Alisher Kassymov
Quiz by , created more than 1 year ago

PC Arc Quiz on PC_architecture_Final_Preparation, created by Alisher Kassymov on 22/05/2018.

597
18
0
Alisher Kassymov
Created by Alisher Kassymov almost 6 years ago
Close

PC_architecture_Final_Preparation

Question 1 of 189

1

What is a Latency:

Select one of the following:

  • is amount of data that can be in flight at the same time (Little’s Law)

  • is the number of accesses per unit time – If m instructions are loads/stores, 1 + m memory accesses
    per instruction, CPI = 1 requires at least 1 + m memory accesses per cycle

  • is time for a single access – Main memory latency is usually >> than processor cycle time

Explanation

Question 2 of 189

1

What occurs at Intruction fetches when we speak about Common And Predictable Memory
Reference Patterns?

Select one of the following:

  • n loop iterations

  • subroutine call

  • vector access

Explanation

Question 3 of 189

1

What occurs at Stack access when we speak about Common And Predictable Memory
Reference Patterns?

Select one of the following:

  • n loop iterations

  • subroutine call

  • vector access

Explanation

Question 4 of 189

1

What occurs at Data access when we speak about Common And Predictable Memory
Reference Patterns?

Select one of the following:

  • subroutine call

  • n loop iterations

  • vector access

Explanation

Question 5 of 189

1

Cache HIT:

Select one of the following:

  • No Write Allocate, Write Allocate

  • Write Through, Write Back

Explanation

Question 6 of 189

1

Cache MISS:

Select one of the following:

  • No Write Allocate, Write Allocate

  • Write Through, Write Back

Explanation

Question 7 of 189

1

Average Memory Access Time is equal:

Select one of the following:

  • Hit Time * ( Miss Rate + Miss Penalty )

  • Hit Time - ( Miss Rate + Miss Penalty )

  • Hit Time / ( Miss Rate - Miss Penalty )

  • Hit Time + ( Miss Rate * Miss Penalty )

Explanation

Question 8 of 189

1

Compulsory -

Select one of the following:

  • cache is too small to hold all data needed by program, occur even under perfect replacement policy (loop over 5 cache
    lines)

  • first-reference to a block, occur even with infinite cache

  • misses that occur because of collisions due to less than full associativity (loop over 3 cache lines)

Explanation

Question 9 of 189

1

Capacity -

Select one of the following:

  • cache is too small to hold all data needed by program, occur even under perfect replacement policy (loop over 5 cache
    lines)

  • misses that occur because of collisions due to less than full associativity (loop over 3 cache lines)

  • first-reference to a block, occur even with infinite cache

Explanation

Question 10 of 189

1

Conflict -

Select one of the following:

  • first-reference to a block, occur even with infinite cache

  • misses that occur because of collisions due to less than full associativity (loop over 3 cache lines)

  • cache is too small to hold all data needed by program, occur even under perfect replacement policy (loop over 5 cache
    lines)

Explanation

Question 11 of 189

1

Algorithm for Cache HIT:

Select one of the following:

  • Processor issues load request to cache -> Replace victim block in cache with new block -> return copy of data from
    cache

  • Processor issues load request to cache -> Read block of data from main memory -> return copy of data from cache

  • Processor issues load request to cache -> Compare request address to cache tags and see if there is a match -> return
    copy of data from cache

Explanation

Question 12 of 189

1

Algorithm for Cache MISS:

Select one of the following:

  • Processor issues load request to cache -> Compare request address to cache tags and see if there is a match -> Read
    block of data from main memory -> Replace victim block in cache with new block -> return copy of data from cache

  • Processor issues load request to cache -> Read block of data from main memory -> return copy of data from cache

  • Processor issues load request to cache -> Replace victim block in cache with new block -> return copy of data from
    cache

Explanation

Question 13 of 189

1

The formula of “Iron Law” of Processor Performance:

Select one of the following:

  • time/program = instruction/program * cycles/instruction * time/cycle

  • time/program = instruction/program * cycles/instruction + time/cycle

  • time/program = instruction/program + cycles/instruction * time/cycle

Explanation

Question 14 of 189

1

Structural Hazard:

Select one of the following:

  • An instruction depends on a data value produced by an earlier instruction

  • An instruction in the pipeline needs a resource being used by another instruction in the pipeline

  • Whether or not an instruction should be executed depends on a control decision made by an earlier instruction

Explanation

Question 15 of 189

1

Data Hazard:

Select one of the following:

  • Whether or not an instruction should be executed depends on a control decision made by an earlier instruction

  • An instruction in the pipeline needs a resource being used by another instruction in the pipeline

  • An instruction depends on a data value produced by an earlier instruction

Explanation

Question 16 of 189

1

Control Hazard:

Select one of the following:

  • Whether or not an instruction should be executed depends on a control decision made by an earlier instruction

  • An instruction depends on a data value produced by an earlier instruction

  • An instruction in the pipeline needs a resource being used by another instruction in the pipeline

Explanation

Question 17 of 189

1

What is a Bandwidth:

Select one of the following:

  • a is the number of accesses per unit time – If m instructions are loads/stores, 1 + m memory accesses per instruction, CPI
    = 1 requires at least 1 + m memory accesses per cycle

  • is time for a single access – Main memory latency is usually >> than processor cycle time

  • is amount of data that can be in flight at the same time (Little’s Law)

Explanation

Question 18 of 189

1

What is a Bandwidth-Delay Product:

Select one of the following:

  • is the number of accesses per unit time – If m instructions are loads/stores, 1 + m memory accesses per instruction, CPI
    = 1 requires at least 1 + m memory accesses per cycle

  • is time for a single access – Main memory latency is usually >> than processor cycle time

  • is amount of data that can be in flight at the same time (Little’s Law)

Explanation

Question 19 of 189

1

What is Computer Architecture?

Select one of the following:

  • the programs used to direct the operation of a computer, as well as documentation giving instructions on how to use
    them

  • is the design of the abstraction/implementation layers that allow us to execute information processing applications
    efficiently using manufacturing technologies

  • is a group of computer systems and other computing hardware devices that are linked together through communication
    channels to facilitate communication and resource-sharing among a wide range of users

Explanation

Question 20 of 189

1

Least Recently Used (LRU):

Select one of the following:

  • FIFO with exception for most recently used block(s)

  • Used in highly associative caches

  • cache state must be updated on every access

Explanation

Question 21 of 189

1

Cache Hit -

Select one of the following:

  • Write Through – write both cache and memory, generally higher traffic but simpler to design

  • write cache only, memory is written when evicted, dirty bit per block avoids unnecessary write backs, more complicated

  • No Write Allocate – only write to main memory

Explanation

Question 22 of 189

1

Reduce Miss Rate: Large Cache Size. Empirical Rule of Thumb:

Select one of the following:

  • None of them

  • If cache size is doubled, miss rate usually drops by about √2

  • Direct-mapped cache of size N has about the same miss rate as a two-way set- associative cache of size N/2

Explanation

Question 23 of 189

1

Reduce Miss Rate: High Associativity. Empirical Rule of Thumb:

Select one of the following:

  • Direct-mapped cache of size N has about the same miss rate as a two-way set- associative cache of size N/2

  • None of them

  • If cache size is doubled, miss rate usually drops by about √2

Explanation

Question 24 of 189

1

Exploit temporal locality:

Select one of the following:

  • by remembering the contents of recently accessed locations

  • by fetching blocks of data around recently accessed locations

  • None of them

Explanation

Question 25 of 189

1

Exploit spatial locality:

Select one of the following:

  • None of them

  • by remembering the contents of recently accessed locations

  • by fetching blocks of data around recently accessed locations

Explanation

Question 26 of 189

1

Structural Hazard:

Select one of the following:

  • An instruction depends on a data value produced by an earlier instruction

  • An instruction in the pipeline needs a resource being used by another instruction in the pipeline

  • Whether or not an instruction should be executed depends on a control decision made by an earlier instruction

Explanation

Question 27 of 189

1

Data Hazard:

Select one of the following:

  • An instruction in the pipeline needs a resource being used by another instruction in the pipeline

  • Whether or not an instruction should be executed depends on a control decision made by an earlier instruction

  • An instruction depends on a data value produced by an earlier instruction

Explanation

Question 28 of 189

1

What is the access time?

Select one of the following:

  • Describes the technology inside the memory chips and those innovative, internal organizations

  • Time between when a read is requested and when the desired word arrives

  • The minimum time between requests to memory.

  • None of them

Explanation

Question 29 of 189

1

What is the cycle time?

Select one of the following:

  • The minimum time between requests to memory

  • Time between when a read is requested and when the desired word arrives

  • The maximum time between requests to memory.

  • None of them

Explanation

Question 30 of 189

1

What does SRAM stands for?

Select one of the following:

  • System Random Access memory

  • Static Random Access memory

  • Short Random Accessmemory

  • None of them

Explanation

Question 31 of 189

1

What does DRAM stands for?

Select one of the following:

  • Dataram Random Access memory

  • Dual Random Access memory

  • Dynamic Random Access memory

Explanation

Question 32 of 189

1

What does DDR stands for?

Select one of the following:

  • None of them

  • Double data reaction

  • Dual data rate

  • Double data rate

Explanation

Question 33 of 189

1

What is kernel process?

Select one of the following:

  • Provide at least two modes, indicating whether the running process is a user process or an
    operating system process

  • Provide a portion of the processor state that a user process can use but not write

  • Provide at least five modes, indicating whether the running process is a user process or an
    operating system process

  • None of them

Explanation

Question 34 of 189

1

Which one is NOT concerning to pitfall?

Select one of the following:

  • Implementing a virtual machine monitor on an instruction set architecture that wasn’t designed to
    be virtualizable

  • Simulating enough instructions to get accurate performance measures of the memory hierarchy

  • Predicting cache performance of one program from another

  • Over emphasizing memory bandwidth in DRAMs

Explanation

Question 35 of 189

1

Which one is concerning to fallacy?

Select one of the following:

  • Over emphasizing memory bandwidth in DRAMs

  • Implementing a virtual machine monitor on an instruction set architecture that wasn’t designed to
    be virtualizable

  • Predicting cache performance of one program from another

  • Simulating enough instructions to get accurate performance measures of the memory hierarchy

Explanation

Question 36 of 189

1

If we talk about storage systems an interaction or transaction with a computer is
divided for first what is an “System response time” - ?:

Select one of the following:

  • The time from the reception of the response until the user begins to enter the next command

  • The time between when the user enters the command and the complete response is displayed

  • The time for the user to enter the command

Explanation

Question 37 of 189

1

If we talk about storage systems an interaction or transaction with a computer is
divided for first what is an “Think time” - ?:

Select one of the following:

  • The time from the reception of the response until the user begins to enter the next command

  • The time between when the user enters the command and the complete response is displayed

  • The time for the user to enter the command

Explanation

Question 38 of 189

1

Little’s Law and a series of definitions lead to several useful equations for “Time
server” - :

Select one of the following:

  • Average time per task in the queue

  • Average time/task in the system, or the response time, which is the sum of Time queue and Time server

  • Average time to service a task; average service rate is 1/Time server traditionally represented
    by the symbol μ in many queuing texts

Explanation

Question 39 of 189

1

Little’s Law and a series of definitions lead to several useful equations for “Time
queue” - :

Select one of the following:

  • Average time to service a task; average service rate is 1/Time server traditionally
    represented by the symbol μ in many queuing texts

  • Average time per task in the queue

  • Average time/task in the system, or the response time, which is the sum of Time queue and Time server

Explanation

Question 40 of 189

1

Little’s Law and a series of definitions lead to several useful equations for “Time
system” - :

Select one of the following:

  • Average time/task in the system, or the response time, which is the sum of Time queue and Time server

  • Average time to service a task; average service rate is 1/Time server traditionally
    represented by the symbol μ in many queuing texts

  • Average time per task in the queue

Explanation

Question 41 of 189

1

Little’s Law and a series of definitions lead to several useful equations for
“Length server” - :

Select one of the following:

  • Average length of queue

  • Average number of tasks in service

Explanation

Question 42 of 189

1

Little’s Law and a series of definitions lead to several useful equations for
“Length queue” -:

Select one of the following:

  • Average length of queue

  • Average number of tasks in service

Explanation

Question 43 of 189

1

How many issue queue used in Centralized Superscalar 2 and Exceptions?

Select one of the following:

  • 4

  • 3

  • 2

  • 1

Explanation

Question 44 of 189

1

How many issue queue used in Distributed Superscalar 2 and Exceptions:

Select one of the following:

  • 4

  • 3

  • 1

  • 2

Explanation

Question 45 of 189

1

How many instructions used in Distributed Superscalar 2 and Exceptions?

Select one of the following:

  • 4

  • 3

  • 2

  • 1

Explanation

Question 46 of 189

1

How many issue queue used in Centralized Superscalar 2 and Exceptions?

Select one of the following:

  • 1

  • 2

  • 3

  • 4

Explanation

Question 47 of 189

1

Which of the following formula is true about Issue Queue for “Instruction Ready”:

Select one of the following:

  • Instruction Ready = (!Vsrc1 || !Psrc1)&&(!Vsrc0 || !Psrc0)&& no structural hazards

  • Instruction Ready = (!Vsrc0 || !Psrc1)&&(!Vsrc1 || !Psrc0)&& no structural hazards

  • Instruction Ready = (!Vsrc0 || !Psrc0)&&(!Vsrc1 || !Psrc1)&& no structural hazards

  • Instruction Ready = (!Vsrc1 || !Psrc1)&&(!Vsrc0 || !Psrc1)&& no structural hazards

Explanation

Question 48 of 189

1

What is a ARF:

Select one of the following:

  • Architectural Register File

  • Architecture Relocation File

  • Architecture Reload File

  • Architectural Read File

Explanation

Question 49 of 189

1

What is a ROB?

Select one of the following:

  • Read Only Buffer

  • Reorder Buffer

  • Reload Buffer

  • Recall Buffer

Explanation

Question 50 of 189

1

What is a FSB?

Select one of the following:

  • Finished Star Buffer

  • Finished Stall Buffer

  • Finished Store Buffer

  • Finished Stack Buffer

Explanation

Question 51 of 189

1

What is a PRF?

Select one of the following:

  • Pure Register File

  • Physical Register File

  • Pending Register File

  • Pipeline Register File

Explanation

Question 52 of 189

1

What is a SB?

Select one of the following:

  • Scalebit

  • Scaleboard

  • Scorebased

  • Scoreboard

Explanation

Question 53 of 189

1

How many stages used in Superscalar (Pipeline)?

Select one of the following:

  • 5

  • 4

  • 6

  • 7

Explanation

Question 54 of 189

1

What is about Superscalar means “F-D-X-M-W”?

Select one of the following:

  • Fetch, Decode, Instruct, Map, Write

  • Fetch, Decode, Execute, Memory, Writeback

  • Fetch, Decode, Excite, Memory, Write

  • Fetch, Decode, Except, Map, Writeback

Explanation

Question 55 of 189

1

Speculating on Exceptions “Prediction mechanism” is -

Select one of the following:

  • None of them

  • Only write architectural state at commit point, so can throw away partially executed instructions after
    exception

  • Exceptions are rare, so simply predicting no exceptions is very accurate

  • Exceptions detected at end of instruction execution pipeline, special hardware for various exception types

Explanation

Question 56 of 189

1

Speculating on Exceptions “Check prediction mechanism” is -

Select one of the following:

  • The way in which an object is accessed by a subject

  • Exceptions detected at end of instruction execution pipeline, special hardware for various exception types

  • Exceptions are rare, so simply predicting no exceptions is very accurate

  • None of them

Explanation

Question 57 of 189

1

Speculating on Exceptions “Recovery mechanism” is

Select one of the following:

  • None of them

  • An entity capable of accessing objects

  • Exceptions are rare, so simply predicting no exceptions is very accurate

  • Only write architectural state at commit point, so can throw away partially executed instructions after
    exception

Explanation

Question 58 of 189

1

What is a RT?

Select one of the following:

  • Rename Table

  • Recall Table

  • Relocate Table

  • Remove Table

Explanation

Question 59 of 189

1

What is a FL?

Select one of the following:

  • Free Launch

  • Free List

  • Free Leg

  • Free Last

Explanation

Question 60 of 189

1

What is an IQ?

Select one of the following:

  • Internal Queue

  • Instruction Queue

  • Issue Queue

  • Interrupt Queue

Explanation

Question 61 of 189

1

At VLIW “Superscalar Control Logic Scaling” which parameters are used?

Select one of the following:

  • Width and Height

  • Width and Lifetime

  • Time and Cycle

  • Length and Addition

Explanation

Question 62 of 189

1

Out-of-Order Control Complexity MIPS R10000 which element is in Control
Logic?

Select one of the following:

  • Register name

  • Instruction cache

  • Data tags

  • Data cache

Explanation

Question 63 of 189

1

Out-of-Order Control Complexity MIPS R10000 which element is not in Control
Logic?

Select one of the following:

  • Integer Datapath

  • CLK

  • Address Queue

  • Free List

Explanation

Question 64 of 189

1

What is “VLIW”?

Select one of the following:

  • Very Less Interpreter Word

  • Very Long Instruction Word

  • Very Light Internal Word

  • Very Low Invalid Word

Explanation

Question 65 of 189

1

At VLIW by “performance and loop iteration” which time is longer?

Select one of the following:

  • Loop Unrolled

  • Software Pipelined

Explanation

Question 66 of 189

1

At VLIW by “performance and loop iteration” which time is shorter?

Select one of the following:

  • Loop Unrolled

  • Software Pipelined

Explanation

Question 67 of 189

1

At VLIW Speculative Execution, which of this solution is true about problem:
Branches restrict compiler code motion?

Select one of the following:

  • Hardware to check pointer hazards

  • Speculative operations that don’t cause exceptions

Explanation

Question 68 of 189

1

At VLIW Speculative Execution, which of this solution is true about problem:
Possible memory hazards limit code scheduling:

Select one of the following:

  • Hardware to check pointer hazards

  • Speculative operations that don’t cause exceptions

Explanation

Question 69 of 189

1

What is an ALAT? :

Select one of the following:

  • Advanced Load Address Table

  • Allocated Link Address Table

  • Allowing List Address Table

  • Addition Long Accessibility Table

Explanation

Question 70 of 189

1

At VLIW Multi-Way Branches, which of this solution is true about problem: Long
instructions provide few opportunities for branches:

Select one of the following:

  • Allow one instruction to branch multiple directions

  • Speculative operations that don’t cause exceptions

Explanation

Question 71 of 189

1

What is a Compulsory?

Select one of the following:

  • first-reference to a block, occur even with infinite cache

  • cache is too small to hold all data needed by program, occur even under perfect replacement policy

  • misses that occur because of collisions due to less than full associativity

Explanation

Question 72 of 189

1

What is a Capacity?

Select one of the following:

  • cache is too small to hold all data needed by program, occur even under perfect replacement policy

  • misses that occur because of collisions due to less than full associativity

  • first-reference to a block, occur even with infinite cache

Explanation

Question 73 of 189

1

What is a Conflict?

Select one of the following:

  • misses that occur because of collisions due to less than full associativity

  • first-reference to a block, occur even with infinite cache

  • cache is too small to hold all data needed by program, occur even under perfect replacement policy

Explanation

Question 74 of 189

1

In Multilevel Caches “Local miss rate” equals =

Select one of the following:

  • misses in cache / accesses to cache

  • misses in cache / CPU memory accesses

  • misses in cache / number of instructions

Explanation

Question 75 of 189

1

In Multilevel Caches “Global miss rate” equals =

Select one of the following:

  • misses in cache / CPU memory accesses

  • misses in cache / accesses to cache

  • misses in cache / number of instructions

Explanation

Question 76 of 189

1

In Multilevel Caches “Misses per instruction” equals =

Select one of the following:

  • misses in cache / number of instructions

  • misses in cache / accesses to cache

  • misses in cache / CPU memory accesses

Explanation

Question 77 of 189

1

Non-Blocking Cache Timeline for “Blocking Cache” the sequence is - ?

Select one of the following:

  • CPU time-Cache Miss-Miss Penalty-CPU time

  • CPU time->Cache Miss->Hit->Stall on use->Miss Penalty->CPU time

  • CPU time->Cache Miss->Miss->Stall on use->Miss Penalty->CPU time

Explanation

Question 78 of 189

1

Non-Blocking Cache Timeline for “Hit Under Miss” the sequence is -?

Select one of the following:

  • CPU time->Cache Miss->Hit->Stall on use->Miss Penalty->CPU time

  • CPU time-Cache Miss-Miss Penalty-CPU time

  • CPU time->Cache Miss->Miss->Stall on use->Miss Penalty->CPU time

Explanation

Question 79 of 189

1

Non-Blocking Cache Timeline for “Miss Under Miss” the sequence is -?

Select one of the following:

  • CPU time->Cache Miss->Miss->Stall on use->Miss Penalty->Miss Penalty->CPU time

  • CPU time-Cache Miss-Miss Penalty-CPU time

  • CPU time->Cache Miss->Hit->Stall on use->Miss Penalty->CPU time

Explanation

Question 80 of 189

1

What does mean MSHR?

Select one of the following:

  • Miss Status Handling Register

  • Map Status Handling Reload

  • Mips Status Hardware Register

  • Memory Status Handling Register

Explanation

Question 81 of 189

1

What does MAF?

Select one of the following:

  • Miss Address File

  • Map Address File

  • Memory Address File

Explanation

Question 82 of 189

1

At Critical Word First for Miss Penalty chose correct sequence of Basic Blocking
Cache “Order of fill”:

Select one of the following:

  • 0,1,2,3,4,5,6,7

  • 3,4,5,6,7,0,1,2

Explanation

Question 83 of 189

1

At Critical Word First for Miss Penalty chose correct sequence of Blocking
Cache with Critical Word first “Order of fill”:

Select one of the following:

  • 3,4,5,6,7,0,1,2

  • 0,1,2,3,4,5,6,7

Explanation

Question 84 of 189

1

Storage Systems, “Larger block size to reduce miss rate”

Select one of the following:

  • The simplest way to reduce the miss rate is to take advantage of spatial locality and increase
    the block size

  • The obvious way to reduce capacity misses is to increase cache capacity

  • Obviously, increasing associativity reduces conflict misses

Explanation

Question 85 of 189

1

Storage Systems, “Bigger caches to reduce miss rate” -

Select one of the following:

  • The obvious way to reduce capacity misses is to increase cache capacity

  • Obviously, increasing associativity reduces conflict misses

  • The simplest way to reduce the miss rate is to take advantage of spatial locality and increase
    the block size

Explanation

Question 86 of 189

1

Storage Systems, “Higher associativity to reduce miss rate” -

Select one of the following:

  • Obviously, increasing associativity reduces conflict misses

  • The obvious way to reduce capacity misses is to increase cache capacity

  • The simplest way to reduce the miss rate is to take advantage of spatial locality and increase
    the block size

Explanation

Question 87 of 189

1

In Non-Blocking Caches what does mean “Critical Word First”?

Select one of the following:

  • Request the missed word first from memory and send it to the processor as soon as it arrives;
    let the processor continue execution while filling the rest of the words in the block

  • Fetch the words in normal order, but as soon as the requested word of the block arrives,
    send it to the processor and let the processor continue execution

Explanation

Question 88 of 189

1

In Non-Blocking Caches what does mean “Early restart”?

Select one of the following:

  • Fetch the words in normal order, but as soon as the requested word of the block arrives, send
    it to the processor and let the processor continue execution

  • Request the missed word first from memory and send it to the processor as soon as it
    arrives; let the processor continue execution while filling the rest of the words in the block

Explanation

Question 89 of 189

1

A virus classification by target includes the following categories, What is a File
infector?

Select one of the following:

  • A typical approach is as follows

  • Infects files that the operating system or shell consider to be executable

  • The key is stored with the virus

  • Far more sophisticated techniques are possible

Explanation

Question 90 of 189

1

What is a RAID 0?

Select one of the following:

  • It has no redundancy and is sometimes nicknamed JBOD, for “just a bunch of disks,” although
    the data may be striped across the disks in the array

  • Also called mirroring or shadowing, there are two copies of every piece of data

  • This organization was inspired by applying memory-style error correcting codes to disks

Explanation

Question 91 of 189

1

What is a RAID 1?

Select one of the following:

  • Also called mirroring or shadowing, there are two copies of every piece of data

  • It has no redundancy and is sometimes nicknamed JBOD, for “just a bunch of disks,”
    although the data may be striped across the disks in the array

  • This organization was inspired by applying memory-style error correcting codes to disks

Explanation

Question 92 of 189

1

What is a RAID 2?

Select one of the following:

  • This organization was inspired by applying memory-style error correcting codes to disks

  • It has no redundancy and is sometimes nicknamed JBOD, for “just a bunch of disks,”
    although the data may be striped across the disks in the array

  • Also called mirroring or shadowing, there are two copies of every piece of data

Explanation

Question 93 of 189

1

What is a RAID 3?

Select one of the following:

  • Since the higher-level disk interfaces understand the health of a disk, it’s easy to figure out which disk failed

  • Many applications are dominated by small accesses

  • Also called mirroring or shadowing, there are two copies of every piece of data

Explanation

Question 94 of 189

1

What is a RAID 4?

Select one of the following:

  • Many applications are dominated by small accesses

  • Since the higher-level disk interfaces understand the health of a disk, it’s easy to figure out which disk
    failed

  • Also called mirroring or shadowing, there are two copies of every piece of data

Explanation

Question 95 of 189

1

At storage systems Gray and Siewiorek classify faults what does mean
“Hardware faults”? :

Select one of the following:

  • Devices that fail, such as perhaps due to an alpha particle hitting a memory cell

  • Faults in software (usually) and hardware design (occasionally)

  • Mistakes by operations and maintenance personnel

Explanation

Question 96 of 189

1

At storage systems Gray and Siewiorek classify faults what does mean “Design
faults”? :

Select one of the following:

  • Faults in software (usually) and hardware design (occasionally)

  • Devices that fail, such as perhaps due to an alpha particle hitting a memory cell

  • Mistakes by operations and maintenance personnel

Explanation

Question 97 of 189

1

At storage systems Gray and Siewiorek classify faults what does mean
“Operation faults”? :

Select one of the following:

  • Mistakes by operations and maintenance personnel

  • Devices that fail, such as perhaps due to an alpha particle hitting a memory cell

  • Faults in software (usually) and hardware design (occasionally)

Explanation

Question 98 of 189

1

At storage systems Gray and Siewiorek classify faults what does mean
“Environmental faults”? :

Select one of the following:

  • Fire, flood, earthquake, power failure, and sabotage

  • Faults in software (usually) and hardware design (occasionally)

  • Devices that fail, such as perhaps due to an alpha particle hitting a memory cell

Explanation

Question 99 of 189

1

If we talk about storage systems an interaction or transaction with a computer is
divided for first what is an “Entry time” - ? :

Select one of the following:

  • The time for the user to enter the command

  • The time between when the user enters the command and the complete response is displayed

  • The time from the reception of the response until the user begins to enter the next command

Explanation

Question 100 of 189

1

If we talk about storage systems an interaction or transaction with a
computer is divided for first what is an “System response time” - ?:

Select one of the following:

  • The time between when the user enters the command and the complete response is displayed

  • The time for the user to enter the command

  • The time from the reception of the response until the user begins to enter the next command

Explanation

Question 101 of 189

1

If we talk about storage systems an interaction or transaction with a
computer is divided for first what is an “Think time” - ?:

Select one of the following:

  • The time from the reception of the response until the user begins to enter the next command

  • The time for the user to enter the command

  • The time between when the user enters the command and the complete response is displayed

Explanation

Question 102 of 189

1

Little’s Law and a series of definitions lead to several useful equations for
“Time server” - :

Select one of the following:

  • Average time to service a task; average service rate is 1/Time server traditionally represented
    by the symbol μ in many queuing texts

  • Average time/task in the system, or the response time, which is the sum of Time queue and Time server

  • Average time per task in the queue

Explanation

Question 103 of 189

1

Little’s Law and a series of definitions lead to several useful equations for
“Time queue” - :

Select one of the following:

  • Average time per task in the queue

  • Average time to service a task; average service rate is 1/Time server traditionally
    represented by the symbol μ in many queuing texts

  • Average time/task in the system, or the response time, which is the sum of Time queue and Time server

Explanation

Question 104 of 189

1

Little’s Law and a series of definitions lead to several useful equations for
“Time system” - :

Select one of the following:

  • Average time/task in the system, or the response time, which is the sum of Time queue and Time server

  • Average time to service a task; average service rate is 1/Time server traditionally
    represented by the symbol μ in many queuing texts

  • Average time per task in the queue

Explanation

Question 105 of 189

1

Little’s Law and a series of definitions lead to several useful equations for
“Length server” - :

Select one of the following:

  • Average number of tasks in service

  • Average length of queue

Explanation

Question 106 of 189

1

Little’s Law and a series of definitions lead to several useful equations for
“Length queue” -:

Select one of the following:

  • Average length of queue

  • Average number of tasks in service

Explanation

Question 107 of 189

1

How many size of Cache L1 is true approximately? :

Select one of the following:

  • 8 KB

  • 256 KB

  • 2 MB

Explanation

Question 108 of 189

1

How many size of Cache L2 is true approximately?

Select one of the following:

  • 256 KB

  • 4 KB

  • 32 MB

Explanation

Question 109 of 189

1

How many size of Cache L3 is true approximately?

Select one of the following:

  • 3 MB

  • 256 MB

  • 256 KB

Explanation

Question 110 of 189

1

How many main levels of Cache Memory?

Select one of the following:

  • 3

  • 2

  • 6

  • 8

Explanation

Question 111 of 189

1

What is a “Synchronization” in Cache Memory?

Select one of the following:

  • Execution or waiting for synchronization variables

  • Execution in the OS that is neither idle nor in synchronization access

  • Execution in user code

Explanation

Question 112 of 189

1

What is a “Kernel” in Cache Memory?

Select one of the following:

  • Execution or waiting for synchronization variables

  • Execution in the OS that is neither idle nor in synchronization access

  • Execution in user code

Explanation

Question 113 of 189

1

What is a “Synchronization” in Cache Memory?

Select one of the following:

  • Execution in the OS that is neither idle nor in synchronization access

  • Execution in user code

  • Execution or waiting for synchronization variables

Explanation

Question 114 of 189

1

Network performance depends of what?

Select one of the following:

  • performance of swithes and transmission system

  • performance of switches

  • performance of transmission system

  • has no dependensies

Explanation

Question 115 of 189

1

The time between the start and the completion of an event ,such as milliseconds
for a disk access is...

Select one of the following:

  • latency

  • bandwidth

  • throughput

  • performance

Explanation

Question 116 of 189

1

Total amount of work done in a given time ,such as megabytes per second for disk
transfer...

Select one of the following:

  • bandwidth

  • latency

  • throughput

  • performance

Explanation

Question 117 of 189

1

Learning curve itself is best measured by change in...

Select one of the following:

  • yeld

  • bytes

  • bits

  • seconds

Explanation

Question 118 of 189

1

Products that are sold by multiple vendors in large volumes and are essentialy
identical

Select one of the following:

  • commodities

  • boxes

  • folders

  • files

Explanation

Question 119 of 189

1

Integrated circuit processes are charecterized by the

Select one of the following:

  • feature size

  • permanent size n

  • compex size

  • fixed size

Explanation

Question 120 of 189

1

For CMOS chips, the traditional dominant energy consumption has been in
switching transistors, called ____

Select one of the following:

  • dynamic power

  • physical energy

  • constant supply

  • simple battery

Explanation

Question 121 of 189

1

Manufacturing costs that decrease over time are ____

Select one of the following:

  • the learning curve

  • the cycled line

  • the regular option

  • the final loop

Explanation

Question 122 of 189

1

Volume is a ________ key factor in determining cost

Select one of the following:

  • second

  • first

  • fifth

  • third

Explanation

Question 123 of 189

1

The most companies spend only ____________ of their income on R&D, which
includes all engineering.

Select one of the following:

  • 4% to 12%

  • 15% to 30%

  • 1% to 17%

  • 30% to 48%

Explanation

Question 124 of 189

1

Systems alternate between two states of service with respect to an SLA:

Select one of the following:

  • 1. Service accomplishment, where the service is delivered as specified
    2. Service interruption, where the delivered service is different from the SLA

  • 1. Service accomplishment, where the service is not delivered as specified
    2. Service interruption, where the delivered service is different from the SLA

  • 1. Service accomplishment, where the service is not delivered as specified
    2. Service interruption, where the delivered service is not different from the SLA

  • 1. Service accomplishment, where the service is delivered as specified
    2. Service interruption, where the delivered service is not different from the SLA

Explanation

Question 125 of 189

1

Desktop benchmarks divide into __ broad classes:

Select one of the following:

  • two

  • three

  • four

  • five

Explanation

Question 126 of 189

1

What MTTF means:

Select one of the following:

  • mean time to failure

  • mean time to feauture

  • mean this to failure

  • my transfers to failure

Explanation

Question 127 of 189

1

A widely held rule of thumb is that a program spends __ of its execution time in
only __ of the code.

Select one of the following:

  • 90% 10%

  • 50% 50%

  • 70% 30%

  • 89% 11%

Explanation

Question 128 of 189

1

(Performance for entire task using the enhancement when possible) / (Performance
for entire task without using the enhancement) is equals to:

Select one of the following:

  • Speedup

  • Efficiency

  • Probability

  • Ration

Explanation

Question 129 of 189

1

Which of the following descriptions corresponds to static power?

Select one of the following:

  • Grows proportionally to the transistor count (whether or not the transistors are switching)

  • Proportional to the product of the number of switching transistors and the switching rate
    Probability

  • Proportional to the product of the number of switching transistors and the switching rate

  • All of the above

Explanation

Question 130 of 189

1

Which of the following descriptions corresponds to dynamic power?

Select one of the following:

  • Proportional to the product of the number of switching transistors and the switching rate

  • Grows proportionally to the transistor count (whether or not the transistors are switching)

  • Certainly a design concern

  • None of the above

Explanation

Question 131 of 189

1

Which of the written below is NOT increase power consumption?

Select one of the following:

  • Increasing multithreading

  • Increasing performance

  • Increasing multiple cores

  • Increasing multithreading (V baze tak napisano)

Explanation

Question 132 of 189

1

Growing performance gap between peak and sustained performance translates to
increasing energy per unit of performance, when:

Select one of the following:

  • The number of transistors switching will be proportional to the peak issue rate, and the
    performance is proportional to the sustained rate

  • The number of transistors switching will be proportionalto the sustained rate, and the
    performance is proportionalto the peak issue rate

  • The number of transistors switching will be proportional to the sustained rate

  • The performance is proportional to the peak issue rate

Explanation

Question 133 of 189

1

If we want to sustain four instructions per clock

Select one of the following:

  • We must fetch more, issue more, and initiate execution on more than four instructions

  • We must fetch less, issue more, and initiate execution on more than two instructions

  • We must fetch more, issue less, and initiate execution on more than three instructions

  • We must fetch more, issue more, and initiate execution on less than five instructions

Explanation

Question 134 of 189

1

If speculation were perfect, it could save power, since it would reduce the execution time and
save _____________, while adding some additional overhead to implement

Select one of the following:

  • Static power

  • Dynamic power

  • Processing rate

  • Processor state

Explanation

Question 135 of 189

1

When speculation is not perfect, it rapidly becomes energy inefficient, since it requires
additional ___________ both for the incorrect speculation and for the resetting of the processor
state

Select one of the following:

  • Dynamic power

  • Static power

  • Processing rate

  • Processor state

Explanation

Question 136 of 189

1

Which of these concepts is NOT illustrated case study by Wen-mei W. Hwu and John W.
Sias

Select one of the following:

  • Achievable ILP with software resource constraints

  • Limited ILP due to software dependences

  • Achievable ILP with hardware resource constraints

  • Variability of ILP due to software and hardware interaction

Explanation

Question 137 of 189

1

What is a hash table?

Select one of the following:

  • Popular data structure for organizing a large collection of data items so that one can quickly
    answer questions

  • Popular data structure for updating large collections, so that one can hardly answer questions

  • Popular tables for organizing a large collection of data structure

  • Popular data structure for deletingsmall collections of data items so that one can hardly
    answer questions

Explanation

Question 138 of 189

1

Which of these is NOT characteristics of recent highperformance microprocessors?

Select one of the following:

  • Color

  • Power

  • Functional unit capability

  • Clock rate

Explanation

Question 139 of 189

1

How this process called: “Operations execute as soon as their operands are available”

Select one of the following:

  • data flow execution

  • instruction execution

  • data control execution

  • instruction field execution

Explanation

Question 140 of 189

1

For what the reorder buffer is used :

Select one of the following:

  • To pass results among instructions that may be speculated

  • To pass parameters through instructions that may be speculated

  • To get additional registers in the same way as the reservation stations

  • To control registers

Explanation

Question 141 of 189

1

How many fields contains the entry in the ROB:

Select one of the following:

  • 4

  • 5

  • 6

  • 3

Explanation

Question 142 of 189

1

Choose correct fields of entry in the ROB:

Select one of the following:

  • the instruction type, the destination field, the value field, and the ready field

  • the source type, the destination field, the value field, and the ready field

  • the program type, the ready field, the parameter field, the destination field

  • the instruction type, the destination field, and the ready field

Explanation

Question 143 of 189

1

Choose the steps of instruction execution:

Select one of the following:

  • issue, execute, write result, commit

  • execution, commit, rollback

  • issue, execute, override, exit

  • begin, write, interrupt, commit

Explanation

Question 144 of 189

1

Which one is not the major flavor of Multiple-issue processors

Select one of the following:

  • statistically superscalar processors

  • dynamically scheduled superscalar processors

  • statically scheduled superscalar processors

  • VLIW (very long instruction word) processors

Explanation

Question 145 of 189

1

Which Multiple-issue processors has not the hardware hazard detection

Select one of the following:

  • EPIC

  • Superscalar(dynamic)

  • Superscalar(static)

  • Superscalar(speculative)

Explanation

Question 146 of 189

1

Examples of EPIC:

Select one of the following:

  • Itanium

  • Pentium 4, MIPS R12K, IBM, Power5

  • MIPS and ARM

  • TI C6x

Explanation

Question 147 of 189

1

Examples of superscalar(static):

Select one of the following:

  • MIPS and ARM

  • Pentium 4, MIPS R12K, IBM, Power5

  • Itanium

  • TI C6x

Explanation

Question 148 of 189

1

Examples of superscalar(dynamic) :

Select one of the following:

  • None at the present

  • Pentium 4, MIPS R12K, IBM, Power5

  • MIPS and ARM

  • TI C6x

Explanation

Question 149 of 189

1

Examples of VLIW/LIW:

Select one of the following:

  • TI C6x

  • MIPS and ARM

  • Itanium

  • Pentium 4, MIPS R12K, IBM, Power5

Explanation

Question 150 of 189

1

A branch-prediction cache that stores the predicted address for the next instruction after a
branch

Select one of the following:

  • branch-target buffer

  • data buffer

  • frame buffer

  • optical buffer

Explanation

Question 151 of 189

1

Buffering the actual target instructions allows us to perform an optimization which called:

Select one of the following:

  • branch folding

  • Branch prediction

  • Target instructions

  • Target address

Explanation

Question 152 of 189

1

Which is not the function of integrated instruction fetch unit:

Select one of the following:

  • Instruction memory commit

  • Integrated branch prediction

  • Instruction prefetch

  • Instruction memory access and buffering

Explanation

Question 153 of 189

1

What is the simple technique that predicts whether two stores or a load and a store refer to
the same memory address:

Select one of the following:

  • Address aliasing prediction

  • Branch prediction

  • Integrated branch prediction

  • Dynamic branch prediction

Explanation

Question 154 of 189

1

How to decrypt RISC?

Select one of the following:

  • Reduced Instruction Set Computer

  • Recall Instruction Sell Communication

  • Rename Instruction Sequence Corporation

  • Red Instruction Small Computer

Explanation

Question 155 of 189

1

The ideal pipeline CPI is a measure of …

Select one of the following:

  • the maximum performance attainable by the implementation

  • the maximum performance attainable by the instruction

  • the minimum performance attainable by the implementation

  • the minimum performance attainable by the instruction

Explanation

Question 156 of 189

1

What is the Pipeline CP = ?

Select one of the following:

  • deal pipeline CPI + Structural stalls + Data hazard stalls + Control stalls

  • deal pipeline CPU + Data hazard stalls + Control stalls

  • deal pipeline CPU + deal pipeline CPI + Data hazard stalls + Control stalls

  • Structural stalls + Data hazard stalls + Control stalls

Explanation

Question 157 of 189

1

The simplest and most common way to increase the ILP is …?

Select one of the following:

  • to exploit parallelism among iterations of a loop

  • to exploit minimalism among iterations of a loop

  • to destroy iterations of a loop

  • to decrease the minimalism of risk

Explanation

Question 158 of 189

1

The simplest and most common way to increase the ILP is to exploit parallelism among
iterations of a loop. How is often called?

Select one of the following:

  • loop-level parallelism

  • exploit-level parallelism

  • high-level minimalism

  • low-level minimalism

Explanation

Question 159 of 189

1

In parallelism have three different types of dependences, tagging him:

Select one of the following:

  • data dependences , name dependences , and control dependences

  • data dependences , name dependences , and surname dependences

  • datagram dependences , name dependences , and animal dependences

  • no correct answers

Explanation

Question 160 of 189

1

What is Name dependence?

Select one of the following:

  • name dependence occurs when two instructions use the same register or memory location

  • name dependence occurs when five or more instructions use the same register or memory location

  • name dependence occurs when instructions use the same name

  • All answers is correct

Explanation

Question 161 of 189

1

When occurs an output dependence?

Select one of the following:

  • When i and instruction j write the same register or memory location

  • when i and instruction j write the same name

  • when i and instruction j write the same adress or memory location

  • All answers is correct

Explanation

Question 162 of 189

1

What is RAW (read after write)?

Select one of the following:

  • when j tries to read a source before i writes it, so j incorrectly gets the old value

  • when i tries to read a source before j writes it, so j correctly gets the old value

  • when j tries to write a source before i writes it

  • when a tries to write a source before b read it, so a incorrectly gets the old value

Explanation

Question 163 of 189

1

What is given is not a hazard?

Select one of the following:

  • RAR

  • WAR

  • WAW

  • LOL

Explanation

Question 164 of 189

1

A simple scheme for increasing the number of instructions relative to the branch and
overhead instructions is…?

Select one of the following:

  • loop unrolling

  • RAR

  • loop-level

  • loop rolling

Explanation

Question 165 of 189

1

Effect that results from instruction scheduling in large code segments is called…?

Select one of the following:

  • register pressure

  • loop unrolling

  • loop-level

  • registration

Explanation

Question 166 of 189

1

The simplest dynamic branch-prediction scheme is a

Select one of the following:

  • branch-prediction buffer

  • branch buffer

  • All answers correct

  • registration

Explanation

Question 167 of 189

1

Branch predictors that use the behavior of other branches to make a prediction are called

Select one of the following:

  • correlating predictors or two-level predictors

  • branch-prediction buffer

  • branch table

  • three level loop

Explanation

Question 168 of 189

1

How many branch-selected entries are in a (2,2) predictor that has a total of 8K bits in the
prediction buffer? If we know that Number of prediction entries selected by the branch = 8K

Select one of the following:

  • the number of prediction entries selected by the branch = 1K.

  • the number of prediction entries selected by the branch = 2K.

  • the number of prediction entries selected by the branch = 8K.

  • the number of prediction entries selected by the branch = 4K.

Explanation

Question 169 of 189

1

What is the compulsory in Cs model?

Select one of the following:

  • The very first access to a block cannot be in the cache, so the block must be brought into the cache.
    Compulsory misses are those that occur even if you had an infinite cache

  • If the cache cannot contain all the blocks needed during execution of a program, capacity misses
    (in addition to compulsory misses) will occur because of blocks being discarded and later
    retrieved

  • The number of accesses that miss divided by the number of accesses.

  • None of them

Explanation

Question 170 of 189

1

What is capacityin Cs model?

Select one of the following:

  • If the cache cannot contain all the blocks needed during execution of a program, capacity misses
    (in addition to compulsory misses) will occur because of blocks being discarded and later retrieved

  • The very first access to a block cannot be in the cache, so the block must be brought into the
    cache. Compulsory misses are those that occur even if you had an infinite cache.

  • The number of accesses that miss divided by the number of accesses.

  • None of them

Explanation

Question 171 of 189

1

What is conflict in Cs model?

Select one of the following:

  • If the block placement strategy is not fully associative, conflict misses (in addition to compulsory
    and capacity misses) will occur because a block may be discarded and later retrieved if conflicting
    blocks map to its set

  • The very first access to a block cannot be in the cache, so the block must be brought into the
    cache. Compulsory misses are those that occur even if you had an infinite cache.

  • If the cache cannot contain all the blocks needed during execution of a program, capacity misses
    (in addition to compulsory misses) will occur because of blocks being discarded and later
    retrieved

  • None of them

Explanation

Question 172 of 189

1

Choose the benefit of Cache Optimization.

Select one of the following:

  • Larger block size to reduce miss rate

  • Bigger caches to increase miss rat

  • Single level caches to reduce miss penalty

  • None of them

Explanation

Question 173 of 189

1

Choose the strategy of Seventh Optimization.

Select one of the following:

  • Critical word first

  • Critical restart

  • Sequential inter leaving

  • Merging Write Buffer to Reduce Miss Penalty

Explanation

Question 174 of 189

1

Choose the Eight Optimization

Select one of the following:

  • Merging Write Buffer to Reduce Miss Penalty

  • Critical word first

  • Nonblocking Caches to Increase Cache Bandwidth

  • Trace Caches to Reduce Hit Time

Explanation

Question 175 of 189

1

Choose the Eleventh Optimization

Select one of the following:

  • Compiler-Controlled Prefetching to Reduce Miss Penalty or Miss Rate

  • Merging Write Buffer to Reduce Miss Penalty

  • Hardware Prefetching of Instructions and Data to Reduce Miss Penalty or Miss Rate

  • None of them

Explanation

Question 176 of 189

1

What is the access time?

Select one of the following:

  • Time between when a read is requested and when the desired word arrives

  • The minimum time between requests to memory.

  • Describes the technology inside the memory chips and those innovative, internal organizations

  • None of them

Explanation

Question 177 of 189

1

What is the cycle time?

Select one of the following:

  • The minimum time between requests to memory

  • Time between when a read is requested and when the desired word arrives

  • The maximum time between requests to memory.

  • None of them

Explanation

Question 178 of 189

1

How much in percentage single-processor performance improvement has dropped to
less than?

Select one of the following:

  • 11%

  • 22%

  • 33%

Explanation

Question 179 of 189

1

How many elements of the Instruction Set Architecture (ISA):

Select one of the following:

  • 6

  • 7

  • 8

Explanation

Question 180 of 189

1

What is the Thread Level Parallelism –

Select one of the following:

  • Exploits either data-level parallelism or task-level parallelism in a tightly coupled hardware model that
    allows for interaction among parallel threads.

  • Exploit data-level parallelism by applying a single instruction to a collection of data in parallel.

  • Exploits parallelism among largely decoupled tasks specified by the programmer or operating system.

Explanation

Question 181 of 189

1

What is the PMD in computer classes?

Select one of the following:

  • Personal mobile device

  • Powerful markup distance

  • Percentage map device

Explanation

Question 182 of 189

1

What is the Instruction Level Parallelism:

Select one of the following:

  • Exploits data-level parallelism at modest levels with compiler help using ideas like pipelining and at a
    medium levels using ideas like speculative execution.

  • Exploits parallelism among largely decoupled tasks specified by the programmer or operating system

  • Exploit data-level parallelism by applying a single instruction to a collection of data in parallel

Explanation

Question 183 of 189

1

How many elements in Trends of Technology?

Select one of the following:

  • 5

  • 6

  • 4

Explanation

Question 184 of 189

1

What is the Vector Architecture and Graphic Processor Units (GPUs) –

Select one of the following:

  • Exploit data-level parallelism by applying a single instruction to a collection of data in parallel.

  • Exploits data-level parallelism at modest levels with compiler help using ideas like pipelining and at a
    medium levels using ideas like speculative execution

  • Exploits parallelism among largely decoupled tasks specified by the programmer or operating system.

Explanation

Question 185 of 189

1

How many Optimizations’ in Cache memory Performance?

Select one of the following:

  • 8

  • 6

  • 10

Explanation

Question 186 of 189

1

What is the Reducing the Miss Rate?

Select one of the following:

  • Time Optimization

  • Compiler Optimization

  • Performance Optimization

Explanation

Question 187 of 189

1

What is the Spatial Locality?

Select one of the following:

  • Exploit by fetching blocks of data around recently accessed locations

  • Exploit by remembering the contents of recently accessed locations

Explanation

Question 188 of 189

1

What is the Temporal Locality?

Select one of the following:

  • Exploit by fetching blocks of data around recently accessed locations

  • Exploit by remembering the contents of recently accessed locations

Explanation

Question 189 of 189

1

True formula of Module availability (MTTF – mean time to failure, MTTR – mean
time to repair)?

Select one of the following:

  • MTTF / (MTTF + MTTR)

  • MTTF * (MTTF + MTTR)

  • MTTF * (MTTF - MTTR)

Explanation