

MCQOPTIONS
Saved Bookmarks
This section includes 15 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Organization knowledge and support exam preparation. Choose a topic below to get started.
1. |
THE_TECHNIQUE_OF_SEARCHING_FOR_A_BLOCK_BY_GOING_THROUGH_ALL_THE_TAGS_IS_______?$ |
A. | Linear search |
B. | Binary search |
C. | Associative search |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
2. |
In set-associative technique, the blocks are grouped into ______ sets.$ |
A. | 4 |
B. | 8 |
C. | 12 |
D. | 6 |
Answer» E. | |
3. |
The set-associative map technique is a combination of the direct and associative technique.$ |
A. | True |
B. | False |
Answer» B. False | |
4. |
Data which is not up-to date is called as _______ |
A. | Spoilt data |
B. | Stale data |
C. | Dirty data |
D. | None of the mentioned |
Answer» C. Dirty data | |
5. |
The bit used to indicate whether the block was recently used or not is _______ |
A. | Idol bit |
B. | Control bit |
C. | Reference bit |
D. | Dirty bit |
Answer» E. | |
6. |
A control bit called ____ has to be provided to each block in set-associative. |
A. | Idol bit |
B. | Valid bit |
C. | Reference bit |
D. | All of the mentioned |
Answer» C. Reference bit | |
7. |
The associative mapping is costlier than direct mapping? |
A. | True |
B. | False |
Answer» B. False | |
8. |
In associative mapping, in a 16 bit system the tag field has ______ bits? |
A. | 12 |
B. | 8 |
C. | 9 |
D. | 10 |
Answer» B. 8 | |
9. |
In direct mapping the presence of the block in memory is checked with the help of block field. |
A. | True |
B. | False |
Answer» C. | |
10. |
While using the direct mapping technique, in a 16 bit system the higher order 5 bits are used for ________ |
A. | Tag |
B. | Block |
C. | Word |
D. | Id |
Answer» B. Block | |
11. |
The method of mapping the consecutive memory blocks to consecutive cache blocks is called ______ |
A. | Set associative |
B. | Associative |
C. | Direct |
D. | Indirect |
Answer» D. Indirect | |
12. |
The only draw back of using the early start protocol is _______ |
A. | Time delay |
B. | Complexity of circuit |
C. | Latency |
D. | High miss rate |
Answer» C. Latency | |
13. |
In ________ protocol the information is directly written into the main memory. |
A. | Write through |
B. | Write back |
C. | Write first |
D. | None of the mentioned |
Answer» B. Write back | |
14. |
During a write operation if the required block is not present in the cache then ______ occurs. |
A. | Write latency |
B. | Write hit |
C. | Write delay |
D. | Write miss |
Answer» E. | |
15. |
The memory blocks are mapped on to the cache with the help of ______ |
A. | Hash functions |
B. | Vectors |
C. | Mapping functions |
D. | None of the mentioned |
Answer» D. None of the mentioned | |