Explore topic-wise MCQs in Organization and Architecture Mcqs.

This section includes 170 Mcqs, each offering curated multiple-choice questions to sharpen your Organization and Architecture Mcqs knowledge and support exam preparation. Choose a topic below to get started.

101.

For reducing the frequency on replacement of write-back blocks, the commonly used feature, is known as

A. Hit miss
B. Index field
C. Write-through
D. Dirty bit
Answer» E.
102.

A direct-mapped cache having a size of N and has the miss rate same as a two-way set-associative cache, of size

A. N
B. N*2
C. N/2
D. N^2
Answer» D. N^2
103.

The block placement strategy, is if set associative/direct mapped, then this miss is called

A. Hit miss
B. Cache miss
C. Conflict miss
D. Hit rate
Answer» D. Hit rate
104.

When Cycle per instruction is 1.0, data accesses are 50% of the total instructions, and the miss penalty is 25clock-cycles and the miss rate having 2%, then the computer would the faster as,

A. 1.25
B. 1.45
C. 1.75
D. 1.85
Answer» D. 1.85
105.

The address spaces are typically broken into the fixed-size blocks, called

A. Registers
B. Stacks
C. Pages
D. Frames
Answer» D. Frames
106.

The rate of no of misses in a cache which is divided by whole number of memory-accesses, to the cache, is known as

A. Local miss rate
B. Global miss rate
C. Hit rate
D. Miss rate
Answer» B. Global miss rate
107.

Assume that the hit-time is single clock cycle, independent of size of block, and then 16-byte block in a 4 KB cache will be having access-time of

A. 6.027 clock cycles
B. 8.077 clock cycles
C. 7.027 clock cycles
D. 8.027 clock cycles
Answer» E.
108.

The virtual memory producing the virtual-addresses, are translated by

A. Logical addresses
B. Local addresses
C. Physical addresses
D. All above
Answer» D. All above
109.

The most obvious architectural parameter is the

A. Physical pages
B. Page sizes
C. Page fault
D. Block size
Answer» C. Page fault
110.

The time of CPU can be modeled as

A. (CPU execution clock cycles + Memory stall clock cycles) - Clock cycle time
B. (CPU execution clock cycles x Memory stall clock cycles) + Clock cycle time
C. (CPU execution clock cycles + Memory stall clock cycles)
D. (CPU execution clock cycles / Memory stall clock cycles)
Answer» D. (CPU execution clock cycles / Memory stall clock cycles)
111.

The processor protection structure expand memory access protection from two levels to many, the added ones are

A. Rings
B. Frames
C. Pages
D. Blocks
Answer» B. Frames
112.

IA-32 allows the operating system to maintain the protection level of the called

A. Rings
B. Frames
C. Pages
D. Routine
Answer» E.
113.

Per memory reference, the miss-rate can be turned into the per instruction misses rate by

A. Miss rate= Memory accesses/ instructions
B. Miss rate= Memory accesses* instructions
C. Miss rate= Memory accesses-instructions
D. Miss rate= Memory accesses+ instructions
Answer» B. Miss rate= Memory accesses* instructions
114.

The field that is not found in paged systems, which establishes theupper bound of valid offsets for segments is called

A. Limit field
B. Valid field
C. Fault bit
D. Frame
Answer» B. Valid field
115.

A common optimization for reducing write stalls is a

A. Write buffer
B. Write-back
C. Read stall
D. Write stall
Answer» B. Write-back
116.

Address translation cache is referred to as a

A. Rephrasing
B. Cache buffer
C. Translation buffer
D. Relocation
Answer» D. Relocation
117.

Cutting of physical-memory into the form of blocks and allocating them to different processes, the stated technique is known as

A. Read back
B. Cache miss
C. Cache hit
D. Virtual memory
Answer» E.
118.

If the processor is not willing in the cycle for retiring the maximum number of instructions; it is said to be

A. In a stalled clock cycle
B. Write-back
C. Write-through
D. Read through
Answer» B. Write-back
119.

The security loopholes, prevents by not allowing the user process to ask the operating system to access somethingindirectly are known as

A. Blocks
B. Frames
C. Trojan horses
D. Routines
Answer» D. Routines
120.

When the processor is waiting for write instruction to complete during the write-through process, the processor is said to

A. Read back
B. Write-back
C. Read stall
D. Write stall
Answer» E.
121.

If a set has n blocks, the cache placement is then called

A. 2-way set distributive
B. 2-way set associative
C. N-way setting
D. N-way set associative
Answer» E.
122.

The cache memory of 1K words uses direct mapping with a block size of 4 words. How many blocks can the cache accommodate?

A. 256 words
B. 512 words
C. 1024 words
D. 128 words
Answer» B. 512 words
123.

If a block can be placed at every location in the cache, this cache is said to be

A. Indirectly mapped
B. Directly mapped
C. Fully associative
D. Partially associative
Answer» D. Partially associative
124.

For recording, was the block written, the Opteron keeps

A. 1 dirty bit per block
B. 2 dirty bits per block
C. 3 dirty bits per block
D. 4 dirty bits per block
Answer» B. 2 dirty bits per block
125.

The information when is written in the cache, both to the block in the cache and the block present in the lower-level memory, refers to

A. Miss rate
B. Write-back
C. Write-through
D. Dirty bit
Answer» D. Dirty bit
126.

Average access time of memory for having memory-hierarchy performance is given as

A. Average memory access time = Hit time + Miss rate
B. Average memory access time = Hit time + Miss rate
C. Average memory access time = Hit time + Miss rate + Miss penalty
D. Average memory access time = Hit time + Miss rate - Miss penalty
Answer» C. Average memory access time = Hit time + Miss rate + Miss penalty
127.

As segment or a page is normally used for block, page-fault and the address-fault is used for

A. Hit
B. Miss
C. Cache
D. Stack
Answer» C. Cache
128.

The block frame address are divided into the

A. Tag field
B. Index field
C. Stack field
D. Both a and b
Answer» E.
129.

The increase in the width of the cache address tag, can be done with the

A. Process-identity tag
B. Process-identifier term
C. Process-identifier tag
D. Process-identify tag
Answer» D. Process-identify tag
130.

The name given to the first or highest level of the memory-hierarchy, is known as

A. Memory
B. Cache
C. Flash memory
D. Registers
Answer» C. Flash memory
131.

The physical-address that is coming to the cache is further divided into field/s:

A. Block address
B. Block offset
C. Write-through
D. Both a and b
Answer» E.
132.

If the cache is not able for containing all the blocks needed while execution, the miss is then known as

A. Hit miss
B. Cache miss
C. Cache hit
D. Hit rate
Answer» C. Cache hit
133.

When the victim buffer is totally full, the cache must

A. Be full
B. Be empty
C. Wait
D. Move next
Answer» D. Move next
134.

10% stores and 26% loads instruction for MIPS programs, to make writes

A. 5%
B. 10%
C. 15%
D. 20%
Answer» C. 15%
135.

Larger blocks increases the conflict-misses and the capacity-misses, whenever the cache is

A. Great
B. Small
C. Large
D. Corrupt
Answer» C. Large
136.

The page table level that says if page has been modified, is known as

A. Presence
B. Read/write
C. Page size
D. Dirty
Answer» E.
137.

Data structure, maintaining the addresses of physical-pages, typically takes the form of a

A. Page size
B. Page table
C. Queue
D. Stack
Answer» C. Queue
138.

The matching tag sends the corresponding physical address through effectively a

A. 40:1 multiplexor
B. 20:1 multiplexor
C. 20:2 multiplexor
D. 30:1 multiplexor
Answer» B. 20:1 multiplexor
139.

Forget to accounting the byte addressing or the cache block-size, in processing a cache is a

A. Pitfall
B. Fallacy
C. Fully associative
D. Set associative
Answer» B. Fallacy
140.

The principle of locality that was used; implementing memory of the computer as

A. Locality in time
B. Locality in space
C. Memory hierarchy
D. Temporal locality
Answer» D. Temporal locality
141.

The program of copying address of PTE into temp $k1 would be executed with the instruction

A. Mfc0 $k1,Constant
B. Mfc1 $k1,Context
C. Mfc0 $k1,Context
D. Mfc0 $k2,Context
Answer» D. Mfc0 $k2,Context
142.

A field in the memory hierarchy table that indicates the associated block, is called a

A. Hit bit
B. Valid bit
C. Valid data
D. Hit time
Answer» C. Valid data
143.

A virtual-memory block is known as page, and a virtual-memory miss is called a

A. Page miss
B. Hit miss
C. Page fault
D. Memory fault
Answer» D. Memory fault
144.

Latency clock rate of the AMD operation is,

A. 2
B. 3
C. 4
D. 5
Answer» C. 4
145.

The decimal address having reference 22 will have a Binary address of reference

A. 10111two
B. 11110two
C. 10100two
D. 10110two
Answer» E.
146.

Cache misses created by the 1st access to a block, that was not in the cache, is known as

A. Cold-start misses
B. Compulsory misses
C. Capacity misses
D. Both a and b
Answer» E.
147.

A situation in which the same object is being accessed by two addresses, is referred to as

A. Aliasing
B. Hit miss
C. Valid data
D. Page miss
Answer» B. Hit miss
148.

The Cortex-A8 known as configurable core, which supports the computer instruction set architecture of

A. ARMv6
B. ARMv7
C. ARMv8
D. ARMv9
Answer» C. ARMv8
149.

One-half of the address is first sent during the

A. Row access strobe
B. Column access strobe
C. Column access cycle
D. Row access time
Answer» B. Column access strobe
150.

Switching from one process to another. This swapping is called a

A. Process switch
B. Context switch
C. Exchange
D. Both a and b
Answer» E.