CEA Quiz
CEA Quiz
1. The operand ________ yields true if and only if both of its operands are true.
A. XOR B. OR
C. AND D. NOT
2. The operation _________ yields true if either or both of its+ operands are
true.
A. NOT B. AND
C. NAND D. OR
A. OR B. NOT
C. NAND D. XOR
A. gate B. decoder
C. counter D. flip-flop
5. Which of the following is a functionally complete set?
A. DeMorgan B. Quine-McCluskey
7. ________ are used in digital circuits to control signal and data routing.
C. Flip-flops D. Gates
9. The ________ exists in one of two states and, in the absence of input,
remains in that state.
C. decoder D. flip-flop
10. The ________ flip-flop has two inputs and all possible combinations of
input values are valid.
A. J-K B. D
A. asynchronous
B. synchronous
13. CPUs make use of _________ counters, in which all of the flip-flops of the
counter change at the same time.
A. synchronous B. asynchronous
14. The _________ table provides the value of the next output when the inputs
and the present output are known, which is exactly the information needed to
design the counter or any sequential circuit.
A. excitation B. Kenough
C. J-K flip-flop D. FPGA
15. A _________ is a PLD featuring a general structure that allows very high
logic capacity and offers more narrow logic resources and a higher ration of flip-
flops to logic resources than do CPLDs.
A. SPLD B. FPGA
C. PAL D. PLA
Chapter 12:
1. The ________ specifies the operation to be performed.
3. There must be ________ instructions for moving data between memory and
the registers.
A. branch B. logic
C. memory D. I/O
A. Logic B. Arithmetic
C. Memory D. Test
A. Boolean B. Logic
C. Memory D. Arithmetic
6. _______ instructions are needed to transfer programs and data into memory
and the results of computations back out to the user.
A. I/O B. Transfer
C. Control D. Branch
7. The x86 data type that is a signed binary value contained in a byte, word, or
doubleword, using twos complement representation is _________.
A. general B. ordinal
C. integer D. packed BCD
C. arithmetic D. logical
A. skip B. rotate
C. stack D. push
11.The entire set of parameters, including return address, which is stored for a
procedure invocation is referred to as a _________.
A. branch B. stack frame
C. pop D. push
Chapter 13
1. The advantage of __________ is that no memory reference other than the
instruction fetch is required to obtain the operand.
A. displacement B. register
C. stack D. direct
3. __________ has the advantage of large address space, however it has the
disadvantage of multiple memory references.
A. direct B. indirect
C. register D. displacement
6. For _________, the address field references a main memory address and
the referenced register contains a positive displacement from that
address.
C. postindexing D. preindexing
A. immediate B. base
C. register D. displacement
A. register B. relative
C. base D. immediate
A. Opcode B. Orthogonality
C. Completeness D. Autoindexing
12.The _________ was designed to provide a powerful and flexible
instruction set within the constraints of a 16-bit minicomputer.
A. PDP-1 B. PDP-8
C. PDP-11 D. PDP-10
13.The __________ byte consists of three fields: the Scale field, the Index
field and the Base field.
A. SIB B. VAX
C. PDP-11 D. ModR/M
14.All instructions in the ARM architecture are __________ bits long and
follow a regular format.
A. 8 B. 16
C. 32 D. 64
A. Orthogonality B. Completeness
Chater 14
1. __________ are a set of storage locations.
A. Processors B. PSWs
C. Registers D. Control units
2. The ________ controls the movement of data and instructions into and out
of the processor.
C. shifter D. branch
3. ________ registers may be used only to hold data and cannot be employed
in the calculation of an operand address.
C. Stacks D. PSWs
A. MAR B. PC
C. MBR D. IR
A. Control B. Resource
A. resource B. data
C. structural D. control
10.A _________ is a small, very-high-speed memory maintained by the
instruction fetch stage of the pipeline and containing the n most recently
fetched instructions in sequence.
A. decode B. execute
A. 2 B. 8
C. 11 D. 7
Chapter 15
1. _________ determines the control and pipeline organization.
A. HLL B. RISC
C. CISC D. all of the above
A. SPARC B. CISC
A. Load-and-store B. Window
C. Complex D. Branch
A. I B. E
A. SUB B. NOOP
10.The MIPS R4000 uses ________ bits for all internal and external data
paths and for addresses, registers, and the ALU.
A. 16 B. 32
C. 64 D. 128
11.All MIPS R series processor instructions are encoded in a single
________ word format.
A. 4-bit B. 8-bit
C. 16-bit D. 32-bit
12.A _________ architecture is one that makes use of more, and more fine-
grained pipeline stages.
A. parallel B. superpipelined
C. superscalar D. hybrid
A. 8 B. 10
C. 5 D. 3
A. Microsoft B. Apple
C. Sun Microsystems D. IBM
15.The R4000 pipeline stage where the instruction result is written back to
the register file is the __________ stage.
Chapter 16
A. RISC B. CISC
A. scalar B. branch
4. The situation where the second instruction needs data produced by the
first instruction to execute is referred to as __________.
A. Micro-ops B. Scalar
C. 386 D. 486
15.Utilizing a branch target buffer (BTB), the _________ uses a dynamic
branch prediction strategy based on the history of recent executions of
branch instructions.
A. 486 B. Pentium
Chapter 17
A. Randolph B. Flynn
A. MIMD B. SIMD
C. SISD D. MISD
3. Vector and array processors fall into the ________ category of computer
systems.
A. SIMD B. SISD
C. MISD D. MIMD
4. SMPs, clusters, and NUMA systems fit into the ________ category of
computer systems.
A. SISD B. MIMD
C. SIMD D. MISD
5. A _________ problem arises when multiple copies of the same data can
exist in different caches simultaneously, and if processors are allowed to
update their own copies freely, an inconsistent view of memory can
result.
C. failover D. failback
A. clusters B. streams
C. protocols D. vectors
A. superscalar
B. single-threaded scalar
A. Chaining B. Rollover
12. The ________ contains control fields, such as the vector count, that
determine how many elements in the vector registers are to be processed.
14. An operation that switches the processor from one process to another by
saving all the process control data, register, and other information for the
first and replacing them with the process information for the second is:
Chapter 18
1. With _______, register banks are replicated so that multiple threads can
share the use of pipeline resources.
A. SMT B. pipelining
C. scalar D. superscalar
A. Superscalar B. Scalar
4. One way to control power density is to use more of the chip area for
________.
C. silicon D. resistors
A. threaded B. multi-process
C. Java D. multi-instance
C. multi-instance D. multi-process
C. Java D. Threaded
A. coarse B. multi-instance
C. fine-grained D. hybrid
9. A loop that iterates over an array of data can be split up into a number of
smaller parallel loops in individual threads that can be scheduled in parallel
when using ________ threading.
A. multi-process B. fine-grained
C. hybrid D. coarse
11.The ________ connects to the external bus, known as the Front Side Bus,
which connects to main memory, I/O controllers, and other processor chips.
A. L2 B. APIC
12.The Intel Core i7-990X, introduced in 2008, implements ______ x86 SMT
processors, each with a dedicated L2 cache, and with a shared L3 cache.
A. 2 B. 4
C. 6 D. 8
A. dies B. cores
C. QPI D. interconnects
14.The ________ feature enables moving dirty data from one CPU to
another without writing to L2 and reading the data back in from external
memory.