process

  • o Provide a portion of the processor state that a user process can use but not write

  • o None of them

Explanation

Question 76 of 106

1

32. What does DDR stands for?

Select one of the following:

  • o Double data rate

  • o Dual data rate

  • o Double data reaction

  • o None of them

Explanation

Question 77 of 106

1

31. What does DRAM stands for?

Select one of the following:

  • o Dynamic Random Access memory

  • o Dual Random Access memory

  • o Dataram Random Access memory

Explanation

Question 78 of 106

1

30. What does SRAM stands for?

Select one of the following:

  • o Static Random Access memory

  • o System Random Access memory

  • o Short Random Accessmemory

  • o None of them

Explanation

Question 79 of 106

1

29. What is the cycle time?

Select one of the following:

  • o The minimum time between requests to memory.

  • o Time between when a read is requested and when the desired word arrives

  • o The maximum time between requests to memory.

  • o None of them

Explanation

Question 80 of 106

1

28. What is the access time?

Select one of the following:

  • o Time between when a read is requested and when the desired word arrives

  • o The minimum time between requests to memory.

  • o Describes the technology inside the memory chips and those innovative, internal organizations

  • o None of them

Explanation

Question 81 of 106

1

27. Data Hazard:

Select one of the following:

  • o An instruction depends on a data value produced by an earlier instruction

  • o An instruction in the pipeline needs a resource being used by another instruction in the pipeline

  • o Whether or not an instruction should be executed depends on a control decision made by an earlier instruction

Explanation

Question 82 of 106

1

26. Structural Hazard:

Select one of the following:

  • o An instruction in the pipeline needs a resource being used by another instruction in the pipeline

  • o An instruction depends on a data value produced by an earlier instruction

  • o Whether or not an instruction should be executed depends on a control decision made by an earlier instruction

Explanation

Question 83 of 106

1

25. Exploit spatial locality:

Select one of the following:

  • o by fetching blocks of data around recently accessed locations

  • o by remembering the contents of recently accessed locations

  • o None of them

Explanation

Question 84 of 106

1

24. Exploit temporal locality:

Select one of the following:

  • o by remembering the contents of recently accessed locations

  • o None of them

  • o by fetching blocks of data around recently accessed locations

Explanation

Question 85 of 106

1

23. Reduce Miss Rate: High Associativity. Empirical Rule of Thumb:

Select one of the following:

  • o Direct-mapped cache of size N has about the same miss rate as a two-way set- associative cache of size N/2

  • o If cache size is doubled, miss rate usually drops by about √2

  • o None of them

Explanation

Question 86 of 106

1

22. Reduce Miss Rate: Large Cache Size. Empirical Rule of Thumb:

Select one of the following:

  • o If cache size is doubled, miss rate usually drops by about √2

  • o Direct-mapped cache of size N has about the same miss rate as a two-way set- associative cache of size N/2

  • o None of them

Explanation

Question 87 of 106

1

21. Cache Hit -

Select one of the following:

  • o Write Through – write both cache and memory, generally higher traffic but simpler to design

  • o write cache only, memory is written when evicted, dirty bit per block avoids unnecessary write backs, more complicated

  • o No Write Allocate – only write to main memory

Explanation

Question 88 of 106

1

20. Least Recently Used (LRU):

Select one of the following:

  • o cache state must be updated on every access

  • o Used in highly associative caches

  • o FIFO with exception for most recently used block(s)

Explanation

Question 89 of 106

1

19. What is Computer Architecture?

Select one of the following:

  • o is the design of the abstraction/implementation layers that allow us to execute information processing applications efficiently using manufacturing technologies

  • o is a group of computer systems and other computing hardware devices that are linked together through communication channels to facilitate communication and resource-sharing among a wide range of users

  • o the programs used to direct the operation of a computer, as well as documentation giving instructions on how to use them

Explanation

Question 90 of 106

1

18. What is a Bandwidth-Delay Product:

Select one of the following:

  • o is amount of data that can be in flight at the same time (Little’s Law)

  • o is time for a single access – Main memory latency is usually >> than processor cycle time

  • o is the number of accesses per unit time – If m instructions are loads/stores, 1 + m memory accesses per instruction, CPI = 1 requires at least 1 + m memory accesses per cycle

Explanation

Question 91 of 106

1

17. What is a Bandwidth:

Select one of the following:

  • o a is the number of accesses per unit time – If m instructions are loads/stores, 1 + m memory accesses per instruction, CPI = 1 requires at least 1 + m memory accesses per cycle

  • o is time for a single access – Main memory latency is usually >> than processor cycle time

  • o is amount of data that can be in flight at the same time (Little’s Law)

Explanation

Question 92 of 106

1

16. Control Hazard:

Select one of the following:

  • o Whether or not an instruction should be executed depends on a control decision made by an earlier instruction

  • o An instruction depends on a data value produced by an earlier instruction

  • o An instruction in the pipeline needs a resource being used by another instruction in the pipeline

Explanation

Question 93 of 106

1

15. Data Hazard:

Select one of the following:

  • o An instruction depends on a data value produced by an earlier instruction

  • o An instruction in the pipeline needs a resource being used by another instruction in the pipeline

  • o Whether or not an instruction should be executed depends on a control decision made by an earlier instruction

Explanation

Question 94 of 106

1

1. Structural Hazard:

Select one of the following:

  • o An instruction in the pipeline needs a resource being used by another instruction in the pipeline

  • o An instruction depends on a data value produced by an earlier instruction

  • o Whether or not an instruction should be executed depends on a control decision made by an earlier instruction

Explanation

Question 95 of 106

1

13. The formula of “Iron Law” of Processor Performance:

Select one of the following:

  • o time/program = instruction/program * cycles/instruction * time/cycle

  • o time/program = instruction/program * cycles/instruction + time/cycle

  • o time/program = instruction/program + cycles/instruction * time/cycle

Explanation

Question 96 of 106

1

12. Algorithm for Cache MISS:

Select one of the following:

  • o Processor issues load request to cache -> Compare request address to cache tags and see if there is a match -> Read block of data from main memory -> Replace victim block in cache with new block -> return copy of data from cache

  • o Processor issues load request to cache -> Read block of data from main memory -> return copy of data from cache

  • o Processor issues load request to cache -> Replace victim block in cache with new block -> return copy of data from cache

Explanation

Question 97 of 106

1

11. Algorithm for Cache HIT:

Select one of the following:

  • o Processor issues load request to cache -> Replace victim block in cache with new block -> return copy of data from cache

  • o Processor issues load request to cache -> Read block of data from main memory -> return copy of data from cache

  • o Processor issues load request to cache -> Compare request address to cache tags and see if there is a match -> return copy of data from cache

Explanation

Question 98 of 106

1

9. Capacity -

Select one of the following:

  • o cache is too small to hold all data needed by program, occur even under perfect replacement policy (loop over 5 cache lines)

  • o misses that occur because of collisions due to less than full associativity (loop over 3 cache lines)

  • o first-reference to a block, occur even with infinite cache

Explanation

Question 99 of 106

1

8. Compulsory -

Select one of the following:

  • o cache is too small to hold all data needed by program, occur even under perfect replacement policy (loop over 5 cache lines)

  • o first-reference to a block, occur even with infinite cache

  • o misses that occur because of collisions due to less than full associativity (loop over 3 cache lines)

Explanation

Question 100 of 106

1

7. Average Memory Access Time is equal:

Select one of the following:

  • o Hit Time * ( Miss Rate + Miss Penalty )

  • o Hit Time - ( Miss Rate + Miss Penalty )

  • o Hit Time / ( Miss Rate - Miss Penalty )

  • o Hit Time + ( Miss Rate * Miss Penalty )

Explanation

Question 101 of 106

1

6. Cache MISS:

Select one of the following:

  • o No Write Allocate, Write Allocate

  • o Write Through, Write Back

Explanation

Question 102 of 106

1

5. Cache HIT:

Select one of the following:

  • o No Write Allocate, Write Allocate

  • o Write Through, Write Back

Explanation

Question 103 of 106

1

4. What occurs at Data access when we speak about Common And Predictable Memory Reference Patterns?

Select one of the following:

  • o subroutine call

  • o n loop iterations

  • o vector access

Explanation

Question 104 of 106

1

3. What occurs at Stack access when we speak about Common And Predictable Memory Reference Patterns?

Select one of the following:

  • o subroutine call

  • o n loop iterations

  • o vector access

Explanation

Question 105 of 106

1

2. What occurs at Intruction fetches when we speak about Common And Predictable Memory Reference Patterns?

Select one of the following:

  • o n loop iterations

  • o subroutine call

  • o vector access

Explanation

Question 106 of 106

1

1. - What is a Latency:

Select one of the following:

  • o is time for a single access – Main memory latency is usually >> than processor cycle time

  • o is the number of accesses per unit time – If m instructions are loads/stores, 1 + m memory accesses per instruction, CPI = 1 requires at least 1 + m memory accesses per cycle

  • o is amount of data that can be in flight at the same time (Little’s Law)

Explanation