COA MCQs
COA MCQs
Explanation: Machine language instruction format has one or more fields. The first one is the operation
code field.
Explanation: The LSBs(least significant bits) from 0 to 3 represent R/M field that specifies another
register or memory location i.e. the other operand.
Explanation: The Z-bit is used by the REP instruction to control the loop.
Explanation: If W-bit is ‘1’ then the operand is of 16-bits, and if it is ‘0’ then the operand is of 8-bits.
9. The instructions which after execution transfer control to the next instruction in the sequence are called
a) Sequential control flow instructions
b) control transfer instructions
c) Sequential control flow & control transfer instructions
d) none of the mentioned
Explanation: The sequential control flow instructions follow sequence order in their execution.
10. The instructions that transfer the control to some predefined address or the address specified in the
instruction are called as
a) sequential control flow instructions
b) control transfer instructions
c) sequential control flow & control transfer instructions
d) none of the mentioned
Explanation: The control transfer instructions transfer control to the specified address.
Explanation: In Immediate addressing mode, immediate data is a part of instruction and appears in
the form of successive byte or bytes
12. The instruction, MOV AX, 1234H is an example of
a) register addressing mode
b) direct addressing mode
c) immediate addressing mode
d) based indexed addressing mode
Explanation: Since the address is directly specified in the instruction as a part of it.
14. If the data is present in a register and it is referred using the particular register, then it is
a) direct addressing mode
b) register addressing mode
c) indexed addressing mode
d) immediate addressing mode
Explanation: Since the register used to refer to the address is accessed indirectly.
16. If the offset of the operand is stored in one of the index registers, then it is
a) based indexed addressing mode
b) relative based indexed addressing mode
c) indexed addressing mode
d) none of the mentioned
Explanation: In the indexed addressing mode, the offset of an operand is stored and in the rest of
them, address is stored.
Explanation: In intrasegment indirect mode, the branch address is found as the content of a register
or a memory location.
18. If the location to which the control is to be transferred lies in a different segment other than the current
one, then the mode is called
a) intrasegment mode
b) intersegment direct mode
c) intersegment indirect mode
d) intersegment direct and indirect mode
Explanation: Since in intersegment direct mode, the address to which the control is to be transferred
is in a different segment.
20. The contents of a base register are added to the contents of index register in
a) indexed addressing mode
b) based indexed addressing mode
c) relative based indexed addressing mode
d) based indexed and relative based indexed addressing mode
Explanation: The effective address is formed by adding the contents of both base and index registers
to a default segment.
21. The instruction that is used to transfer the data from source operand to destination operand is
a) data copy/transfer instruction
b) branch instruction
c) arithmetic/logical instruction
d) string instruction
Explanation: These instructions are used to copy and transfer the instructions.
Explanation: The string instructions perform operations on strings such as load, move, scan,
compare etc.
Explanation: Both the source and destination operands cannot be memory locations except for
string instructions.
25. In PUSH instruction, after each execution of the instruction, the stack pointer is
a) incremented by 1
b) decremented by 1
c) incremented by 2
d) decremented by 2
Explanation: The actual current stack-top is always occupied by the previously pushed data. So,
the push operation decrements SP by 2 and then stores the two bytes contents of the operand onto
the stack.
26. The instruction that pushes the contents of the specified register/memory location on to the stack is
a) PUSHF
b) POPF
c) PUSH
d) POP
Explanation: Since PUSH operation transfers data to stack from a register or memory location.
27. In POP instruction, after each execution of the instruction, the stack pointer is
a) incremented by 1
b) decremented by 1
c) incremented by 2
d) decremented by 2
Explanation: The actual current stack top is poped into the specific operand as the contents of
stack top memory is stored in AL&SP and further contents of the memory location pointed to by
SP are copied to AH & SP.
28. The instructions that are used for reading an input port and writing an output port respectively are
a) MOV, XCHG
b) MOV, IN
c) IN, MOV
d) IN, OUT
Explanation: The address of the input/output port may be specified directly or indirectly.
Example for input port: IN AX, DX; This instruction reads data from a 16-bit port whose address
is in DX and stores it in AX
Example for output port: OUT 03H, AL; This sends data available in AL to a port whose address
is 03H.
29. The instruction that is used for finding out the codes in case of code conversion problems is
a) XCHG
b) XLAT
c) XOR
d) JCXZ
30. The instruction that loads effective address formed by destination operand into the specified source
register is
a) LEA
b) LDS
c) LES
d) LAHF
Explanation: The instruction, LEA loads effective address and is more useful for assembly
language rather than for machine language.
31. The instruction that loads the AH register with the lower byte of the flag register is
a) SAHF
b) AH
c) LAHF
d) PUSHF
Explanation: The instruction LAHF(Load AH from a lower byte of Flag) may be used to observe
the status of all the condition code flags(except overflow flag) at a time.
32. The instruction that pushes the flag register on to the stack is
a) PUSH
b) POP
c) PUSHF
d) POPF
Explanation: The instruction PUSHF(push flags to stack) pushes the flag register on to the stack.
33. The instruction that loads the flag register completely from the word contents of the memory location is
a) PUSH
b) POP
c) PUSHF
d) POPF
34. The instruction that adds immediate data/contents of the memory location specified in an
instruction/register to the contents of another register/memory location is
a) SUB
b) ADD
c) MUL
d) DIV
35. The instruction, “INC” increases the contents of the specified register or memory location by
a) 2
b) 0
c) 1
d) 3
Explanation: This instruction adds 1 to the contents of the operand and so increments by 1.
36. The instruction that subtracts 1 from the contents of the specified register/memory location is
a) INC
b) SUBB
c) SUB
d) DEC
Explanation: The SBB instruction subtracts the source operand and the borrow flag from the
destination operand.
38. The flag that acts as Borrow flag in the instruction, SBB is
a) direction flag
b) carry flag
c) parity flag
d) trap flag
Explanation: If borrow exists in the subtraction operation performed then carry flag is set.
39. In general, the source operand of an instruction can be
a) memory location
b) register
c) immediate data
d) all of the mentioned
Explanation: The source operand is the element which is data or data stored memory location on
which operation is performed.
Explanation: Since the destination should be able to store the data, immediate data cannot be
considered as a destination operand.
41. The instruction, CMP to compare source and destination operands it performs
a) addition
b) subtraction
c) division
d) multiplication
Explanation: For comparison, the instruction CMP subtracts source operand from destination
operand.
Explanation: The result of subtraction operation is not stored anywhere during a comparison.
43. The instruction that converts the result in an unpacked decimal digits is
a) AAA
b) AAS
c) AAM
d) All of the mentioned
Explanation: All the ASCII adjust instructions give result in unpacked decimal form and so are
called as “Unpacked BCD arithmetic instructions”.
45. The instruction in which adjustment is made before performing the operation is
a) AAA
b) AAS
c) AAM
d) AAD
Explanation: The AAD instruction converts two unpacked BCD digits in AH and AL to the
equivalent binary number in AL. This adjustment must be made before dividing the two
unpacked BCD digits.
47. The instruction that is used to convert the result of the addition of two packed BCD numbers to a valid
BCD number is
a) DAA
b) DAS
c) AAA
d) AAS
48. The ROR instruction rotates the contents of the destination operand to
a) left
b) right
c) left and then right
d) right and then left
Explanation: ROR stands for Rotate Right without carry. so, the instruction rotates right.
49. The mnemonic that is placed before the arithmetic operation is performed is
a) AAA
b) AAS
c) AAM
d) AAD
Explanation: The AAD instruction converts two unpacked BCD digits in AH and AL to the
equivalent binary number in AL.
Explanation: Since the operation, AAD is performed before division operation is performed, the
carry flag, auxiliary flag and overflow flag are undefined.
51. The instruction that performs logical AND operation and the result of the operation is not available is
a) AAA
b) AND
c) TEST
d) XOR
Explanation: In the TEST instruction, the logical AND operation is performed and the result is
not stored but flags are affected.
52. In the RCL instruction, the contents of the destination operand undergo function as
a) carry flag is pushed into LSB & MSB is pushed into the carry flag
b) carry flag is pushed into MSB & LSB is pushed into the carry flag
c) auxiliary flag is pushed into LSB & MSB is pushed into the carry flag
d) parity flag is pushed into MSB & LSB is pushed into the carry flag
Explanation: In RCL(Rotate right through carry), for each operation, the carry flag is pushed
into LSB and the MSB of the operand is pushed into carry flag.
53. . The instructions that are used to call a subroutine from the main program and return to the main
program after execution of called function are
a) CALL, JMP
b) JMP, IRET
c) CALL, RET
d) JMP, RET
Explanation: At each CALL instruction, the IP and CS of the next instruction are pushed onto the
stack, before the control is transferred to the procedure. At the end of the procedure, the RET
instruction must be executed to retrieve the stored contents of IP & CS registers from a stack.
54. The instruction that unconditionally transfers the control of execution to the specified address is
a) CALL
b) JMP
c) RET
d) IRET
Explanation: In this the control transfers to the address specified in the instruction and flags are
not affected by this instruction.
55. Which instruction cannot force the 8086 processor out of ‘halt’ state?
a) Interrupt request
b) Reset
c) Both interrupt request and reset
d) Hold
Explanation: Only an interrupt request or Reset will force the 8086 processor to come out of the
‘halt’ state.
Explanation: NOP is the No operation. It means that the processor performs no operation for the
clock cycle and thus there exists a delay.
Explanation: Since CLC is a flag manipulation instruction where CLC stands for Clear Carry
Flag.
58. The assembler directives which are the hints using some predefined alphabetical strings are given to
a) processor
b) memory
c) assembler
d) processor & assembler
Explanation: These directives help the assembler to correctly understand the assembly language
programs to prepare the codes.
59. The directive used to inform the assembler, the names of the logical segments to be assumed for
different segments used in the program is
a) ASSUME
b) SEGMENT
c) SHORT
d) DB
Explanation: In ALP, each segment is given a name by using the directive ASSUME
SYNTAX: ASSUME segment:segment_name
Eg: ASSUME CS:Code
here CS is the Code segment and code is the name assumed to the segment.
60. The directive that marks the end of an assembly language program is
a) ENDS
b) END
c) ENDS & END
d) None of the mentioned
Explanation: The directive END is used to denote the completion of the program.
Explanation: The directive ENDS is used to end a segment where as the directive END is used to
end the program.
62. The directive that updates the location counter to the next even address while executing a series of
instructions is
a) EVN
b) EVEN
c) EVNE
d) EQU
Explanation: The directive updates location counter to next even address if the current location
counter contents are not even.
63. The directive that directs the assembler to start the memory allotment for a particular
segment/block/code from the declared address is
a) OFFSET
b) LABEL
c) ORG
d) GROUP
Explanation: If an ORG is written then the assembler initiates the location counter to keep the
track of allotted address for the module as mentioned in the directive.
If the directive is not present, then the location counter is initialized to 0000H
64. The directive that marks the starting of the logical segment is
a) SEG
b) SEGMENT
c) SEG & SEGMENT
d) PROC
65. The recurrence of the numerical values or constants in a program code is reduced by
a) ASSUME
b) LOCAL
c) LABEL
d) EQU
Explanation: In this, the recurring/repeating value is assigned with a label. The label is placed
instead of the numerical value in the entire program code.
66. The labels or constants that can be used by any module in the program is possible when they are
declared as
a) PUBLIC
b) LOCAL
c) GLOBAL
d) Either PUBLIC or GLOBAL
Explanation: The labels, constants, variables, procedures declared as GLOBAL can be used by
any module in the program.
67. The logic required for implementing a program can be expressed in terms of
a) flowchart
b) algorithm
c) flowchart & algorithm
d) none of the mentioned
Explanation: The logic required for implementing a program must be visualized clearly which is
possible by flowchart and algorithm.
68. The operands, source and destination in an instruction cannot be
a) register, register
b) memory location, memory location
c) memory location, register
d) immediate data, register
72. The registers that cannot be used as operands for arithmetic and logical instructions are
a) general purpose registers
b) pointers
c) index registers
d) segment registers
Explanation: Segment registers are not allowed as operands for arithmetic and logical
instructions.
Explanation: Both the operands should not be immediate operands and memory operands.
75. The coded object modules of the program to be assembled are present in
a) .ASM file
b) .OBJ file
c) .EXE file
d) .OBJECT file
Explanation: .OBJ file is created with same name as source file and extension .OBJ. It contains the
coded object modules of the program to be assembled
76. The extension that is essential for every assembly level program is
a) .ASP
b) .ALP
c) .ASM
d) .PGM
77. The directory that is under work must have the files that are related to
a) Norton’s editor
b) Assembler
c) Linker
d) All of the mentioned
Explanation: Before starting the process of entering a small program on PC, ensure that all the
files namely Norton’s editor, assembler, linker and debugger are available in the same directory in
which work is been done.
Explanation: The listing file is automatically generated in the assembly process and is identified
by the entered or source file name and an extension .LST.
79. . The extension file that is must for a file to be accepted by the LINK as a valid object file is
a) .OBJ file
b) .EXE file
c) .MASM file
d) DEBUG file
Explanation: The .OBJ extension is a must for a file to be accepted by the LINK as a valid object
file.
Explanation: The listing file contains total offset map of source file including labels, offset
addresses, opcodes, memory allotments for different directives and labels and relocation
information.
Explanation: DEBUG.COM is a DOS utility that facilitates the debugging and trouble shooting.
Explanation: The DEBUG may be used either to debug a source program or to observe the results
of execution of an .EXE file
“Stack”
84. If the processor is executing the main program that calls a subroutine, then after executing the main
program up to the CALL instruction, the control will be transferred to
a) address of main program
b) subroutine address
c) address of CALL instruction
d) none of the mentioned
Explanation: Since subroutine is called, to start the execution of the subroutine, the control is
transferred to the subroutine address.
Explanation: Stack is used for temporary storage of contents of registers and memory locations,
status of registers.
Explanation: The stack is accessed using a pointer that is implemented using SP and SS registers.
87. As the storing of data words onto the stack is increased, the stack pointer is
a) incremented by 1
b) decremented by 1
c) incremented by 2
d) decremented by 2
Explanation: The data is stored from top address of the stack and is decremented by 2.
88. While retrieving data from the stack, the stack pointer is
a) incremented by 1
b) incremented by 2
c) decremented by 1
d) decremented by 2
Explanation: The data in the stack, may again be transferred back from a stack to register. At
that time, the stack pointer is incremented by 2.
89. The process of storing the data in the stack is called ……… the stack.
a) pulling into
b) pulling out
c) pushing into
d) popping into
Explanation: The data is pushed into the stack while loading the stack.
90. The reverse process of transferring the data back from the stack to the CPU register is known as
a) pulling out the stack
b) pushing out the stack
c) popping out the stack
d) popping off the stack
Explanation: If the books are arranged one on the other, then the book that is placed last will be
the first out.
Explanation: Since PID temperature controller has steps that need to be sequentially executed
such as sampling the output, conversion of a signal with ADC, finding errors, deriving control
signals and applying the control signal to control flow of energy.
Explanation: The stack pointer register contains the offset of the address of the stack segment.
Explanation: The stack segment register contains base address of the stack segment in the
memory. The stack pointer register (sP) and stack segment register (SS) together address the
stack-top.
97. The register or memory location that is pushed into the stack at the end must be
a) popped off last
b) pushed off first
c) popped off first
d) pushed off last
Explanation: The data can be retrieved by POP operation and as in stack, the data that is pushed
at the end must be popped off first.
Explanation: The directive ASSUME facilitates to name the segments with the desired name that
is not a mnemonic or keyword.
Explanation: Though the Stack segment is initialised, the SS and SP pointers must be initialized.
100. The number of PUSH instructions and POP instructions in a subroutine must be
a) PUSH instructions must be greater than POP instructions
b) POP instructions must be greater than PUSH instructions
c) Both must be equal
d) Instructions may be any kind
Explanation: The number of PUSH instructions must be equal to the number of POP instructions.
Explanation: The 8086 microprocessor does not support direct BCD packed operations.
102. For 8086 microprocessor, the stack segment may have a memory block of a maximum of
a) 32K bytes
b) 64K bytes
c) 16K bytes
d) NONE
Explanation: In 8086 microprocessor, the memory segments each have a memory of 64K bytes.
104. An interrupt breaks the execution of instructions and diverts its execution to
a) Interrupt service routine
b) Counter word register
c) Execution unit
d) control unit
Explanation: An interrupt transfers the control to interrupt service routine (ISR). After executing
ISR, the control is transferred back again to the main program.
105. While executing the main program, if two or more interrupts occur, then the sequence of
appearance of interrupts is called
a) multi-interrupt
b) nested interrupt
c) interrupt within interrupt
d) nested interrupt and interrupt within interrupt
Explanation: If an interrupt occurs while executing a program, and the processor is executing the
interrupt, if one more interrupt occurs again, then it is called a nested interrupt.
106. Whenever a number of devices interrupt a CPU at a time, and if the processor is able to handle
them properly, it is said to have
a) interrupt handling ability
b) interrupt processing ability
c) multiple interrupt processing ability
d) multiple interrupt executing ability
Explanation: The processor if handles more devices as interrupts then it has multiple interrupt
processing ability.
Explanation: A nonmaskable interrupt input pin is one which means that any interrupt request at
NMI (nonmaskable interrupt) input cannot be masked or disabled by any means.
Explanation: If more than one interrupt request (INTR) occurs at a time, then an external chip
called programmable interrupt controller is required to handle them.
Explanation: If a microprocessor wants to serve any interrupt then interrupt flag, IF=1. If
interrupt flag, IF=0, then the processor ignores the service.
Explanation: The internal interrupt is generated internally by the processor circuit or by the
execution of an interrupt instruction.
Explanation: Since the interrupts occur within the processor itself, they are called internal
interrupts.
117. The type of the interrupt may be passed to the interrupt structure of CPU from
a) interrupt service routine
b) stack
c) interrupt controller
d) none of the mentioned
Explanation: After an interrupt is acknowledged, the CPU computes the vector address from the
type of the interrupt that may be passed to the internal structure of the CPU from an interrupt
controller in case of external interrupts
118. During the execution of an interrupt, the data pushed into the stack is the content of
a) IP
b) CS
c) PSW
d) All of the mentioned
Explanation: The contents of IP, CS and PSW are pushed into the stack during the execution.
119. After every response to the single step interrupt the flag that is cleared is
a) IF (Interrupt Flag)
b) TF (Trap Flag)
c) OF (Overflow Flag)
d) None of the mentioned
Explanation: If the trap flag is set then the processor enters the single step execution mode. After
the execution, the trap flag is cleared.
Explanation: After the execution of the ISR, the control must go to the previous program (maybe
main program) which was being executed. To execute it, IRET is placed at the end of ISR.
Explanation: When the instruction IRET is executed, the contents of flags, IP and CS which were
saved at the stack by the CALL instruction are retrieved to the respective registers.
122. The interrupt for which the processor has the highest priority among all the external interrupts is
a) keyboard interrupt
b) TRAP
c) NMI
d) INT
Explanation: The Non-Maskable Interrupt input pin has the highest priority among all the
external interrupts.
123. The interrupt for which the processor has highest priority among all the internal interrupts is
a) keyboard interrupt
b) TRAP
c) NMI
d) INT
Explanation: TRAP is the internal interrupt that has highest priority among all the interrupts
except the Divide By Zero (Type 0) exception.
124. In case of string instructions, the NMI interrupt will be served only after
a) initialisation of string
b) execution of some part of the string
c) complete string is manipulated
d) the occurrence of the interrupt
Explanation: When NMI is activated, the current instruction being executed is completed and
then NMI is served. In the case of string instructions, it is served after the complete string is
manipulated.
Explanation: The NMI pin should remain high for at least 2 clock cycles and need not be
synchronized with the clock for being sensed.
Explanation: The INTR signal can be masked by resetting the interrupt flag.
127. For the INTR signal, to be responded to in the next instruction cycle, it must go ________ in the
last clock cycle of the current instruction
a) high
b) low
c) high or low
d) unchanged
Explanation: The INTR signal must go high in the clock cycle of the current instruction in order
to respond in the next instruction cycle.
128. The status of the pending interrupts is checked at
a) the end of main program
b) the end of all the interrupts executed
c) the beginning of every interrupt
d) the end of each instruction cycle
Explanation: At the end of each instruction, the status of the pending interrupts is checked.
Explanation: The IF is automatically reset when the processor responds to an INTR signal. If the
processor wants to respond to any type of INTR signal further then, the IF should again be set.
130. If the pin LOCK (active low based) is low at the trailing edge of the first ALE pulse, then till the
start of the next machine cycle, the pin LOCK (active low) is
a) low
b) high
c) low or high
d) none of the mentioned
Explanation: The pin LOCK (active low) remains low till the start of the next machine cycle.
131. With the trailing edge of the LOCK (active low), the INTA (active low) goes low and remains in
it for
a) 0 clock cycle
b) 1 clock cycle
c) 2 clock cycles
d) 3 clock cycles
Explanation: The INTA (active low) goes low and remains low for two clock cycles before
returning back to the high state.
132. The method of defining the interrupt service routine for software is
a) same as that of hardware
b) difficult than hardware
c) easier than software
d) none of the mentioned
Explanation: For both software and hardware, the method of defining the interrupt service
routine is the same.
133. While programming for any type of interrupt, the interrupt vector table is set
a) externally
b) through a program
c) either externally or through the program
d) externally and through the program
Explanation: The programmer must, either externally or through the program, set the interrupt
vector table for that type preferably with the CS and IP addresses of the interrupt service routine.
Explanation: To execute a program, first assemble it, link it and then execute it. After execution, a
new file RESULT is created in the directory. Then external pulse is applied to IRQ2 pin, and this
will again cause the execution of ISR into the file.
Explanation: Procedures require input data or constants for their execution. Their data or
constants may be passed to the subroutine by the main program.
137. The technique that is used to pass the data or parameter to procedures in assembly language
program is by using
a) global declared variable
b) registers
c) stack
d) all of the mentioned
Explanation: The techniques that are used to pass the data or parameter to procedures are by
using global declared variable, registers of CPU, memory locations, stack, PUBLIC & EXTRN.
138. If a procedure is interactive, then
a) it accepts inputs directly from input devices
b) it uses global declared variable technique
c) it uses stack
d) it uses memory locations
Explanation: If a procedure is interactive, then it accepts the inputs directly from input devices.
139. For passing the parameters to procedures using the PUBLIC & EXTRN directives, it must be
declared PUBLIC in the
a) subroutine
b) procedure
c) main routine
d) main routine and subroutine
Explanation: For passing the parameters to procedures, it must be declared PUBLIC in the main
routine and the same should be declared EXTRN in the procedure.
140. The technique to estimate the size of an executable program, before it is assembled and linked is
a) memory location technique
b) global variable technique
c) stack
d) none
141. To estimate the size of an executable program before it is assembled and linked, the
programming methodology concerned is by writing
a) programs with more than one segment for data and code
b) programs with FAR subroutines each of size up to 64KB
c) programs with more than one segment for stack
d) all of the mentioned
Explanation: By writing programs with more than one segment for data, code or stack or by
writing programs with FAR subroutines each of size 64KB, the size of an executable program can
be estimated.
“Macros”
142. If a number of instructions are repeating through the main program, then to reduce the length of
the program, __________ is used.
a) procedure
b) subroutine
c) macro
d) none of the mentioned
Explanation: For a certain number of instructions that are repeated in the main program, when
macro is defined then the code of a program is reduced by placing the name of the macro at which
the set of instructions are needed to be repeated.
Explanation: The process of assigning a label to the string is called defining a macro.
Explanation: A macro may be called from inside a macro. This type of macro is called nested
macro.
148. Inserting the statements and instructions represented by macro, directly at the place of the
macroname, in the program, is known as
a) calling a macro
b) inserting a macro
c) initializing a macro
d) none of the mentioned
Explanation: Inserting the statements and instructions at the place of macroname, in the program,
is known as calling a macro.
149. The time required for execution of a macro is ________ that of the procedure.
a) greater than
b) less than
c) equal to
d) none of the mentioned
Explanation: The time required for execution of a macro is less than that of procedure as it does
not contain CALL and RET instructions as the procedures do.
Explanation: Macro does not require stack memory and hence has less time for execution.
151. If ‘n’ denotes the number of clock cycles and ‘T’ denotes period of the clock at which the
microprocessor is running, then the duration of execution of loop once can be denoted by
a) n+T
b) n-T
c) n*T
d) n/T
Explanation: The duration of execution of the loop is the product of number of clock cycles and
the period of the clock cycle at which microprocessor is running.
152. The number of instructions actually executed by the microprocessor depends on the
a) stack
b) loop count
c) program counter
d) time duration
Explanation: As the microprocessor executes each instruction corresponding loop counter value
decreases and the microprocessor executes the instructions till the loop counter becomes zero.
Explanation: The count N can be defined as the required time delay by the duration for execution
of the loop once. Count, N = required delay (Td)/duration for execution of the loop once (n*T).
155. The maximum count value of 16-bit count register puts a limitation on
a) memory usage
b) storage of address of registers
c) to generate clock pulse
d) to generate maximum delay
Explanation: The maximum count value of 16-bit count register is FFFFH. This may put the
limitation on the maximum delay that can be generated using the instructions.
156. When large delays are required, then to serve the purpose
a) one or more count registers can be used
b) one or more shift registers can be used
c) one or more pointer registers can be used
d) one or more index registers can be used
Explanation: One or more count registers can be used to serve large delays.
157. The semiconductor memories are organized as __________ dimension(s) of array of memory
locations.
a) one dimensional
b) two dimensional
c) three dimensional
d) none
Explanation: The semiconductor memories are organised as two dimensions of an array which
consists of rows and columns.
158. If a location is selected, then all the bits in it are accessible using a group of conductors called
a) control bus
b) address bus
c) data bus
d) either address bus or data bus
Explanation: The bits in a selected location are accessible using data bus.
159. To address a memory location out of N memory locations, the number of address lines required
is
a) log N (to the base 2)
b) log N (to the base 10)
c) log N (to the base e)
d) log (2N) (to the base e)
Explanation: For n memory locations, log n(to the base of 2) address lines are required. For
addressing 4K bytes of memory, 12 address lines are required since log(4KB)
=log(4*1024)=log(212)=12.
160. If the microprocessor has 10 address lines, then the number of memory locations it is able to
address is
a) 512
b) 1024
c) 2048
d) none
Explanation: Since for n address lines, the number of memory locations able to address is 2^n.
161. In static memory, the upper 8-bit bank of an available 16-bit memory chip is called
a) upper address memory bank
b) even address memory bank
c) static upper memory
d) odd address memory bank
Explanation: In static memory, the upper 8-bit bank is called odd address memory bank.
162. In static memory, the lower 8-bit bank of an available 16-bit memory chip is called
a) lower address memory bank
b) even address memory bank
c) static lower memory bank
d) odd address memory bank
Explanation: In static memory, the lower 8-bit bank is called even address memory bank.
163. In most of the cases, the method used for decoding that may be used to minimise the required
hardware is
a) absolute decoding
b) non-linear decoding
c) linear decoding
d) none
164. To obtain 16-bit data bus width, the two 4K*8 chips of RAM and ROM are arranged in
a) parallel
b) serial
c) both serial and parallel
d) neither serial nor parallel
Explanation: The two 4K*8 chips of RAM and ROM are arranged in parallel.
165. If (address line) Ao=0 then, the status of address and memory are
a) address is even and memory is in ROM
b) address is odd and memory is in ROM
c) address is even and memory is in RAM
d) address is odd and memory is in RAM
Explanation: If Ao=0 then address is even and is in RAM. If Ao=1 then, address is odd and is in
RAM.
166. If at a time Ao and BHE(active low) both are zero then, the chip(s) selected will be
a) RAM
b) ROM
c) RAM and ROM
d) ONLY RAM
Explanation: If at a time Ao and BHE(active low) both are zero, then both RAM and ROM are
selected.
Explanation: The dynamic RAM is advantageous than the static RAM as it has a higher packing
density, lower cost and less power consumption.
168. Whenever a large memory is required in a microcomputer system, the memory subsystem is
generally designed using
a) Static RAM
b) Dynamic RAM
c) Both static and dynamic RAM
d) ROM
169. If a typical static RAM cell requires 6 transistors then corresponding dynamic RAM requires
a) 1 transistor along with capacitance
b) 2 transistors along with resistance
c) 3 transistors along with diode
d) 2 transistors along with capacitance
Explanation: The hardware complexity of dynamic RAM is lesser than that of static RAM.
170. To store the charge as a representation of data, the basic dynamic RAM cell uses
a) resistor
b) capacitor
c) diode
d) transistor
Explanation: The basic dynamic RAM cell uses capacitance to store the charge as a representation
of data. This capacitor is manufactured as a diode that is reverse biased so that the storage
capacitance is obtained.
171. The process of refreshing the data in the RAM to reduce the possibility of data loss is known as
a) data cycle
b) regain cycle
c) retain cycle
d) refresh cycle
Explanation: The data storage in RAM which is capacitance (reverse-biased diode) may have a
leakage current that tends to discharge the capacitor giving rise to possibility of data loss. To
avoid this, the data must be refreshed after a fixed time interval regularly.
172. The field in which dynamic RAM is more complicated than static RAM is
a) complexity
b) interfacing circuit
c) execution unit
d) cost
Explanation: The refresh mechanism and the additional hardware required makes the interfacing
circuit of dynamic RAM more complicated than that of static RAM.
Explanation: The refresh operation is independent regular activity that is initialised and carried
out by the refresh mechanism.
174. The number of memory chips that are enabled at a time for refresh activity is
a) 2
b) 4
c) 8
d) more than 1
Explanation: More than one memory chip can be enabled at a time to refresh activity to reduce
the number of total memory refresh cycles.
175. A timer that derives pulse for refreshing action or time for which a dynamic RAM cell can hold
data charge level practically constant is
a) constant timer
b) data managing timer
c) refresh timer
d) qualitative timer
Explanation: Refresh timer derives a pulse for refreshing action after each refresh interval which
can be qualitatively defined as the time for which a dynamic RAM cell can hold data charge level
practically constant.
176. If ‘n’ denotes the number of rows that are to be refreshed in a single refresh interval, ‘td’ denotes
the range of time it may take then, refresh time (tr) can be defined as
a) n*td
b) td/n
c) n/td
d) tdn
Explanation: Refresh time is the ratio of time duration taken for refreshing to the number of rows
that are refreshed. Refresh frequency is the reciprocal of refresh time.
“Interfacing I/O Ports”
177. The device that enables the microprocessor to read data from the external devices is
a) printer
b) joystick
c) display
d) reader
Explanation: Since joystick is an input device, it reads data from the external devices.
Explanation: The output device transfers data from the microprocessor to the external devices.
179. The input and output operations are respectively similar to the operations,
a) read, read
b) write, write
c) read, write
d) write, read
Explanation: The input activity is similar to read operation and the output activity is similar to
write operation.
Explanation: IOWR (active low) operation means writing data to an output device and not an
input device.
181. The latch or IC 74LS373 acts as
a) good input port
b) bad input port
c) good output port
d) bad output port
Explanation: If the output port is to source large currents, the port lines must be buffered. So, the
latch is used as it acts as a good output port.
182. While performing read operation, one must take care that much current should not be
a) sourced from data lines
b) sinked from data lines
c) sourced or sinked from data lines
d) sinked from address lines
Explanation: More current should not be sourced or sinked from data lines while reading to avoid
loading.
183. To avoid loading during read operation, the device used is
a) latch
b) flipflop
c) buffer
d) tristate buffer
Explanation: The chip 74LS245 is a bidirectional buffer that contains 8 buffers and may be used
as an 8-bit input port. But while using as an input device, only one direction is useful.
Explanation: In memory-mapped scheme, the devices are viewed as memory locations and are
addressed likewise.
a)40
b) 27
c) 21
d) 19
Explanation: 8085 there are 40 pins out of which 27 pins are output pins and rest 13 are including
clock input , power supply and other inputs.
Explanation: Both Verilog and HDL are used for programming FPGA , these are case insensitive
hardware descriptive languages.
Explanation: Field Programmable Gate Array (FPGA) is the re-configurable hardware, which
consists of millions of logic gates which could be arranged according to the user's demand. They
also have much higher frequency compared to micro controllers.
192. Which of the following can be accessed only sequentially?
a) Floppy disk
b) Hard disk
c) Magnetic tape
d) ROM
a) True
b) False
c)
Explanation: It has one sign flag S.
Sign Flag (S) – After any operation if the MSB (B(7)) of the result is 1, it indicates the number is
negative and the sign flag becomes set, i.e. 1. If the MSB is 0, it indicates the number is positive
and the sign flag becomes reset i.e. 0.
From 00H to 7F, sign flag is 0 (7F)16 = (01111111)2
From 80H to FF, sign flag is 1 (FF)16 = (11111111)2
1- MSB is 1 (negative)
0- MSB is 0 (positive)
194. JCOKE = 3
JCOKE = JCOKE + 1
GO TO (5, 8, 9, 11, 15, 16 18, 20) JCOKE.
After the execution of above statement, the control is transferred to statement number
a) 8
b) 11
c) 16
d) 20
a) 13.5
b) 13.75
c) 13.625
d) 13.875
a) i = i + 2
b) i = i + 1
c) i = i - 1
d) i = i + i + i
Explanation: i is incremented by 1.
a) once
b) twice
c) thrice
d) four times
a) a few bytes
b) a few kilobytes
c) a few megabytes
d) a few gigabytes
Explanation: Size of Cache memory varies from about 16 K bytes to about 256 K bytes.
199.. During processing the instructions, data, intermediate results and final results in a computer are
held in
a) CPU
b) ALU
c) Primary memory
d) Secondary memory
a) True
b) False
Explanation: Z flag is set if ALU operation results in zero.
II.Micro-controller Multiple Choice Questions &Answers (MCQs)
TOPIC 1 : “Introduction to Microcontroller”.
Explanation: A microcontroller at-least consists of a processor as its CPU with RAM, ROM, I/O ports
and timers. It may contain some additional peripherals like ADC, PWM, etc.
202. Unlike microprocessors, microcontrollers make use of batteries because they have:
Explanation: Micro Controllers are made by using the concept of VLSI technology. So here, CMOS
based logic gates are coupled together by this technique that consumes low power.
203. What is the order decided by a processor or the CPU of a controller to execute an instruction?
a) decode,fetch,execute
b) execute,fetch,decode
c) fetch,execute,decode
d) fetch,decode,execute
Explanation: First instruction is fetched from Program Memory. After fetching, instruction is decoded to
generate control signals to perform the intended task. After decoding, instruction is executed and the
complete intended task of that particular instruction.
204. If we say microcontroller is 8-bit then here 8-bit denotes size of:
a) Data Bus
b) ALU
c) Control Bus
d) Address Bus
Explanation: If we say a microcontroller is 8-bit it means that it is capable of processing 8-bit data at a
time. Data processing is the task of ALU and if ALU is able to process 8-bit data then the data bus should
be 8-bit wide. In most books it tells that size of data bus but to be precise it is the size of ALU because in
Harvard Architecture there are two sets of data bus which can be of same size but it is not mandatory.
205. How are the performance and the computer capability affected by increasing its internal bus width?
b) it decreases
Explanation: As the bus width increases, the number of bits carried by bus at a time increases as a result
of which the total performance and computer capability increases.
Explanation: CISC means Complete Instruction Set Computer because in this a microcontroller has an
instruction set that supports many addressing modes for the arithmetic and logical instructions, data
transfer and memory accesses instructions. RISC means Reduced Instruction Set Computer because here
a microcontroller has an instruction set that supports fewer addressing modes for the arithmetic and
logical instructions and for data transfer instructions.
207. Give the names of the buses present in a controller for transferring data from one place to another?
b) data bus
d) address bus
Explanation: There are 3 buses present in a microcontroller they are data bus (for carrying data from
one place to another), address bus (for carrying the address to which the data will flow) and the control
bus (which tells the controller to execute which type of work at that address may be it read or write
operation).
208. What is the file extension that is loaded in a microcontroller for executing any instruction?
a) .doc
b) .c
c) .txt
d) .hex
Explanation: Microcontrollers are loaded with .hex extension as they understand the language of 0’s and
1’s only.
209. What is the most appropriate criterion for choosing the right microcontroller of our choice?
a) speed
b) availability
Explanation: For choosing the right microcontroller for our product we must consider its speed so that
the instructions may be executed in the least possible time. It also depends on the availability so that the
particular product may be available in our neighboring regions or market in our need. It also depends on
the compatibility with the product so that the best results may be obtained.
Explanation: Microcontrollers are designed to perform dedicated tasks. While designing general purpose
computers end use is not known to designers.
TOPIC 2: Microcontroller Questions and Answers – Von Neumann and Harward Architectures
211. How many types of architectures are available, for designing a device that is able to work on its own?
a) 3
b) 2
c) 1
d) 4
Explanation: There are basically two main types of architectures present, they are Von Neumann and
Harvard architectures.
213. Which architecture involves both the volatile and the non volatile memory?
a) Harvard architecture
b) Von Neumann architecture
c) None of the mentioned
d) All of the mentioned
Explanation: In Harvard architecture, both the volatile and the non volatile memories are involved. This
is done to increase its efficiency as both the memories are being used over here.
214. Which architecture provides separate buses for program and data memory?
a) Harvard architecture
b) Von Neumann architecture
c) None of the mentioned
d) All of the mentioned
Explanation: Harvard Architecture provides separated buses for data and program memory to fetch
program and data simultaneously. By doing this access time is reduced and hence performance is
increased.
TOPIC 3: Architecture
225. When the microcontroller executes some arithmetic operations, then the flag bits of which register are
affected?
a) PSW
b) SP
c) DPTR
d) PC
Explanation: It stands for program status word. It consists of carry, auxiliary carry, overflow, parity,
register bank select bits etc which are affected during such operations.
226. How are the status of the carry, auxiliary carry and parity flag affected if the write instruction
MOV A,#9C
ADD A,#64H
a) CY=0,AC=0,P=0
b) CY=1,AC=1,P=0
c) CY=0,AC=1,P=0
d) CY=1,AC=1,P=1
Explanation: On adding 9C and 64, a carry is generated from D3 and from the D7 bit so CY and AC are
set to 1. In the result, the number of 1’s present are even so parity flag is set to zero.
227. How are the bits of the register PSW affected if we select Bank2 of 8051?
a) PSW.5=0 and PSW.4=1
b) PSW.2=0 and PSW.3=1
c) PSW.3=1 and PSW.4=1
d) PSW.3=0 and PSW.4=1
Explanation: Bits of PSW register are CY, AC, F0, RS1, RS0, OV, -, P so for selecting bank2 RS1=1 and
RS0=0 which are fourth and third bit of the register respectively.
228. If we push data onto the stack then the stack pointer
a) increases with every push
b) decreases with every push
c) increases & decreases with every push
d) none of the mentioned
Explanation: If we push elements onto the stack then the stack pointer increases with every push of
element.
229. On power up, the 8051 uses which RAM locations for register R0- R7
a) 00-2F
b) 00-07
c) 00-7F
d) 00-0F
Explanation: On power up register bank 0 is selected which has memory address from 00H-07H.
230. How many bytes of bit addressable memory is present in 8051 based microcontrollers?
a) 8 bytes
b) 32 bytes
c) 16 bytes
d) 128 bytes
Explanation: 8051 microcontrollers have 16 bytes of bit addressable memory.
233. Calculate the jump code for again and here if code starts at 0000H
MOV R1,#0
MOV A,#0
MOV R0,#25H
AGAIN:ADD A,#0ECH
JNC HERE
HERE: INC R1
DJNZ R0,AGAIN
MOV R0,A
END
a) F3,02
b) F9,01
c) E9,01
d) E3,02
Explanation: Loop address is calculated by subtracting destination address and the address next to the
source address.
So here if we start with 0000H
then source address is 0008H and the destination address is 0004H
So loop address is 04-0A=E9
234. When the call instruction is executed the topmost element of stack comes out to be
a) the address where stack pointer starts
b) the address next to the call instruction
c) address of the call instruction
d) next address of the stack pointer
Explanation: The topmost element of the stack is the address of the instruction next to the call instruction
so that when RET is executed then PC is filled with that address and so the pointer moves to the main
program and continue with its routine task.
236. Are PUSH and POP instructions are a type of CALL instructions?
a) yes
b) no
c) none of the mentioned
d) cant be determined
Explanation: PUSH and POP instructions are not CALL instructions because in POP and PUSH
instructions the pointer does not move to any location specified by its address which is the fundamental of
CALL instruction, so it is not a type of CALL instruction.
237. What is the time taken by one machine cycle if crystal frequency is 20MHz?
a) 1.085 micro seconds
b) 0.60 micro seconds
c) 0.75 micro seconds
d) 1 micro seconds
Explanation: Time taken by one machine cycle is calculated by the inverse of a (crystal frequency) /12
238. Find the number of times the following loop will be executed
MOV R6,#200
BACK:MOV R5,#100
DJNZ R6,BACK
END
a) 100
b) 200
c) 20000
d) 2000
Explanation: It will be executed 200*100 times.
1) BACK: DEC R0
JZ BACK
a) yes
b) no
c) cant be determined
d) yes and the second one is preferred
Explanation: In the first statement, when the decrements approach zero then the jump moves back and
in the second statement, when the result after decrements is not zero, then it jumps back.
241. To initialize any port as an output port what value is to be given to it?
a) 0xFF
b) 0x00
c) 0x01
d) A port is by default an output port
Explanation: In 8051, a port is initialized by default in its output mode no need to pass any value to it.
242. Which out of the four ports of 8051 needs a pull-up resistor for using it is as an input or an output port?
a) PORT 0
b) PORT 1
c) PORT 2
d) PORT 3
Explanation: These pins are the open drain pins of the controller which means it needs a pull-up resistor
for using it as an input or an output ports.
243. Which of the ports act as the 16 bit address lines for transferring data through it?
a) PORT 0 and PORT 1
b) PORT 1 and PORT 2
c) PORT 0 and PORT 2
d) PORT 1 and PORT 3
Explanation: PORT 0 and PORT 2 are used as the 16 bit address lines where PORT0 act as lower bit
address lines and PORT 2 as higher bit address lines.
246. Which addressing mode is used in pushing or popping any element on or from the stack?
a) immediate
b) direct
c) indirect
d) register
Explanation: If we want to push or pop any element on or from the stack then direct addressing mode
has to be used in it, as the other way is not accepted.
247. Which operator is the most important while assigning any instruction as register indirect instruction?
a) $
b) #
c) @
d) &
Explanation: In register, indirect mode data is copied at that location where R0 or R1 are present, so @
operator is used ex. MOV @R0,A
249. Which of the following comes under the indexed addressing mode?
a) MOVX A, @DPTR
b) MOVC @A+DPTR,A
c) MOV A,R0
d) MOV @R0,A
Explanation: Indexed addressing mode stands for that instruction where the bits of the accumulator is
also indexed with the 16 bit registers.
251. When we add two numbers the destination address must always be.
a) some immediate data
b) any register
c) accumulator
d) memory
Explanation: For addition purposes, the destination address must always be an accumulator. Example-
ADD A,R0; ADD A, @R1; ADD A,@ DPTR
253. If SUBB A,R4 is executed, then actually what operation is being applied?
a) R4+A
b) R4-A
c) A-R4
d) R4+A
Explanation: SUBB command subtracts with borrow the contents of an accumulator with that of the
register or some immediate value. So A-R4 is being executed.
262. What is the frequency of the clock that is being used as the clock source for the timer?
a) some externally applied frequency f’
b) controller’s crystal frequency f
c) controller’s crystal frequency /12
d) externally applied frequency/12
Explanation: The frequency of the clock source for the timer is equal to f/12(where f is the frequency of
the crystal).
264. What is the maximum delay that can be generated with the crystal frequency of 22MHz?
a) 2978.9 sec
b) 0.011 msec
c) 11.63 sec
d) 2.97 msec
Explanation: For generating the maximum delay we have to multiply the maximum number of counts
with the time period required to execute one machine cycle( 65536*1/22MHz).
266. Find out the roll over value for the timer in Mode 0, Mode 1 and Mode 2?
a) 00FFH,0FFFH,FFFFH
b) 1FFFH,0FFFH,FFFFH
c) 1FFFH,FFFFH,00FFH
d) 1FFFH,00FFH,FFFFH
Explanation: For Mode 0 13 bit value is used so 1FFFH is chosen to be the roll over value. Similarly for
Mode 1 FFFFH and for Mode 2 FFH is the roll over value for the timers and counter.
267. What steps are followed when we need to turn on any timer?
a) load the count, start the timer, keep monitoring it, stop the timer
b) load the TMOD register, load the count, start the timer, keep monitoring it, stop the timer
c) load the TMOD register, start the timer, load the count, keep monitoring it, stop the timer
d) none of the mentioned
Explanation: When any timer is to turn on, then firstly we have to load the TMOD register and the
count. Then the timer is to get started. After then, we need to monitor the timer properly and then when
the roll over condition arises then the timer is to be stopped.
268. If Timer 0 is to be used as a counter, then at what particular pin clock pulse need to be applied?
a) P3.3
b) P3.4
c) P3.5
d) P3.6
Explanation: If Timer 0 is to be used as a counter, then a pulse has to be applied at P3.4 and if it is for
Timer 1 then the clock pulse has to be applied at the pin P3.5.
269. In the instruction “MOV TH1,#-3”, what is the value that is being loaded in the TH1 register?
a) 0xFCH
b) 0xFBH
c) 0xFDH
d) 0xFEH
Explanation: Negative value is loaded in 2’s complement form. -3 represented in 2’s complement form as
FDH.
Steps to convert into 2’s complement:
271. Which devices are specifically being used for converting serial to parallel and from parallel to serial
respectively?
a) timers
b) counters
c) registers
d) serial communication
Explanation: Some registers like the parallel in serial out and serial in parallel out are used to convert
serial data into parallel and vice versa respectively.
273. Which of the following best describes the use of framing in asynchronous means of communication?
a) it binds the data properly
b) it tells us about the start and stops of the data to be transmitted or received
c) it is used for error checking
d) it is used for flow control
Explanation: In data framing in asynchronous means of communication, the data is packed between the
start and the stop bit. This is done so as to tell the other computer about the start and the end of the data.
275. Which of the following is the logic level understood by the micro-controller/micro-processor?
a) TTL logic level
b) RS232 logic level
c) None of the mentioned
d) TTL & RS232 logic level
Explanation: TTL logic or the transistor logic level is the logic that is understood by the micro-
controllers/microprocessors.
277. Which of the following best states the reason that why baud rate is mentioned in serial communication?
a) to know about the no of bits being transmitted per second
b) to make the two devices compatible with each other, so that the transmission becomes easy and error
free
c) to use Timer 1
d) for wasting memory
Explanation: To make two devices compatible with each other baud rate is mentioned in the serial
communication so that the transmission becomes easy and error free.
278. With what frequency UART operates( where f denoted the crystal frequency )?
a) f/12
b) f/32
c) f/144
d) f/384
Explanation: UART frequency is the crystal frequency f/12 divided by 32, that comes out to be f/384.
281. When an interrupt is enabled, then where does the pointer moves immediately after this interrupt has
occurred?
a) to the next instruction which is to be executed
b) to the first instruction of ISR
c) to a fixed location in memory called interrupt vector table
d) to the end of the program
Explanation: When an interrupt occurs, then it jumps to a fixed memory location in memory called the
interrupt vector table that holds the address of the Interrupt Service Routine.
282. What are the contents of the IE register, when the interrupt of the memory location 0x00 is caused?
a) 0xFFH
b) 0x00H
c) 0x10H
d) 0xF0H
Explanation: When interrupt of 0x00 is caused (the reset interrupt) then all the other interrupts will be
disabled or the contents of the IE register becomes null.
283. After RETI instruction is executed then the pointer will move to which location in the program?
a) next interrupt of the interrupt vector table
b) immediate next instruction where interrupt is occurred
c) next instruction after the RETI in the memory
d) none of the mentioned
Explanation: When the RETI instruction is executed, PC will fetch 2-bytes (address) from top of stack
which is stored when interrupt is occurred. This will return to the place where interrupt is occurred and
starts executing instructions.
284. Which pin of the external hardware is said to exhibit INT0 interrupt?
a) pin no 10
b) pin no 11
c) pin no 12
d) pin no 13
Explanation: INT0 interrupt is caused when pin no 12 in the hardware of the 8051 controller is enabled
with a low leveled pulse.
286. Which of the following combination is the best to enable the external hardware interrupt 0 of the IE
register (assuming initially all bits of the IE register are zero)?
a) EX0=1
b) EA=1
c) any of the mentioned
d) EX0=1 & EA=1
Explanation: For executing the EX0 interrupt, the EX0 and EA bits of the IE register should be set. EA is
set to enable all the interrupts and EX0 is set to enable the external hardware interrupt 0 interrupt and
mask the other enabled interrupts.
287. Why normally LJMP instructions are the topmost lines of the ISR?
a) so as to jump to some other location where there is a wider space of memory available to write the codes
b) so as to avoid overwriting of other interrupt instructions
c) all of the mentioned
d) none of the mentioned
Explanation: There is a small space of memory present in the vector table between two different
interrupts so in order to avoid overwriting of other interrupts we normally jump to other locations where
a wide range of space is available.
288. Which register is used to make the interrupt level or an edge triggered pulse?
a) TCON
b) IE
c) IPR
d) SCON
Explanation: TCON register is used to make any interrupt level or edge triggered.
290. What is the correct order of priority that is set after a controller gets reset?
a) RI/TI > TF1 > TF0 > INT1 > INT0
b) RI/TI < TF1 < TF0 < INT1 < INT0
c) INT0 > TF0 > INT1 > TF1 > RI/TI
d) INT0 < TF0 < INT1 < TF1 < RI/TI
Explanation: On reset Interrupt Priorities are as INT0 > TF0 > INT1 > TF1 > RI/TI, where ‘>’ is used to
denote highest priority.
291. How many rows and columns are present in a 16*2 alphanumeric LCD?
a) rows=2, columns=32
b) rows=16, columns=2
c) rows=16, columns=16
d) rows=2, columns=16
292. How many data lines are there in a 16*2 alphanumeric LCD?
a) 16
b) 8
c) 1
d) 0
Explanation: There are eight data lines from pin no 7 to pin no 14 in an LCD.
293. Which pin of the LCD is used for adjusting its contrast?
a) pin no 1
b) pin no 2
c) pin no 3
d) pin no 4
Explanation: Pin no 3 is used for controlling the contrast of the LCD.
295. Which command of an LCD is used to shift the entire display to the right?
a) 0x1C
b) 0x18
c) 0x05
d) 0x07
296. Which command is used to select the 2 lines and 5*7 matrix of an LCD?
a) 0x01
b) 0x06
c) 0x0e
d) 0x38
Explanation: 0x38 is used to select the 2 lines and 5*7 matrix of an LCD.
297. Which of the following step/s is/are correct for sending data to an LCD?
a) set the R/W bit
b) set the E bit
c) set the RS bit
d) all of the mentioned
Explanation: To send data to an LCD, RS pin should be set so that LCD will come to know that it will
receive data which has to display on the screen. R/W pin should be reset as data has to be displayed (i.e.
write to the LCD). High to low pulse must be applied to the E pin when data is supplied to data pins of
the LCD.
298. Which of the following step/s is/are correct to perform reading operation from an LCD?
a) low to high pulse at E pin
b) R/W pin is set high
c) low to high pulse at E pin & R/W pin is set high
d) none of the mentioned
Explanation: For reading operations, R/W pin should be made high and added to it, a low to high pulse is
also generated at the E pin.
299. Which instruction is used to select the first row first column of an LCD?
a) 0x08
b) 0x0c
c) 0x80
d) 0xc0
Explanation: 0x80 is used to select the first row first column of an LCD.
301. Which of the following steps detects the key in a 4*4 keyboard matrix about the key that is being pressed?
a) masking of bits
b) ensuring that initially, all keys are open
c) checking that whether the key is actually pressed or not
d) all of the mentioned
Explanation: For detecting that whether the key is actually pressed or not, firstly this must be ensured
that initially all the keys are closed. Then we need to mask the bits individually to detect that which key is
pressed. Then we need to check that is the key actually pressed or not, by checking that whether the key
pressed for a time more than 20 micro seconds.
304. In reading the columns of a matrix, if no key is pressed we should get all in binary notation
a) 0
b) 1
c) F
d) 7
Explanation: If no key is pressed, then all the keys show 1 as they are all connected to power supply.
305. If we need to operate a key of a keyboard in an interrupt mode, then it will generate what kind of interrupt?
a) ES
b) EX0/EX1
c) T0/T1
d) RESET
Explanation: If a key is to operate in an interrupt mode then it will generate an external hardware interrupt.
320 . An electronic device which converts physical quantity or energy from one form to another is called
______
a) Sensor
b) Transistor
c) Transducer
d) Thyristor
Explanation: An electronic device that converts physical quantity or energy from one form to another is called
Transducer. Examples: Sensor, Speaker, Microphone, etc.
Explanation: Signal Conditioning is referred to as the conversion of a signal from one form to other, now this
may be from analog to digital conditioning or digital to analog conditioning.
322. What steps have to be followed for interfacing a sensor to a microcontroller 8051?
a) make the appropriate connections with the controller, ADC conversion, analyse the results
b) interface sensor with ADC and ADC with 8051
c) interface sensor with the MAX232, send now to microcontroller, analyse the results
d) none of the mentioned
Explanation: For interfacing a sensor with an 8051 microcontroller, we need ADC in between because output
of sensor is analog and microcontroller works on digital signals only. So whatever signal generated by the
sensor is converted into its digital equivalent using ADC and equivalent digital signal is given to the
microcontroller for processing.
324. Why Vref is set of ADC0848 to 2.56 V if analog input is connected to the LM35?
a) to set the step size of the sampled input
b) to set the ground for the chip
c) to provide supply to the chip
d) all of the mentioned
Explanation: Vref is used to set the step size of the ADC conversion, if it is selected to 2.56 then the step size
will be selected to 10mV, so for every step increase of the analog voltage an increase of 10 mV will be there.
TOPIC14: “Interfacing with 8255”.
327. Find the control word for PA = out, PB = in, PCL = out, PCH = out (Mode0)?
a) 0x02H
b) 0x82H
c) 0x83H
d) 0x03H
Explanation: The value that is being loaded in the control word is 10000010b for PB as an input port and all
others as the output ports being operated in mode0. The hex equivalent of 10000010b → 0x82H.
328. Which pins are used to select the ports and the control register?
a) CS
b) A1
c) A0
d) All of the mentioned
Explanation: CS pin is an active low input pin for 8255 and it is used for selecting a chip. A0 and A1 pins are
used for select ports and the control register.
329. What is the value of the control register when RESET button is set to zero?
a) 0x00H
b) 0xFFH
c) 0x11H
d) value remains the same
Explanation: RESET is active-high signal input into the 8255 used to clear the control register. When RESET
is activated (i.e. set to high), all ports are initialized as input mode. Hence the value of the control register
remains the same as it is even when the RESET button is set to zero.
330. Why MOVX instruction is being used to access the ports of the 8255?
a) because 8255 is connecting a microcontroller in memory mapped I/O configuration
b) because 8255 is used to access the external communication
c) because 8255 is used to access the data transfer
d) because 8255 is used to access the interfacing of LCD, motor etc
Explanation: As 8255 is connecting a microcontroller in memory mapped I/O configuration. This means that
memory space used to access 8255 (i.e. 8255 is treated as external memory). MOVX instruction is used to
access external memory locations.
332. How many pins of the 8255 can be used as the I/O ports?
a) 8
b) 16
c) 24
d) 32
Explanation: There are 3 ports available in the 8255 so 24 pins are available for the I/O ports pins.
TOPIC 15: “Interfacing with RTC”.
335. DS12887 has _____ amount of RAM for general purpose applications.
a) 9 bytes
b) 114 bytes
c) 128 bytes
d) 14 bytes
Explanation: DS12887 has 128 bytes of non-volatile RAM. Out of 128 bytes, 14 bytes of RAM for
clock/calendar and control registers, and another 114 bytes of RAM for general purpose data storage.
336. In DS12887, which bits of the Register A are used to turn on the oscillator?
a) D4
b) D5
c) D6
d) All of the mentioned
Explanation: In DS12887, D4-D6 bits of register A are used to turn on the oscillator. A specific value of 010 of
D4-D6 is desirable for turning on the oscillator.
337 . In DS12887, which out of the following is correct about the SQW pin?
a) it is an output pin
b) it can provide up to 15 different square waves
c) the frequency of the square wave is set by the register A
d) all of the mentioned are correct
Explanation: In DS12887, SQW pin stands for SQuare Wave. It is an output pin that can provide us with 15
different square waves. The frequency of the square wave is selected by programming register A.
338. In DS12887, what is correct about the UIP bit of the register A?
a) it is a read only bit
b) it is used to know about the result
c) it is used to select the DS12887 datasheet
d) all of the mentioned
Explanation: In DS12887, UIP bit of register A stands for Update In Progress. The update-in-progress (UIP)
bit is a status flag i.e. read-only bit.
339. In DS12887, what is the range of RAM addresses which are used to store the values of time, calendar and
alarm data?
a) 00-7FH
b) 00-09H
c) 0EH-7FH
d) 0A-0DH
Explanation: In DS12887, the first ten locations i.e. 00-09H are used to store the values of time, calendar and
alarm data.
341. Name the read only registers are present in the DS12887?
a) register A, register B
b) register B, register C
c) register C, register D
d) register D, register A
Explanation: Register C and D are the read only registers in the DS12887 found at memory locations 0C-0DH.
342. In DS12887, when the external source is turned-off, how does DS12887 get power to retain its data?
a) Internal Lithium Battery
b) Internal Lead Battery
c) Additional external Alkaline Battery
d) Additional external Lithium Battery
Explanation: When Vcc falls below 3V or external voltage source is switched-off, internal lithium battery
provides power to DS12887. And this will prevent loss of data.
Explanation: Speed of a stepper motor can be controlled by changing its switching speed or by changing the
length of the time delay loop.
349 . Which of the following can be a unit for torque?
a) kg/m2
b) ounce-inch
c) kg-m3
d) g/m
Explanation: Torque is equal to the force applied at a particular distance. So its unit can be ounce-inch
.
350 . The RPM rating given for the DC motor is for?
a) no-loaded
b) loaded
c) none of the mentioned
d) all of the mentioned
Explanation: RPM rating given for a DC motor is for a no-loaded condition.
351 . PWM allows the control of a DC motor with the same phase, but with different amplitude phases?
a) true
b) false
c) cant be determined
d) none of the mentioned
Explanation: PWM allows the control of a DC motor with the same amplitude, but with different phases.
Explanation: .EQU, .DEVICE, .ORG all are the directives to the assembler whereas LDI is a command.
378. Is an assembly language a high level language?
a) Yes
b) No
c) Cant be said
d) None of the mentioned
Explanation: High Level Languages are the languages that are written in the common english, so that even a
common man can understand it easily like C, C++, whereas assembly language is a middle level language
between the high level and the machine level.
379. A 14 bit program counter can execute a maximum of _________ memory locations?
a) 4K
b) 8K
c) 16K
d) 64K
Explanation: A program counter of an AVR is 14 bit long which means it has 2^14 bytes of memory or 16K
bytes of memory.
380. When AVR wakes up, then the value of PC becomes?
a) 00H
b) 000H
c) 0000H
d) 00000H
Explanation: When an AVR wakes up, then the PC starts at the memory location 00000H.
381. Which of the following is correct about BRNE instruction in avr microcontrollers?
d) it is used to jump to the given mentioned label when the zero flag accounts to 0
Explanation: BRNE label instruction is used to jump to that particular address denoted by label if condition
(Z=0) is true or satisfied. If the condition is not satisfied then it will execute the next immediate instruction.
LDI R20, 10
DEC R21
BRNE now
a) 10
b) 70
c) 700
Explanation: As the R21 register is loaded with 70, so to make it zero it needs to be decremented 70 times then
only the OUT instruction will be executed so this loop repeats 70 times.
383. Which of the below mentioned are not the conditional jumps?
a) BRLO
b) BRMI
c) BRVC
Explanation: BRLO is used to branch if C=1, BRMI is used when N=1 and BRVC are used when V=0, so all
are the conditional jumps.
384. What is the relation between the target and the relative address?
Explanation: Target address can be calculated by calculating the sum of the address of the program counter and
the relative address.
385. In the JMP instruction, how many bits are there for determining the target address?
a) 16
b) 32
c) 22
d) 10
Explanation: In the JMP instruction of 4 bytes space, 22 bits are there for determining the target address and
the other 10 are for the op code verification.
Explanation: The relative address of the RJMP instruction varies from 000-fffH. The target address of the JMP
instruction varies from 000000-3fffffH. IJMP instruction is used to jump at that particular address pointed to by
the Z register. So all are the correct statements.
387. Which of the following is used to represent the last RAM address?
a) MEM
b) LASTRAM
c) RAMEND
Explanation: RAMEND instruction is used to represent the last RAM address. By loading RAMEND to the SP
register, the stack pointer represents the last RAM address.
388. Which of the following statements are correct about the RCALL instruction?
a) it is a 2 byte instruction
b) it is a 4 byte instruction
c) it is a 16 byte instruction
Explanation: RCALL instruction is used to go to the target address in the memory from -2048 to 2047.
a) ffffH
b) fffH
c) 00h
b) PUSH instruction is used to take out the value from the stack into some register
Explanation: CALL instruction is used to transfer control anywhere in the 4M memory space available in the
AVR.
391. In AVR, which registers are there for the I/O programming of ports?
a) PORT
b) PIN
c) DDR
Explanation: For I/O programming of the ports in AVR microcontrollers, there are basically three main
registers. They are PORT, PIN, DDR, so all of the mentioned is the right option.
392. The data will not go from the port registers to the pin unless:
Explanation: The data will not go from the port registers to the pin unless the DDR register of that port is set to
1 because by doing this we make that port an output port after which data can be taken from the PORT registers
to the pin.
a) 0
b) 1
d) 0 & 1
Explanation: On reset, the DDR registers of all the ports are set to 0 which means that the by default all ports
are set as input ports.
a) PIN register of a port is used to bring data into CPU from pins
Explanation: There are three registers that are related to a port. They are PIN, PORT, DDR. PIN register is
used to bring data into CPU from pins, PORT register is used to send data to pins and DDR register is used to
control the direction of the data transfer. So all are the right options.
a) true
b) false
d) can’t be determined
a) SBI
b) PORT
c) CBI
Explanation: PORT is not a single bit instruction in an AVR microcontroller. It is a byte oriented instruction
used to take the data out of the CPU to the pins.
a) it is used to the monitor the status of the HIGH for the single bit of a port
c) It is a 4 byte instruction
Explanation: SBIS is a bit oriented 2 byte instruction that is used to monitor the status of a single bit of a port.
Explanation: CBI PORTB, 1 means to clear the first bit of the PORTB register. It is a bit oriented instruction.
399. Which of the following instruction can be used to toggle a bit of the PORT?
a) SBI
b) CBI
Explanation: If SBI and CBI are used together, then they can be used to toggle a bit of a port successfully.
Explanation: SBIC is used to skip the instruction when a particular bit of a port is set to zero.
III .Digital Electronics
402. The parameter through which 16 distinct values can be represented is known as ________
a) Bit
b) Byte
c) Word
d) Nibble
403. If the decimal number is a fraction then its binary equivalent is obtained by ________ the number
continuously by 2.
a) Dividing
b) Multiplying
c) Adding
d) Subtracting
410. If the number of bits in the sum exceeds the number of bits in each added numbers, it results in _________
a) Successor
b) Overflow
c) Underflow
d) Predecessor
419. The addition of +19 and +43 results as _________ in 2’s complement system.
a) 11001010
b) 101011010
c) 00101010
d) 0111110
423. Carry out BCD subtraction for (68) – (61) using 10’s complement method.
a) 00000111
b) 01110000
c) 100000111
d) 011111000
425. When numbers, letters or words are represented by a special group of symbols, this process is called
__________
a) Decoding
b) Encoding
c) Digitizing
d) Inverting
426. A three digit decimal number requires ________ for representation in the conventional BCD format.
a) 3 bits
b) 6 bits
c) 12 bits
d) 24 bits
427. How many bits would be required to encode decimal numbers 0 to 9999 in straight binary codes?
a) 12
b) 14
c) 16
d) 18
434. A(A + B) = ?
a) AB
b) 1
c) (1 + AB)
d) A
440. The logical sum of two or more logical product terms is called __________
a) SOP
b) POS
c) OR operation
d) NAND operation
443. A product term containing all K variables of the function in either complemented or uncomplemented form
is called a __________
a) Minterm
b) Maxterm
c) Midterm
d) ∑ term
444. According to the property of minterm, how many combination will have value equal to 1 for K input
variables?
a) 0
b) 1
c) 2
d) 3
445. The canonical sum of product form of the function y(A,B) = A + B is __________
a) AB + BB + A’A
b) AB + AB’ + A’B
c) BA + BA’ + A’B’
d) AB’ + A’B + A’B’
447. Maxterm is the sum of __________ of the corresponding Minterm with its literal complemented.
a) Terms
b) Words
c) Numbers
d) Nibble
448. Canonical form is a unique way of representing ____________
a) SOP
b) Minterm
c) Boolean Expressions
d) POS
450. _____________ expressions can be implemented using either (1) 2-level AND-OR logic circuits or (2) 2-
level NAND logic circuits.
a) POS
b) Literals
c) SOP
d) POS
451. A Karnaugh map (K-map) is an abstract form of ____________ diagram organized as a matrix of squares.
a) Venn Diagram
b) Cycle Diagram
c) Block diagram
d) Triangular Diagram
453. The K-map based Boolean reduction is based on the following Unifying Theorem: A + A’ = 1.
a) Impact
b) Non Impact
c) Force
d) Complementarity
454. Each product term of a group, w’.x.y’ and w.y, represents the ____________in that group.
a) Input
b) POS
c) Sum-of-Minterms
d) Sum of Maxterms
455. The prime implicant which has at least one element that is not present in any other implicant is known as
___________
a) Essential Prime Implicant
b) Implicant
c) Complement
d) Prime Complement
457. Each group of adjacent Minterms (group size in powers of twos) corresponds to a possible product term of
the given ___________
a) Function
b) Value
c) Set
d) Word
458. Don’t care conditions can be used for simplifying Boolean expressions in ___________
a) Registers
b) Terms
c) K-maps
d) Latches
459. It should be kept in mind that don’t care terms should be used along with the terms that are present in
___________
a) Minterms
b) Expressions
c) K-Map
d) Latches
460. Using the transformation method you can realize any POS realization of OR-AND with only.
a) XOR
b) NAND
c) AND
d) NOR
461. There are many situations in logic design in which simplification of logic expression is possible in terms of
XOR and _________________ operations.
a) X-NOR
b) XOR
c) NOR
d) NAND
462. These logic gates are widely used in _______________ design and therefore are available in IC form.
a) Sampling
b) Digital
c) Analog
d) Systems
463. In case of XOR/XNOR simplification we have to look for the following _______________
a) Diagonal Adjacencies
b) Offset Adjacencies
c) Straight Adjacencies
d) Both diagonal and offset adjencies
466. In which of the following gates the output is 1 if and only if at least one input is 1?
a) AND
b) NOR
c) NAND
d) OR
467. The time required for a gate or inverter to change its state is called __________
a) Rise time
b) Decay time
c) Propagation time
d) Charging time
468. What is the minimum number of two input NAND gates used to perform the function of two input OR
gates?
a) One
b) Two
c) Three
d) Four
471. Which of the following will give the sum of full adders as output?
a) Three point major circuit
b) Three bit parity checker
c) Three bit comparator
d) Three bit counter
474. How many full adders are required to construct an m-bit parallel adder?
a) m/2
b) m
c) m-1
d) m+1
477. The NOR gate output will be high if the two inputs are __________
a) 00
b) 01
c) 10
d) 11
478. How many two-input AND and OR gates are required to realize Y = CD+EF+G?
a) 2, 2
b) 2, 3
c) 3, 3
d) 3, 2
479. A universal logic gate is one which can be used to generate any logic function. Which of the following is a
universal logic gate?
a) OR
b) AND
c) XOR
d) NAND
484. A single transistor can be used to build which of the following digital logic gates?
a) AND gates
b) OR gates
c) NOT gates
d) NAND gates
485. How many truth table entries are necessary for a four-input circuit?
a) 4
b) 8
c) 12
d) 16
486. Which input values will cause an AND logic gate to produce a HIGH output?
a) At least one input is HIGH
b) At least one input is LOW
c) All inputs are HIGH
d) All inputs are LOW
487. Exclusive-OR (XOR) logic gates can be constructed from what other logic gates?
a) OR gates only
b) AND gates and NOT gates
c) AND gates, OR gates, and NOT gates
d) OR gates and NOT gates
488. The basic logic gate whose output is the complement of the input is the ___________
a) OR gate
b) AND gate
c) INVERTER gate
d) XOR gate
489. The AND function can be used to ___________ and the OR function can be used to _____________
a) Enable, disable
b) Disable, enable
c) Synchronize, energize
d) Detect, invert
490. The dependency notation “>=1” inside a block stands for which operation?
a) OR
b) XOR
c) AND
d) XNOR
491. If we use an AND gate to inhibit a signal from passing one of the inputs must be ___________
a) LOW
b) HIGH
c) Inverted
d) Floating
492. Logic gate circuits contain predictable gate functions that open theirs ____________
a) Outputs
b) Inputs
c) Pre-state
d) Impedance state
494. Small Scale Integration(SSI) refers to ICs with __________ gates on the same chip.
a) Fewer than 10
b) Greater than 10
c) Equal to 10
d) Greater than 50
497. LSI means ________ and refers to ________ gates per chip.
a) Long Scale Integration, more than 10 upto 10000
b) Large Scale Integration, more than 100 upto 5000
c) Large Short Integration, less than 10 and greater than 5000
d) Long Short Integration, more than 10 upto 10000
507. The maximum noise voltage that may appear at the input of a logic gate without changing the logical state
of its output is termed as __________
a) Noise Margin
b) Noise Immunity
c) White Noise
d) Signal to Noise Ratio
509. In RTL NOR gate, the output is at logic 1 only when all the inputs are at __________
a) logic 0
b) logic 1
c) +10V
d) Floating
510. Resistor–transistor logic (RTL) is a class of digital circuits built using _______ as the input network and
_______ as switching devices.
a) Resistors, bipolar junction transistors (BJTs)
b) Bipolar junction transistors (BJTs), Resistors
c) Capacitors, resistors
d) Resistors, capacitors
511. The limitations of the one transistor RTL NOR gate are overcome by __________
a) Two-transistor RTL implementation
b) Three-transistor RTL implementation
c) Multi-transistor RTL implementation
d) Four-transistor RTL implementation
513. The minimum number of transistors can be used by 2 input AND gate is __________
a) 2
b) 3
c) 4
d) 5
519. Transistor–transistor logic (TTL) is a class of digital circuits built from ____________
a) JFET only
b) Bipolar junction transistors (BJT)
c) Resistors
d) Bipolar junction transistors (BJT) and resistors
520. TTL is called transistor–transistor logic because both the logic gating function and the amplifying function
are performed by ____________
a) Resistors
b) Bipolar junction transistors
c) One transistor
d) Resistors and transistors respectively
521. The full form of TCTL is ____________
a) Transistor-coupled transistor logic
b) Transistor-capacitor transistor logic
c) Transistor-complemented transistor logic
d) Transistor-complementary transistor logic
527. Which of the following plays an important role in improving device performance of MOSFET?
a) Dielectric constant
b) Threshold voltage
c) Power supply voltage
d) Gate to drain voltage
531. CMOS logic dissipates _______ power than NMOS logic circuits.
a) More
b) Less
c) Equal
d) Very High
533. The basic building blocks of the arithmetic unit in a digital computers are __________
a) Subtractors
b) Adders
c) Multiplexer
d) Comparator
535. In a combinational circuit, the output at any time depends only on the _______ at that time.
a) Voltage
b) Intermediate values
c) Input values
d) Clock pulses
536. In a sequential circuit, the output at any time depends only on the input values at that time.
a) Past output values
b) Intermediate values
c) Both past output and present input
d) Present input values
539. If the two numbers are unsigned, the bit conditions of interest are the ______ carry and a possible _____
result.
a) Input, zero
b) Output, one
c) Input, one
d) Output, zero
545. If A and B are the inputs of a half adder, the carry is given by __________
a) A AND B
b) A OR B
c) A XOR B
d) A EX-NOR B
547. The difference between half adder and full adder is __________
a) Half adder has two inputs while full adder has four inputs
b) Half adder has one output while full adder has two outputs
c) Half adder has two inputs while full adder has three inputs
d) All of the Mentioned
548. If A, B and C are the inputs of a full adder then the sum is given by __________
a) A AND B AND C
b) A OR B AND C
c) A XOR B XOR C
d) A OR B OR C
549. If A, B and C are the inputs of a full adder then the carry is given by __________
a) A AND B OR (A OR B) AND C
b) A OR B OR (A AND B) C
c) (A AND B) OR (A AND B)C
d) A XOR B XOR (A XOR B) AND C
550. How many AND, OR and EXOR gates are required for the configuration of full adder?
a) 1, 2, 2
b) 2, 1, 2
c) 3, 1, 2
d) 4, 0, 1
552. For subtracting 1 from 0, we use to take a _______ from neighbouring bits.
a) Carry
b) Borrow
c) Input
d) Output
553. How many outputs are required for the implementation of a subtractor?
a) 1
b) 2
c) 3
d) 4
554. Let the input of a subtractor is A and B then what the output will be if A = B?
a) 0
b) 1
c) A
d) B
555. Let A and B is the input of a subtractor then the output will be ___________
a) A XOR B
b) A AND B
c) A OR B
d) A EXNOR B
556. Let A and B is the input of a subtractor then the borrow will be ___________
a) A AND B’
b) A’ AND B
c) A OR B
d) A AND B
560. The output of a subtractor is given by (if A, B and X are the inputs).
a) A AND B XOR X
b) A XOR B XOR X
c) A OR B NOR X
d) A NOR B XOR X
565. If the two numbers are unsigned, the bit conditions of interest are the ______ carry and a possible _____
result.
a) Input, zero
b) Output, one
c) Input, one
d) Output, zero
566. If the two numbers include a sign bit in the highest order position, the bit conditions of interest are the sign
of the result, a zero indication and ___________
a) An underflow condition
b) A neutral condition
c) An overflow condition
d) One indication
569. Which of the examples below expresses the commutative law of multiplication?
a) A + B = B + A
b) A • B = B + A
c) A • (B • C) = (A • B) • C
d) A • B = B • A
570. The Boolean expression Y = (AB)’ is logically equivalent to what single gate?
a) NAND
b) NOR
c) AND
d) OR
571. The observation that a bubbled input OR gate is interchangeable with a bubbled output AND gate is
referred to as:
a) A Karnaugh map
b) DeMorgan’s second theorem
c) The commutative law of addition
d) The associative law of multiplication
575. Which of the following statements accurately represents the two BEST methods of logic circuit
simplification?
a) Actual circuit trial and error evaluation and waveform analysis
b) Karnaugh mapping and circuit waveform analysis
c) Boolean algebra and Karnaugh mapping
d) Boolean algebra and actual circuit trial and error evaluation
578. Which of the following is an important feature of the sum-of-products form of expressions?
a) All logic circuits are reduced to nothing more than simple AND and OR operations
b) The delay times are greatly reduced over other forms
c) No signal must pass through more than two gates, not including inverters
d) The maximum number of gates that any signal must pass through is reduced by a factor of two
579. Which of the following expressions is in the product-of-sums form?
a) (A + B)(C + D)
b) (AB)(CD)
c) AB(CD)
d) AB + CD
584. What is the first thing you will need if you are going to use a macro-function?
a) A complicated design project
b) An experienced design engineer
c) Good documentation
d) Experience in HDL
589. The selector inputs to an arithmetic/logic unit (ALU) determine the __________
a) Selection of the IC
b) Arithmetic or logic function
c) Data word selection
d) Clock frequency to be used
596. The inverter can be produced with how many NAND gates?
a) 2
b) 1
c) 3
d) 4
597. How many NOT gates are required to implement the Boolean expression: X = AB’C + A’BC?
a) 2
b) 3
c) 4
d) 5
600. How many shift registers are used in a 4 bit serial adder?
a) 4
b) 3
c) 2
d) 5
602. The 8-bit encoding format used to store data in a computer is ______
a) ASCII
b) EBCDIC
c) ANCI
d) USCII
606. The ALU makes use of _______ to store the intermediate results.
a) Accumulators
b) Registers
c) Heap
d) Stack
608. ______ are numbers and encoded characters, generally used as operands.
a) Input
b) Data
c) Information
d) Stored Values
612. To reduce the memory access time we generally make use of ______
a) Heaps
b) Higher capacity RAM’s
c) SDRAM’s
d) Cache’s
613. ______ is generally used to increase the apparent size of physical memory.
a) Secondary memory
b) Virtual memory
c) Hard-disk
d) Disks
615. The time delay between two successive initiations of memory operation _______
a) Memory access time
b) Memory search time
c) Memory cycle time
d) Instruction delay
620. Which of the register/s of the processor is/are connected to Memory Bus?
a) PC
b) MAR
c) IR
d) Both PC and MAR
623. ______ is used to choose between incrementing the PC or performing ALU operations.
a) Conditional codes
b) Multiplexer
c) Control unit
d) None of the mentioned
624. The registers, ALU and the interconnection between them are collectively called as _____
a) process route
b) information trail
c) information path
d) data path
626. The main virtue for using single Bus structure is ____________
a) Fast data transfers
b) Cost effective connectivity and speed
c) Cost effective connectivity and ease of attaching peripheral devices
d) None of the mentioned
627. ______ are used to overcome the difference in data transfer speeds of various devices.
a) Speed enhancing circuitory
b) Bridge circuits
c) Multiple Buses
d) Buffer registers
629. IBM developed a bus standard for their line of computers ‘PC AT’ called _____
a) IB bus
b) M-bus
c) ISA
d) None of the mentioned
630. The bus used to connect the monitor to the CPU is ______
a) PCI bus
b) SCSI bus
c) Memory bus
d) Rambus
632. _____ register Connected to the Processor bus is a single-way transfer capable.
a) PC
b) IR
c) Temp
d) Z
633. In multiple Bus organisation, the registers are collectively placed and referred as ______
a) Set registers
b) Register file
c) Register Block
d) Map registers
634. The main advantage of multiple bus organisation over a single bus is _____
a) Reduction in the number of cycles for execution
b) Increase in size of the registers
c) Better Connectivity
d) None of the mentioned
636. During the execution of the instructions, a copy of the instructions is placed in the ______
a) Register
b) RAM
c) System heap
d) Cache
637. Two processors A and B have clock frequencies of 700 Mhz and 900 Mhz respectively. Suppose A can
execute an instruction with an average of 3 steps and B can execute with an average of 5 steps. For the
execution of the same instruction which processor is faster?
a) A
b) B
c) Both take the same time
d) Insufficient information
638. A processor performing fetch or decoding of different instruction during the execution of another
instruction is called ______
a) Super-scaling
b) Pipe-lining
c) Parallel Computation
d) None of the mentioned
639. For a given FINITE number of instructions to be executed, which architecture of the processor
provides for a faster execution?
a) ISA
b) ANSA
c) Super-scalar
d) All of the mentioned
644. As of 2000, the reference system to find the performance of a system is _____
a) Ultra SPARC 10
b) SUN SPARC
c) SUN II
d) None of the mentioned
645. When Performing a looping operation, the instruction gets stored in the ______
a) Registers
b) Cache
c) System Heap
d) System stack
646. The average number of steps taken to execute the set of instructions can be made to be less than one by
following _______
a) ISA
b) Pipe-lining
c) Super-scaling
d) Sequential
647. If a processor clock is rated as 1250 million cycles per second, then its clock period is ________
a) 1.9 * 10-10 sec
b) 1.6 * 10-9 sec
c) 1.25 * 10-10 sec
d) 8 * 10-10 sec
648. If the instruction, Add R1, R2, R3 is executed in a system that is pipe-lined, then the value of S is
(Where S is a term of the Basic performance equation)?
a) 3
b) ~2
c) ~1
d) 6
649. CISC stands for _______
a) Complete Instruction Sequential Compilation
b) Computer Integrated Sequential Compiler
c) Complex Instruction Set Computer
d) Complex Instruction Sequential Compilation
650. As of 2000, the reference system to find the SPEC rating are built with _____ Processor.
a) Intel Atom SParc 300Mhz
b) Ultra SPARC -IIi 300MHZ
c) Amd Neutrino series
d) ASUS A series 450 Mhz
651. The instruction, Add #45, R1 does _______
1. Adds the value of 45 to the address of R1 and stores 45 in that address
2. Adds 45 to the value of R1 and stores it in R1
3. Finds the memory location 45 and adds that content to that of R1
4. None of the mentioned
2. In the case of, Zero-address instruction method the operands are stored in _____
1. Registers
2. Accumulators
3. Push down stack
4. Cache
3. Add #45, when this instruction is executed the following happen/s _______
1. The processor raises an error and requests for one more operand
2. The value stored in memory location 45 is retrieved and one more operand is requested
3. The value 45 gets added to the value on the stack and is pushed onto the stack
4. None of the mentioned
5. In the following indexed addressing mode instruction, MOV 5(R1), LOC the effective address is
______
1. EA = 5+R1
2. EA = R1
3. EA = [R1]
4. EA = 5+[R1]
6. The addressing mode/s, which uses the PC instead of a general-purpose register is ______
1. Indexed with offset
2. Relative
3. Direct
4. Both Indexed with offset and direct
7. When we use auto increment or auto decrements, which of the following is/are true?
1. In both, the address is used to retrieve the operand and then the address gets altered
2. In auto increment, the operand is retrieved first and then the address altered
3. Both of them can be used on general purpose registers as well as memory locations
1. 1, 2, 3
2. 2
3. 1, 3
4. 2, 3
8. The addressing mode, where you directly specify the operand value is _______
1. Immediate
2. Direct
3. Definite
4. Relative
10. _____ addressing mode is most suitable to change the normal sequence ofexecution of instructions.
1. Relative
2. Indirect
3. Index with Offset
4. Immediate
11. Which method/s of representation of numbers occupies a large amount of memory than others?
1. Sign-magnitude
2. 1’s complement
3. 2’s complement
4. 1’s & 2’s compliment
12. Which representation is most efficient to perform arithmetic operations on the numbers?
1. Sign-magnitude
2. 1’s complement
3. 2’S complement
4. None of the mentioned
14. When we perform subtraction on -7 and 1 the answer in 2’s complement form is _________
1. 1010
2. 1110
3. 0110
4. 1000
15. When we perform subtraction on -7 and -5 the answer in 2’s complement form is ________
1. 11110
2. 1110
3. 1010
4. 0010
16. When we subtract -3 from 2 , the answer in 2’s complement form is _________
1. 0001
2. 1101
3. 0101
4. 1001
17. The processor keeps track of the results of its operations using flags called ________
1. Conditional code flags
2. Test output flags
3. Type flags
4. None of the mentioned
20. In some pipelined systems, a different instruction is used to add to numbers which can affect the
flags upon execution. That instruction is _______
1. AddSetCC
2. AddCC
3. Add++
4. SumSetCC
21. The most efficient method followed by computers to multiply two unsigned numbers is _______
1. Booth algorithm
2. Bit pair recording of multipliers
3. Restoring algorithm
4. Non restoring algorithm
22. For the addition of large integers, most of the systems make use of ______
1. Fast adders
2. Full adders
3. Carry look-ahead adders
4. None of the mentioned
23. In a normal n-bit adder, to find out if an overflow as occurred we make use of ________
1. And gate
2. Nand gate
3. Nor gate
4. Xor gate
24. In the implementation of a Multiplier circuit in the system we make use of _______
1. Counter
2. Flip flop
3. Shift register
4. Push down stack
27. The collection of the above mentioned entities where data is stored is called ______
1. Block
2. Set
3. Word
4. Byte
29. If a system is 64 bit machine, then the length of each word will be _______
1. 4 bytes
2. 8 bytes
3. 16 bytes
4. 12 bytes
30. The type of memory assignment used in Intel processors is _____
1. Little Endian
2. Big Endian
3. Medium Endian
4. None of the mentioned
31. When using the Big Endian assignment to store a number, the sign bit of the number is stored in
_____
1. The higher order byte of the word
2. The lower order byte of the word
3. Can’t say
4. None of the mentioned
32. To get the physical address from the logical address generated by CPU we use ____________
1. MAR
2. MMU
3. Overlays
4. TLB
33. _____ method is used to map logical addresses of variable length onto physical memory.
1. Paging
2. Overlays
3. Segmentation
4. Paging with segmentation
34. During the transfer of data between the processor and memory we use ______
1. Cache
2. TLB
3. Buffers
4. Registers
35. Physical memory is divided into sets of finite size called as ______
1. Frames
2. Pages
3. Blocks
4. Vectors
37. If we want to perform memory or arithmetic operations on data in Hexa-decimal mode then we use
_________ symbol before the operand.
1. ~
2. !
3. $
4. *
38. When generating physical addresses from a logical address the offset is stored in __________
1. Translation look-aside buffer
2. Relocation register
3. Page table
4. Shift register
39. The technique used to store programs larger than the memory is ____________
1. Overlays
2. Extension registers
3. Buffers
4. Both Extension registers and Buffers
40. The unit which acts as an intermediate agent between memory and backing store to reduce process
time is ___________
1. TLB’s
2. Registers
3. Page tables
4. Cache
42. Complete the following analogy:- Registers are to RAM’s as Cache’s are to ___________
1. System stacks
2. Overlays
3. Page Table
4. TLB
43. The BOOT sector files of the system are stored in ___________
1. Harddisk
2. ROM
3. RAM
4. Fast solid state chips in the motherboard
44. The transfer of large chunks of data with the involvement of the processor is done by _______
1. DMA controller
2. Arbitrator
3. User system programs
4. None of the mentioned
45. Which of the following techniques used to effectively utilize main memory?
1. Address binding
2. Dynamic linking
3. Dynamic loading
4. Both Dynamic linking and loading
48. Can you perform an addition on three operands simultaneously in ALN using Add instruction?
1. Yes
2. Not possible using Add, we’ve to use AddSetCC
3. Not permitted
4. None of the mentioned
54. When using Branching, the usual sequencing of the PC is altered. A new instruction is loaded which
is called as ______
1. Branch target
2. Loop target
3. Forward target
4. Jump instruction
56. __________ converts the programs written in assembly language into machine instructions
1. Machine compiler
2. Interpreter
3. Assembler
4. Converter
58. The alternate way of writing the instruction, ADD #5,R1 is ______
1. ADD [5],[R1];
2. ADDI 5,R1;
3. ADDIME 5,[R1];
4. There is no other way
59. Instructions which won’t appear in the object program are called as _____
1. Redundant instructions
2. Exceptions
3. Comments
4. Assembler Directives
60. The assembler directive EQU, when used in the instruction: Sum EQU 200 does ________
1. Finds the first occurrence of Sum and assigns value 200 to it
2. Replaces every occurrence of Sum with 200
3. Re-assigns the address of Sum by adding 200 to its original address
4. Assigns 200 bytes of memory starting the location of Sum
62. The directive used to perform initialization before the execution of the code is ______
1. Reserve
2. Store
3. Dataword
4. EQU
63. _____ directive is used to specify and assign the memory required for the block of code.
1. Allocate
2. Assign
3. Set
4. Reserve
66. When dealing with the branching code the assembler ___________
1. Replaces the target with its address
2. Does not replace until the test condition is satisfied
3. Finds the Branch offset and replaces the Branch target with it
4. Replaces the target with the value specified by the DATAWORD directive
67. The assembler stores all the names and their corresponding values in ______
1. Special purpose Register
2. Symbol Table
3. Value map Set
4. None of the mentioned
69. The utility program used to bring the object code into memory for execution is ______
1. Loader
2. Fetcher
3. Extractor
4. Linker
70. To overcome the problems of the assembler in dealing with branching code we use _____
1. Interpreter
2. Debugger
3. Op-Assembler
4. Two-pass assembler
72. The location to return to, from the subroutine is stored in _______
1. TLB
2. PC
3. MAR
4. Link registers
74. The order in which the return addresses are generated and used is _________
1. LIFO
2. FIFO
3. Random
4. Highest priority
75. In case of nested subroutines the return addresses are stored in __________
1. System heap
2. Special memory buffers
3. Processor stack
4. Registers
76. The appropriate return addresses are obtained with the help of ____ in case of nested routines.
1. MAR
2. MDR
3. Buffers
4. Stack-pointers
77. When parameters are being passed on to the subroutines they are stored in ________
1. Registers
2. Memory locations
3. Processor stacks
4. All of the mentioned
78. The most efficient way of handling parameter passing is by using ______
1. General purpose registers
2. Stacks
3. Memory locations
4. None of the mentioned
79. The most Flexible way of logging the return addresses of the subroutines is by using _______
1. Registers
2. Stacks
3. Memory locations
4. None of the mentioned
80. The wrong statement/s regarding interrupts and subroutines among the following is/are ______
i)The sub-routine and interrupts have a return statement
ii) Both of them alter the content of the PC
iii) Both are software oriented
iv) Both can be initiated by the user
1. i, ii and iv
2. ii and iii
3. iv
4. iii and iv
82. If the subroutine exceeds the private space allocated to it then the values are pushed onto _________
1. Stack
2. System heap
3. Reserve Space
4. Stack frame
83. ______ pointer is used to point to parameters passed or local parameters of the subroutine.
1. Stack pointer
2. Frame pointer
3. Parameter register
4. Log register
84. The reserved memory or private space of the subroutine gets deallocated when _______
1. The stop instruction is executed by the routine
2. The pointer reaches the end of the space
3. When the routine’s return statement is executed
4. None of the mentioned
85. The private space gets allocated to each subroutine when _________
1. The first statement of the routine is executed
2. When the context switch takes place
3. When the routine gets called
4. When the Allocate instruction is executed
86. _____ the most suitable data structure used to store the return addresses in the case of nested
subroutines.
1. Heap
2. Stack
3. Queue
4. List
87. In the case of nested subroutines, the stack top is always _________
1. The saved contents of the called sub routine
2. The saved contents of the calling sub routine
3. The return addresses of the called sub routine
4. None of the mentioned
88. The stack frame for each subroutine is present in ______
1. Main memory
2. System Heap
3. Processor Stack
4. None of the mentioned
90. The sub-routine service procedure is similar to that of the interrupt service routine in ________
1. Method of context switch
2. Returning
3. Process execution
4. Method of context switch & Process execution
93. In intel’s IA-32 architecture there is a separate 16 bit address space for the I/O devices.
1. False
2. True
96. To overcome the lag in the operating speeds of the I/O device and the processor we use
___________
1. BUffer spaces
2. Status flags
3. Interrupt signals
4. Exceptions
97. The method of accessing the I/O devices by repeatedly checking the status flags is ___________
1. Program-controlled I/O
2. Memory-mapped I/O
3. I/O mapped
4. None of the mentioned
98. The method of synchronising the processor with the I/O device in which the device sends a signal
when it is ready is?
1. Exceptions
2. Signal handling
3. Interrupts
4. DMA
99. The method which offers higher speeds of I/O transfers is ___________
1. Interrupts
2. Memory mapping
3. Program-controlled I/O
4. DMA
100. The process wherein the processor constantly checks the status flags is called as ___________
1. Polling
2. Inspection
3. Reviewing
4. Echoing
102. The return address from the interrupt-service routine is stored on the ___________
1. System heap
2. Processor register
3. Processor stack
4. Memory
103. The signal sent to the device from the processor to the device after receiving an interrupt is
___________
1. Interrupt-acknowledge
2. Return signal
3. Service signal
4. Permission signal
104. When the process is returned after an interrupt service ______ should be loaded again.
i) Register contents
ii) Condition codes
iii) Stack contents
iv) Return addresses
1. i, iv
2. ii, iii and iv
3. iii, iv
4. i, ii
105. The time between the receiver of an interrupt and its service is ______
1. Interrupt delay
2. Interrupt latency
3. Cycle time
4. Switching time
108. ______ type circuits are generally used for interrupt service lines.
i)open-collector
ii) open-drain
iii) XOR
iv) XNOR
1. i, ii
2. ii
3. ii, iii
4. ii, iv
109. The resistor which is attached to the service line is called _____
1. Push-down resistor
2. Pull-up resistor
3. Break down resistor
4. Line resistor
112. CPU as two modes privileged and non-privileged. In order to change the mode from privileged to
non-privileged.
1. A hardware interrupt is needed
2. A software interrupt is needed
3. Either hardware or software interrupt is needed
4. A non-privileged instruction (which does not generate an interrupt)is needed
114. From amongst the following given scenarios determine the right one to justify interrupt mode of data
transfer.
i)Bulk transfer of several kilo-byte
ii) Moderately large data transfer of more than 1kb
iii) Short events like mouse action
iv) Keyboard inputs
1. i and ii
2. ii
3. i, ii and iv
4. iv
115. When dealing with multiple devices interrupts, which mechanism is easy to implement?
1. Polling method
2. Vectored interrupts
3. Interrupt nesting
4. None of the mentioned
116. The interrupt servicing mechanism in which the requesting device identifies itself to the processor to
be serviced is ___________
1. Polling
2. Vectored interrupts
3. Interrupt nesting
4. Simultaneous requesting
117. In vectored interrupts, how does the device identify itself to the processor?
1. By sending its device id
2. By sending the machine code for the interrupt service routine
3. By sending the starting address of the service routine
4. None of the mentioned
118. The code sent by the device in vectored interrupt is _____ long.
1. upto 16 bits
2. upto 32 bits
3. upto 24 bits
4. 4-8 bits
119. The starting address sent by the device in vectored interrupt is called as __________
1. Location id
2. Interrupt vector
3. Service location
4. Service id
120. The processor indicates to the devices that it is ready to receive interrupts ________
1. By enabling the interrupt request line
2. By enabling the IRQ bits
3. By activating the interrupt acknowledge line
4. None of the mentioned
122. Which one of the following is true with regard to a CPU having a single interrupt request line and
single interrupt grant line?
i) Neither vectored nor multiple interrupting devices is possible.
ii) Vectored interrupts is not possible but multiple interrupting devices is possible.
iii) Vectored interrupts is possible and multiple interrupting devices is not possible.
iv) Both vectored and multiple interrupting devices are possible.
1. iii
2. i, iv
3. ii, iii
4. iii, iv
123. Which table handle stores the addresses of the interrupt handling sub-routines?
1. Interrupt-vector table
2. Vector table
3. Symbol link table
4. None of the mentioned
124. _________ method is used to establish priority by serially connecting all devices that request an
interrupt.
1. Vectored-interrupting
2. Daisy chain
3. Priority
4. Polling
125. In daisy chaining device 0 will pass the signal only if it has _______
1. Interrupt request
2. No interrupt request
3. Both No interrupt and Interrupt request
4. None of the mentioned
126. ______ interrupt method uses register whose bits are set separately by interrupt signal for each
device.
1. Parallel priority interrupt
2. Serial priority interrupt
3. Daisy chaining
4. None of the mentioned
127. ______________ register is used for the purpose of controlling the status of each interrupt request in
parallel priority interrupt.
1. Mass
2. Mark
3. Make
4. Mask
128. The added output of the bits of the interrupt register and the mask register is set as an input of
______________
1. Priority decoder
2. Priority encoder
3. Process id encoder
4. Multiplexer
137. The instructions which can be run only supervisor mode are?
1. Non-privileged instructions
2. System instructions
3. Privileged instructions
4. Exception instructions
141. The DMA transfers are performed by a control circuit called as __________
1. Device interface
2. DMA controller
3. Data controller
4. Overlooker
142. In DMA transfers, the required signals and addresses are given by the __________
1. Processor
2. Device drivers
3. DMA controllers
4. The program itself
143. After the completion of the DMA transfer, the processor is notified by __________
1. Acknowledge signal
2. Interrupt signal
3. WMFC signal
4. None of the mentioned
145. When the R/W bit of the status register of the DMA controller is set to 1.
1. Read operation is performed
2. Write operation is performed
3. Read & Write operation is performed
4. None of the mentioned
147. Can a single DMA controller perform operations on two different disks simultaneously?
1. True
2. False
148. The technique whereby the DMA controller steals the access cycles of the processor to operate is
called __________
1. Fast conning
2. Memory Con
3. Cycle stealing
4. Memory stealing
149. The technique where the controller is given complete access to main memory is __________
1. Cycle stealing
2. Memory stealing
3. Memory Con
4. Burst mode
150. The controller uses _____ to help with the transfers when handling network interfaces.
1. Input Buffer storage
2. Signal enhancers
3. Bridge circuits
4. All of the mentioned
V. Computer Organization
801. The duration between the read and the mfc signal is ______
a) Access time
b) Latency
c) Delay
d) Cycle time
802. The minimum time delay between two successive memory read operations is ______
a) Cycle time
b) Latency
c) Delay
d) None of the mentioned
805. The logical addresses generated by the cpu are mapped onto physical memory by ____________
a) Relocation register
b) TLB
c) MMU
d) None of the mentioned
807. The cells in a row are connected to a common line called ______
a) Work line
b) Word line
c) Length line
d) Principle diagonal
812. Circuits that can hold their state as long as power is applied is _______
a) Dynamic memory
b) Static memory
c) Register
d) Cache
814. The advantage of CMOS SRAM over the transistor one’s is _________
a) Low cost
b) High efficiency
c) High durability
d) Low power consumption
815. In a 4M-bit chip organisation has a total of 19 external connections.then it has _______ address if 8 data
lines are there.
a) 10
b) 8
c) 9
d) 12
818. The reason for the cells to lose their state over time is ________
a) The lower voltage levels
b) Usage of capacitors to store the charge
c) Use of Shift registers
d) None of the mentioned
819. The capacitors lose the charge over time due to ________
a) The leakage resistance of the capacitor
b) The small current in the transistor after being turned on
c) The defect of the capacitor
d) None of the mentioned
821. To reduce the number of external connections required, we make use of ______
a) De-multiplexer
b) Multiplexer
c) Encoder
d) Decoder
822. The processor must take into account the delay in accessing the memory location, such memories are
called ______
a) Delay integrated
b) Asynchronous memories
c) Synchronous memories
d) Isochronous memories
823. To get the row address of the required data ______ is enabled.
a) CAS
b) RAS
c) CS
d) Sense/write
824. In order to read multiple bytes of a row at the same time, we make use of ______
a) Latch
b) Shift register
c) Cache
d) Memory extension
827. The difference in the address and data connection between DRAM’s and SDRAM’s is _______
a) The usage of more number of pins in SDRAM’s
b) The requirement of more address lines in SDRAM’s
c) The usage of a buffer in SDRAM’s
d) None of the mentioned
831. The time taken to transfer a word of data to or from the memory is called as ______
a) Access time
b) Cycle time
c) Memory latency
d) None of the mentioned
832. In SDRAM’s buffers are used to store data that is read or written.
a) True
b) False
836. The chip can be disabled or cut off from an external connection using ______
a) Chip select
b) LOCK
c) ACPT
d) RESET
838. The less space consideration as lead to the development of ________ (for large memories).
a) SIMM’s
b) DIMS’s
c) SRAM’s
d) Both SIMM’s and DIMS’s
840. The higher order bits of the address are used to _____
a) Specify the row address
b) Specify the column address
c) Input the CS
d) None of the mentioned
842. The controller multiplexes the addresses after getting the _____ signal.
a) INTR
b) ACK
c) RESET
d) Request
843. The RAS and CAS signals are provided by the ______
a) Mode register
b) CS
c) Memory controller
d) None of the mentioned
844. Consider a memory organised into 8K rows, and that it takes 4 cycles to complete a read operation. Then
the refresh overhead of the chip is ______
a) 0.0021
b) 0.0038
c) 0.0064
d) 0.0128
845. When DRAM’s are used to build a complex large memory, then the controller only provides the refresh
counter.
a) True
b) False
846. RAMBUS is better than the other memory chips in terms of ________
a) Efficiency
b) Speed of operation
c) Wider bandwidth
d) All of the mentioned
852. The original design of the RAMBUS required for ________ data lines.
a) 4
b) 6
c) 8
d) 9
853. The RAMBUS requires specially designed memory chips similar to _____
a) SRAM
b) SDRAM
c) DRAM
d) DDRRAM
855. The RDRAM chips assembled into larger memory modules called ______
a) RRIM
b) DIMM
c) SIMM
d) All of the mentioned
856. If the transistor gate is closed, then the ROM stores a value of 1.
a) True
b) False
858. The PROM is more effective than ROM chips in regard to _______
a) Cost
b) Memory management
c) Speed of operation
d) Both Cost and Speed of operation
859. The difference between the EPROM and ROM circuitry is _____
a) The usage of MOSFET’s over transistors
b) The usage of JFET’s over transistors
c) The usage of an extra transistor
d) None of the mentioned
863. EEPROM stands for Electrically Erasable Programmable Read Only Memory.
a) True
b) False
865. The memory devices which are similar to EEPROM but differ in the cost effectiveness is ______
a) Memory sticks
b) Blue-ray devices
c) Flash memory
d) CMOS
866. The only difference between the EEPROM and flash memory is that the latter doesn’t allow bulk data to
be written.
a) True
b) False
868. The memory module obtained by placing a number of flash chips for higher memory storage called as
_______
a) FIMM
b) SIMM
c) Flash card
d) RIMM
869. The flash memory modules designed to replace the functioning of a hard disk is ______
a) RIMM
b) Flash drives
c) FIMM
d) DIMM
870. The reason for the fast operating speeds of the flash drives is ____________
a) The absence of any movable parts
b) The integrated electronic hardware
c) The improved bandwidth connection
d) All of the mentioned
871. The standard SRAM chips are costly as _________
a) They use highly advanced micro-electronic devices
b) They house 6 transistor per chip
c) They require specially designed PCB’s
d) None of the mentioned
873. To overcome the slow operating speeds of the secondary memory we make use of faster flash drives.
a) True
b) False
875. The memory which is used to store the copy of data or instructions stored in larger memories, inside the
CPU is called _______
a) Level 1 cache
b) Level 2 cache
c) Registers
d) TLB
876. The larger memory placed between the primary cache and the memory is called ______
a) Level 1 cache
b) Level 2 cache
c) EEPROM
d) TLB
877. The next level of memory hierarchy after the L2 cache is _______
a) Secondary storage
b) TLB
c) Main memory
d) Register
879. In the memory hierarchy, as the speed of operation increases the memory size also increases.
a) True
b) False
880. If we use the flash drives instead of the harddisks, then the secondary storage can go above primary
memory in the hierarchy.
a) True
b) False
881. The reason for the implementation of the cache memory is ________
a) To increase the internal memory of the system
b) The difference in speeds of operation of the processor and memory
c) To reduce the memory access and cycle time
d) All of the mentioned
882. The effectiveness of the cache memory is based on the property of ________
a) Locality of reference
b) Memory localisation
c) Memory size
d) None of the mentioned
885. The correspondence between the main memory blocks and those in the cache is given by _________
a) Hash function
b) Mapping function
c) Locale function
d) Assign function
886. The algorithm to remove and place new contents into the cache is called _______
a) Replacement algorithm
b) Renewal algorithm
c) Updation
d) None of the mentioned
888. The bit used to signify that the cache location is updated is ________
a) Dirty bit
b) Update bit
c) Reference bit
d) Flag bit
890. The approach where the memory contents are transferred directly to the processor from the memory is
called ______
a) Read-later
b) Read-through
c) Early-start
d) None of the mentioned
891. The memory blocks are mapped on to the cache with the help of ______
a) Hash functions
b) Vectors
c) Mapping functions
d) None of the mentioned
892. During a write operation if the required block is not present in the cache then ______ occurs.
a) Write latency
b) Write hit
c) Write delay
d) Write miss
893. In ________ protocol the information is directly written into the main memory.
a) Write through
b) Write back
c) Write first
d) None of the mentioned
894. The only draw back of using the early start protocol is _______
a) Time delay
b) Complexity of circuit
c) Latency
d) High miss rate
895. The method of mapping the consecutive memory blocks to consecutive cache blocks is called ______
a) Set associative
b) Associative
c) Direct
d) Indirect
896. While using the direct mapping technique, in a 16 bit system the higher order 5 bits are used for ________
a) Tag
b) Block
c) Word
d) Id
897. In direct mapping the presence of the block in memory is checked with the help of block field.
a) True
b) False
898. In associative mapping, in a 16 bit system the tag field has ______ bits.
a) 12
b) 8
c) 9
d) 10
900. The technique of searching for a block by going through all the tags is ______
a) Linear search
b) Binary search
c) Associative search
d) None of the mentioned
901. The set-associative map technique is a combination of the direct and associative technique.
a) True
b) False
902. In set-associative technique, the blocks are grouped into ______ sets.
a) 4
b) 8
c) 12
d) 6
903. A control bit called _________ has to be provided to each block in set-associative.
a) Idol bit
b) Valid bit
c) Reference bit
d) All of the mentioned
904. The bit used to indicate whether the block was recently used or not is _______
a) Idol bit
b) Control bit
c) Reference bit
d) Dirty bit
906. The main memory is structured into modules each with its own address register called ______
a) ABR
b) TLB
c) PC
d) IR
907. When consecutive memory locations are accessed only one module is accessed at a time.
a) True
b) False
908. In memory interleaving, the lower order bits of the address is used to _____________
a) Get the data
b) Get the address of the module
c) Get the address of the data within the module
d) None of the mentioned
909. The number successful accesses to memory stated as a fraction is called as _____
a) Hit rate
b) Miss rate
c) Success rate
d) Access rate
910. The number failed attempts to access memory, stated in the form of a fraction is called as _________
a) Hit rate
b) Miss rate
c) Failure rate
d) Delay rate
911. In associative mapping during LRU, the counter of the new block is set to ‘0’ and all the others are
incremented by one, when _____ occurs.
a) Delay
b) Miss
c) Hit
d) Delayed hit
912. In LRU, the referenced blocks counter is set to’0′ and that of the previous blocks are incremented by one
and others remain same, in the case of ______
a) Hit
b) Miss
c) Delay
d) None of the mentioned
913. If hit rates are well below 0.9, then they’re called as speedy computers.
a) True
b) False
914. The extra time needed to bring the data into memory in case of a miss is called as __________
a) Delay
b) Propagation time
c) Miss penalty
d) None of the mentioned
915. The miss penalty can be reduced by improving the mechanisms for data transfer between the different
levels of hierarchy.
a) True
b) False
917. A common strategy for performance is making various functional units operate parallelly.
a) True
b) False
922. The registers, ALU and the interconnecting path together are called as ______
a) Control path
b) Flow path
c) Data path
d) None of the mentioned
923. The input and output of the registers are governed by __________
a) Transistors
b) Diodes
c) Gates
d) Switches
924. When two or more clock cycles are used to complete data transfer it is called as ________
a) Single phase clocking
b) Multi-phase clocking
c) Edge triggered clocking
d) None of the mentioned
926. The completion of the memory operation is indicated using ______ signal.
a) MFC
b) WMFC
c) CFC
d) None of the mentioned
927. _________ signal enables the processor to wait for the memory operation to complete.
a) MFC
b) TLB
c) WMFC
d) ALB
929. The main virtue for using single Bus structure is ________
a) Fast data transfers
b) Cost effective connectivity and speed
c) Cost effective connectivity and ease of attaching peripheral devices
d) None of the mentioned
931. The bus used to connect the monitor to the CPU is ____________
a) PCI bus
b) SCSI bus
c) Memory bus
d) Rambus
934. IBM developed a bus standard for their line of computers ‘PC AT’ called ________
a) IB bus
b) M-bus
c) ISA
d) None of the mentioned
935. The general purpose registers are combined into a block called as ______
a) Register bank
b) Register Case
c) Register file
d) None of the mentioned
936. In ______ technology, the implementation of the register file is by using an array of memory locations.
a) VLSI
b) ANSI
c) ISA
d) ASCI
937. In a three BUS architecture, how many input and output ports are there?
a) 2 output and 2 input
b) 1 output and 2 input
c) 2 output and 1 input
d) 1 output and 1 input
938. The main advantage of multiple bus organisation over a single bus is __________
a) Reduction in the number of cycles for execution
b) Increase in size of the registers
c) Better Connectivity
d) None of the mentioned
940. If the instruction Add R1, R2, R3 is executed in a system which is pipelined, then the value of S is (Where
S is term of the Basic performance equation).
a) 3
b) ~2
c) ~1
d) 6
941. In multiple BUS organisation __________ is used to select any of the BUSes for input into ALU.
a) MUX
b) DE-MUX
c) En-CDS
d) None of the mentioned
942. There exists a separate block consisting of various units to decode an instruction.
a) True
b) False
943. There exists a separate block to increment the PC in multiple BUS organisation.
a) True
b) False
948. The Zin signal to the processor is generated using, Zin = T1+T6 ADD + T4.BR…
a) True
b) False
953. The End signal is generated using, End = T7.ADD + T5.BR + (T5.N+ T4.-N).BRN…
a) True
b) False
957. Individual control words of the micro routine are called as ______
a) Micro task
b) Micro operation
c) Micro instruction
d) Micro command
958. The special memory used to store the micro routines of a computer is ________
a) Control table
b) Control store
c) Control mart
d) Control shop
959. To read the control words sequentially _________ is used.
a) PC
b) IR
c) UPC
d) None of the mentioned
960. Every time a new instruction is loaded into IR the output of ________ is loaded into UPC.
a) Starting address generator
b) Loader
c) Linker
d) Clock
962. The signals are grouped such that mutually exclusive signals are put together.
a) True
b) False
963. Highly encoded schemes that use compact codes to specify a small number of functions in each micro
instruction is ________
a) Horizontal organisation
b) Vertical organisation
c) Diagonal organisation
d) None of the mentioned
966. In set associative and associative mapping there exists less flexibility.
a) True
b) False
967. The algorithm which replaces the block which has not been referenced for a while is called _____
a) LRU
b) ORF
c) Direct
d) Both LRU and ORF
968. In associative mapping during LRU, the counter of the new block is set to ‘0’ and all the others are
incremented by one when _____ occurs.
a) Delay
b) Miss
c) Hit
d) Delayed hit
969. The LRU provides very bad performance when it comes to _________
a) Blocks being accessed is sequential
b) When the blocks are randomised
c) When the consecutive blocks accessed are in the extremes
d) None of the mentioned
970. The algorithm which removes the recently used page first is ________
a) LRU
b) MRU
c) OFM
d) None of the mentioned
971. The LRU can be improved by providing a little randomness in the access.
a) True
b) False
972. In LRU, the referenced blocks counter is set to’0′ and that of the previous blocks are incremented by one
and others remain same, in the case of ______
a) Hit
b) Miss
c) Delay
d) None of the mentioned
973. The counter that keeps track of how many times a block is most likely used is _______
a) Count
b) Reference counter
c) Use counter
d) Probable counter
979. The memory transfers between two variable speed devices are always done at the speed of the faster
device.
a) True
b) False
981. The performance of the system is greatly influenced by increasing the level 1 cache.
a) True
b) False
982. Two processors A and B have clock frequencies of 700 Mhz and 900 Mhz respectively. Suppose A can
execute an instruction with an average of 3 steps and B can execute with an average of 5 steps. For the
execution of the same instruction which processor is faster.
a) A
b) B
c) Both take the same time
d) Insufficient information
983. If the instruction Add R1, R2, R3 is executed in a system which is pipelined, then the value of S is (Where
S is a term of the Basic performance equation).
a) 3
b) ~2
c) ~1
d) 6
984. The physical memory is not as large as the address space spanned by the processor.
a) True
b) False
986. The techniques which move the program blocks to or from the physical memory is called as ______
a) Paging
b) Virtual memory organisation
c) Overlays
d) Framing
987. The binary address issued to data or instructions are called as ______
a) Physical address
b) Location
c) Relocatable address
d) Logical address
991. The DMA doesn’t make use of the MMU for bulk data transfers.
a) True
b) False
992. The virtual memory basically stores the next segment of data to be executed on the _________
a) Secondary storage
b) Disks
c) RAM
d) ROM
994. The main reason for the discontinuation of semi conductor based storage devices for providing large
storage space is _________
a) Lack of sufficient resources
b) High cost per bit value
c) Lack of speed of operation
d) None of the mentioned
996. For the synchronization of the read head, we make use of a _______
a) Framing bit
b) Synchronization bit
c) Clock
d) Dirty bit
997. One of the most widely used schemes of encoding used is _________
a) NRZ-polar
b) RZ-polar
c) Manchester
d) Block encoding
999. The read/write heads must be near to disk surfaces for better storage.
a) True
b) False
1000. _____ pushes the heads away from the surface as they rotate at their standard rates.
a) Magnetic tension
b) Electric force
c) Air pressure
d) None of the mentioned