Csse 1502
Quiz by , created more than 1 year ago

It always seems impossible until it’s done.

41
1
0
Csse 1502
Created by Csse 1502 almost 6 years ago
Close

БАЗА Вопросы с Чаптеров

Question 1 of 54

1

Which of the following descriptions corresponds to static power?

Select one of the following:

  • Proportional to the product of the number of switching transistors and the switching rate

  • Grows proportionally to the transistor count (whether or not the transistors are switching)

  • Dominant energy consumer

  • All of the above

Explanation

Question 2 of 54

1

Which of the following descriptions corresponds to dynamic power?

Select one or more of the following:

  • Proportional to the product of the number of switching transistors and the switching rate

  • Grows proportionally to the transistor count (whether or not the transistors are switching)

  • Certainly a design concern

  • None of the above

Explanation

Question 3 of 54

1

Which of the written below is NOT increase power consumption?

Select one of the following:

  • Increasing performance

  • Increasing multiple cores

  • Increasing multithreading

  • Decreasing performance

Explanation

Question 4 of 54

1

Growing performance gap between peak and sustained performance translates to increasing energy per unit of performance, when

Select one of the following:

  • The number of transistors switching will be proportional to the peak issue rate, and the performance is proportional to the sustained rate

  • The number of transistors switching will be proportional to the sustained rate, and the performance is proportional to the peak issue rate

  • The number of transistors switching will be proportional to the sustained rate

  • The performance is proportional to the peak issue rate

Explanation

Question 5 of 54

1

How this process called: “Operations execute as soon as their operands are available”

Select one of the following:

  • data flow execution

  • instruction execution

  • data control execution

  • instruction field execution

Explanation

Question 6 of 54

1

If we want to sustain four instructions per clock

Select one of the following:

  • We must fetch less, issue more, and initiate execution on more than two instructions

  • We must fetch more, issue less, and initiate execution on more than three instructions

  • We must fetch more, issue more, and initiate execution on more than four instructions

  • We must fetch more, issue more, and initiate execution on less than five instructions

Explanation

Question 7 of 54

1

For what the reorder buffer is used :

Select one of the following:

  • To pass parameters through instructions that may be speculated

  • To pass results among instructions that may be speculated.

  • To get additional registers in the same way as the reservation stations

  • To control registers

Explanation

Question 8 of 54

1

How many fields contains the entry in the ROB:

Select one of the following:

  • 5

  • 6

  • 3

  • 4

Explanation

Question 9 of 54

1

Choose correct fields of entry in the ROB:

Select one of the following:

  • the source type, the destination field, the value field, and the ready field

  • the program type, the ready field, the parameter field, the destination field

  • the instruction type, the destination field, the value field, and the ready field

  • the instruction type, the destination field, and the ready field

Explanation

Question 10 of 54

1

Choose the steps of instruction execution:

Select one of the following:

  • issue, execute, write result, commit

  • execution, commit, rollback

  • issue, execute, override, exit

  • begin, write, interrupt, commit

Explanation

Question 11 of 54

1

Which Multiple-issue processors has not the hardware hazard detection:

Select one of the following:

  • Superscalar(dynamic)

  • Superscalar(static)

  • Superscalar(speculative)

  • EPIC

Explanation

Question 12 of 54

1

Examples of EPIC:

Select one of the following:

  • Pentium 4, MIPS R12K, IBM, Power5

  • Itanium

  • MIPS and ARM

  • TI C6x

Explanation

Question 13 of 54

1

Examples of superscalar(static):

Select one of the following:

  • Pentium 4, MIPS R12K, IBM, Power5

  • Itanium

  • MIPS and ARM

  • TI C6x

Explanation

Question 14 of 54

1

If speculation were perfect, it could save power, since it would reduce the execution time and save _____________, while adding some additional overhead to implement

Select one of the following:

  • Static power

  • Dynamic power

  • Processing rate

  • Processor state

Explanation

Question 15 of 54

1

Examples of superscalar(dynamic) :

Select one of the following:

  • Pentium 4, MIPS R12K, IBM, Power5

  • None at the present

  • MIPS and ARM

  • TI C6x

Explanation

Question 16 of 54

1

When speculation is not perfect, it rapidly becomes energy inefficient, since it requires additional ___________ both for the incorrect speculation and for the resetting of the processor state

Select one of the following:

  • Static power

  • Dynamic power

  • Processing rate

  • Processor state

Explanation

Question 17 of 54

1

Which of these concepts is NOT illustrated case study by Wen-mei W. Hwu and John W. Sias

Select one of the following:

  • Limited ILP due to software dependences

  • Achievable ILP with hardware resource constraints

  • Variability of ILP due to software and hardware interaction

  • Achievable ILP with software resource constraints

Explanation

Question 18 of 54

1

Examples of VLIW/LIW:

Select one of the following:

  • Pentium 4, MIPS R12K, IBM, Power5

  • Itanium

  • MIPS and ARM

  • TI C6x

Explanation

Question 19 of 54

1

What is a hash table?

Select one of the following:

  • Popular data structure for updating large collections, so that one can hardly answer questions

  • Popular tables for organizing a large collection of data structure

  • Popular data structure for organizing a large collection of data items so that one can quickly answer questions

  • Popular data structure for deleting small collections of data items so that one can hardly answer questions

Explanation

Question 20 of 54

1

A branch-prediction cache that stores the predicted address for the next instruction after a branch

Select one of the following:

  • branch-target buffer

  • data buffer

  • framebuffer

  • optical buffer

Explanation

Question 21 of 54

1

Buffering the actual target instructions allows us to perform an optimization which called:

Select one of the following:

  • branch folding

  • Branch prediction

  • Target instructions

  • Target address

Explanation

Question 22 of 54

1

Which of these is NOT characteristics of recent highperformance microprocessors?

Select one of the following:

  • Power

  • Functional unit capability

  • Clock rate

  • Color

Explanation

Question 23 of 54

1

Which is not the function of integrated instruction fetch unit:

Select one of the following:

  • Integrated branch prediction

  • Instruction prefetch

  • Instruction memory access and buffering

  • Instruction memory commit

Explanation

Question 24 of 54

1

What is the simple technique that predicts whether two stores or a load and a store refer to the same memory address:

Select one of the following:

  • Address aliasing prediction

  • Branch prediction

  • Integrated branch prediction

  • Dynamic branch prediction

Explanation

Question 25 of 54

1

How to decrypt RISC?

Select one of the following:

  • Reduced Instruction Set Computer

  • Recall Instruction Sell Communication

  • Rename Instruction Sequence Corporation

  • Red Instruction Small Computer

Explanation

Question 26 of 54

1

The ideal pipeline CPI is a measure of …

Select one of the following:

  • the maximum performance attainable by the instruction

  • the minimum performance attainable by the implementation

  • the maximum performance attainable by the implementation

  • the minimum performance attainable by the instruction

Explanation

Question 27 of 54

1

what is the Pipeline CPI = ?

Select one of the following:

  • deal pipeline CPI + Structural stalls + Data hazard stalls + Control stalls

  • deal pipeline CPU + Data hazard stalls + Control stalls

  • deal pipeline CPU + deal pipeline CPI + Data hazard stalls + Control stalls

  • Structural stalls + Data hazard stalls + Control stalls

Explanation

Question 28 of 54

1

The simplest and most common way to increase the ILP is …?

Select one of the following:

  • to exploit minimalism among iterations of a loop

  • to exploit parallelism among iterations of a loop

  • to destroy iterations of a loop

  • to decrease the minimalism of risk

Explanation

Question 29 of 54

1

The simplest and most common way to increase the ILP is to exploit parallelism among iterations of a loop. How is often called?

Select one of the following:

  • exploit-level parallelism

  • high-level minimalism

  • loop-level parallelism

  • low-level minimalism

Explanation

Question 30 of 54

1

In parallelism have three different types of dependences, tagging him:

Select one of the following:

  • data dependences , name dependences , and control dependences .

  • data dependences , name dependences , and surname dependences .

  • datagram dependences , name dependences , and animal dependences .

  • no correct answers

Explanation

Question 31 of 54

1

What is Name dependence?

Select one of the following:

  • name dependence occurs when two instructions use the same register or memory location

  • name dependence occurs when five or more instructions use the same register or memory location

  • name dependence occurs when instructions use the same name

  • All answers is correct

Explanation

Question 32 of 54

1

When occurs an output dependence?

Select one of the following:

  • when i and instruction j write the same name

  • when i and instruction j write the same register or memory location

  • when i and instruction j write the same adress or memory location

  • All answers is correct

Explanation

Question 33 of 54

1

What is RAW (read after write)?

Select one of the following:

  • when j tries to read a source before i writes it, so j incorrectly gets the old value

  • when i tries to read a source before j writes it, so j correctly gets the old value

  • when j tries to write a source before i writes it

  • when a tries to write a source before b read it, so a incorrectly gets the old value

Explanation

Question 34 of 54

1

What is given is not a hazard?

Select one of the following:

  • WAR

  • RAR

  • WAW

  • LOL

Explanation

Question 35 of 54

1

A simple scheme for increasing the number of instructions relative to the branch and overhead instructions is…?

Select one of the following:

  • loop-level

  • RAR

  • loop rolling

  • loop unrolling

Explanation

Question 36 of 54

1

Effect that results from instruction scheduling in large code segments is called…?

Select one of the following:

  • loop unrolling

  • loop-level

  • register pressure

  • registration

Explanation

Question 37 of 54

1

The simplest dynamic branch-prediction scheme is a

Select one of the following:

  • branch-prediction buffer

  • branch buffer

  • All answers correct

  • no correct answers

Explanation

Question 38 of 54

1

Branch predictors that use the behavior of other branches to make a prediction are called

Select one of the following:

  • correlating predictors or two-level predictors

  • branch-prediction buffer

  • branch table

  • three level loop

Explanation

Question 39 of 54

1

How many branch-selected entries are in a (2,2) predictor that has a total of 8K bits in the prediction buffer? If we know that Number of prediction entries selected by the branch = 8K

Select one of the following:

  • the number of prediction entries selected by the branch = 1K.

  • the number of prediction entries selected by the branch = 2K.

  • the number of prediction entries selected by the branch = 8K.

  • the number of prediction entries selected by the branch = 4K.

Explanation

Question 40 of 54

1

What is the compulsory in Cs model?

Select one of the following:

  • The very first access to a block cannot be in the cache, so the block must be brought into the cache. Compulsory misses are those that occur even if you had an infinite cache.

  • If the cache cannot contain all the blocks needed during execution of a program, capacity misses (in addition to compulsory misses) will occur because of blocks being discarded and later retrieved

  • The number of accesses that miss divided by the number of accesses.

  • None of these

Explanation

Question 41 of 54

1

What is capacity in Cs model?

Select one of the following:

  • If the cache cannot contain all the blocks needed during execution of a program, capacity misses (in addition to compulsory misses) will occur because of blocks being discarded and later retrieved

  • The very first access to a block cannot be in the cache, so the block must be brought into the cache. Compulsory misses are those that occur even if you had an infinite cache.

  • The number of accesses that miss divided by the number of accesses.

  • None of these

Explanation

Question 42 of 54

1

What is conflict in Cs model?

Select one of the following:

  • If the block placement strategy is not fully associative, conflict misses (in addition to compulsory and capacity misses) will occur because a block may be discarded and later retrieved if conflicting blocks map to its set

  • The very first access to a block cannot be in the cache, so the block must be brought into the cache. Compulsory misses are those that occur even if you had an infinite cache.

  • If the cache cannot contain all the blocks needed during execution of a program, capacity misses (in addition to compulsory misses) will occur because of blocks being discarded and later retrieved

  • None of these

Explanation

Question 43 of 54

1

Choose the benefit of Cache Optimization.

Select one of the following:

  • Larger block size to reduce miss rate

  • Bigger caches to increase miss rat

  • Single level caches to reduce miss penalty

  • None of these

Explanation

Question 44 of 54

1

Choose the strategy of Seventh Optimization.

Select one of the following:

  • Critical word first

  • Critical restart

  • Sequential interleaving

  • Merging Write Buffer to Reduce Miss Penalty

Explanation

Question 45 of 54

1

Choose the Eight Optimization

Select one of the following:

  • Merging Write Buffer to Reduce Miss Penalty

  • Critical word first

  • Nonblocking Caches to Increase Cache Bandwidth

  • Trace Caches to Reduce Hit Time

Explanation

Question 46 of 54

1

Choose the Eleventh Optimization

Select one of the following:

  • Compiler-Controlled Prefetching to Reduce Miss Penalty or Miss Rate

  • Merging Write Buffer to Reduce Miss Penalty

  • Hardware Prefetching of Instructions and Data to Reduce Miss Penalty or Miss Rate

  • None of these

Explanation

Question 47 of 54

1

What is the access time?

Select one of the following:

  • Time between when a read is requested and when the desired word arrives

  • The minimum time between requests to memory.

  • Describes the technology inside the memory chips and those innovative, internal organizations

  • None of these

Explanation

Question 48 of 54

1

9. What is the cycle time?

Select one of the following:

  • The minimum time between requests to memory.

  • Time between when a read is requested and when the desired word arrives

  • The maximum time between requests to memory.

  • None of these

Explanation

Question 49 of 54

1

What does SRAM stands for?

Select one of the following:

  • Static Random Access memory

  • System Random Access memory

  • Short Random Access memory

  • None of these

Explanation

Question 50 of 54

1

What does DRAM stands for?

Select one of the following:

  • Dynamic Random Access memory

  • Dual Random Access memory

  • Dataram Random Access memory

  • None of these

Explanation

Question 51 of 54

1

What does DDR stands for?

Select one of the following:

  • Double data rate

  • Dual data rate

  • Double data reaction

  • None of these

Explanation

Question 52 of 54

1

What is kernel process?

Select one of the following:

  • Provide at least two modes, indicating whether the running process is a user process or an operating system process

  • Provide at least five modes, indicating whether the running process is a user process or an operating system process

  • Provide a portion of the processor state that a user process can use but not write

  • None of these

Explanation

Question 53 of 54

1

Which one is NOT concerning to pitfall?

Select one of the following:

  • Simulating enough instructions to get accurate performance measures of the memory hierarchy

  • Implementing a virtual machine monitor on an instruction set architecture that wasn’t designed to be virtualizable

  • Overemphasizing memory bandwidth in DRAMs

  • Predicting cache performance of one program from another

Explanation

Question 54 of 54

1

Which one is concerning to fallacy?

Select one of the following:

  • Simulating enough instructions to get accurate performance measures of the memory hierarchy

  • Predicting cache performance of one program from another

  • Implementing a virtual machine monitor on an instruction set architecture that wasn’t designed to be virtualizable

  • Overemphasizing memory bandwidth in DRAMs

Explanation