Computer Organization and Architecture MCQ for GATE

Computer Organization and Architecture MCQ for GATE are specially prepared by our LiveMCQs team. This Computer Organisation and Architecture MCQ post cover all the possible questions for your GATE Exam. Students who are searching for Computer Organization and Architecture MCQ for GATE can read these questions for a better understanding of Computer Organization and Architecture. You can also download the PDF by clicking the link MCQ on Computer Organization and Architecture PDF provided below.

Computer Organization and Architecture MCQ for GATE

1. The drawback of Manchester encoding is _________

(A) The cost of the encoding scheme

(B) The speed of encoding the data

(C) The Latency offered

(D) The low bit storage density provided

Answer: The low bit storage density provided

2. The read/write heads must be near to disk surfaces for better storage.

(A) True

(B) False

Answer: True

3.  _______ is used to detect and correct the errors that may occur during data transfers.

(A) ECC

(B) CRC

(C) Checksum

(D) None of the mentioned

Answer: ECC

4. The logic operations are simpler to implement using logic circuits.

(A) True

(B) False

Answer: True

5. The logic operations are implemented using _______ circuits.

(A) Bridge

(B) Logical

(C) Combinatorial

(D) Gate

Answer: Combinatorial

6. The carry generation function: ci + 1 = yici + xici + xiyi, is implemented in ____________

(A) Half adders

(B) Full adders

(C) Ripple adders

(D) Fast adders

Answer: Full adders

7. Which option is true regarding the carry in the ripple adders?

(A) Are generated at the beginning only

(B) Must travel through the configuration

(C) Is generated at the end of each operation

(D) None of the mentioned

Answer: Must travel through the configuration

8. In full adders the sum circuit is implemented using ________

(A) And & or gates

(B) NAND gate

(C) XOR

(D) XNOR

Answer: XOR

9. The usual implementation of the carry circuit involves _________

(A) And & or gates

(B) XOR

(C) NAND

(D) XNOR

Answer: XOR

10. A _______ gate is used to detect the occurrence of an overflow.

(A) NAND

(B) XOR

(C) XNOR

(D) AND

Answer: XOR

11. In a normal adder circuit, the delay obtained in a generation of the output is _______

(A) 2n + 2

(B) 2n

(C) n + 2

(D) None of the mentioned

Answer: 2n + 2

12. The final addition sum of the numbers, 0110 & 0110 is ____________

(A) 1101

(B) 1111

(C) 1001

(D) 1010

Answer: 1101

13. The delay reduced to in the carry look ahead adder is __________

(A) 5

(B) 8

(C) 10

(D) 2n

Answer: 5

14. The method followed in case of node failure, wherein the node gets disabled is _________

(A) STONITH

(B) Fibre channel

(C) Fencing

(D) None of the mentioned

Answer: STONITH

15. VLIW stands for?

(A) Very Long Instruction Word

(B) Very Long Instruction Width

(C) Very Large Instruction Word

(D) Very Long Instruction Width

Answer: Very Long Instruction Word

16. The important feature of the VLIW is _______

(A) ILP

(B) Cost effectiveness

(C) Performance

(D) None of the mentioned

Answer: ILP

17. The main difference between the VLIW and the other approaches to improve performance is ___________

(A) Cost effectiveness

(B) Increase in performance

(C) Lack of complex hardware design

(D) All of the mentioned

Answer: All of the mentioned

18. In VLIW the decision for the order of execution of the instructions depends on the program itself.

(A) True

(B) False

Answer: True

19. The parallel execution of operations in VLIW is done according to the schedule determined by __________

(A) Task scheduler

(B) Interpreter

(C) Compiler

(D) Encoder

Answer: Compiler

20. The VLIW processors are much simpler as they do not require of _________

(A) Computational register

(B) Complex logic circuits

(C) SSD slots

(D) Scheduling hardware

Answer: Scheduling hardware

21. The VLIW architecture follows _____ approach to achieve parallelism.

(A) MISD

(B) SISD

(C) SIMD

(D) MIMD

Answer: MIMD

22. The following instruction is allowed in VLIW:

f12 = f0 * f4, f8 = f8 + f12, f0 = dm (i0, m3), f4 = pm(i8, m9);

(A) True

(B) False

Answer: True

23. To compute the direction of the branch the VLIW uses _____________

(A) Seekers

(B) Heuristics

(C) Direction counter

(D) Compass

Answer: Heuristics

24. EPIC stands for?

(A) Explicitly Parallel Instruction Computing

(B) External Peripheral Integrating Component

(C) External Parallel Instruction Computing

(D) None of the mentioned

Answer: Explicitly Parallel Instruction Computing

25. For converting a virtual address into the physical address, the programs are divided into __________

(A) Pages

(B) Frames

(C) Segments

(D) Blocks

Answer: Pages

26. The memory allocated to each page is contiguous.

(A) True

(B) False

Answer: True

27. The pages size shouldn’t be too small, as this would lead to __________

(A) Transfer errors

(B) Increase in operation time

(C) Increase in access time

(D) Decrease in performance

Answer: Increase in access time

28. The cache bridges the speed gap between ______ and __________

(A) RAM and ROM

(B) RAM and Secondary memory

(C) Processor and RAM

(D) None of the mentioned

Answer: Processor and RAM

29. The virtual memory bridges the size and speed gap between __________ and __________

(A) RAM and ROM

(B) RAM and Secondary memory

(C) Processor and RAM

(D) None of the mentioned

Answer: RAM and Secondary memory

30.  ______ translates the logical address into a physical address.

(A) MMU

(B) Translator

(C) Compiler

(D) Linker

Answer: MMU

31. The higher order bits of the virtual address generated by the processor forms the _______

(A) Table number

(B) Frame number

(C) List number

(D) Page number

Answer: Page number

32. The page length shouldn’t be too long because ___________

(A) It reduces the program efficiency

(B) It increases the access time

(C) It leads to wastage of memory

(D) None of the mentioned

Answer: It leads to wastage of memory

33. The lower order bits of the virtual address forms the __________

(A) Page number

(B) Frame number

(C) Block number

(D) Offset

Answer: Offset

34. The product of 1101 & 1011 is ______

(A) 10001111

(B) 10101010

(C) 11110000

(D) 11001100

Answer: 10001111

35. We make use of ______ circuits to implement multiplication.

(A) Flip flops

(B) Combinatorial

(C) Fast adders

(D) None of the mentioned

Answer: Fast adders

36. The multiplier is stored in ______

(A) PC Register

(B) Shift register

(C) Cache

(D) None of the mentioned

Answer: Shift register

37. The ______ is used to coordinate the operation of the multiplier.

(A) Controller

(B) Coordinator

(C) Control sequencer

(D) None of the mentioned

Answer: Control sequencer

38. The multiplicand and the control signals are passed through to the n-bit adder via _____

(A) MUX

(B) DEMUX

(C) Encoder

(D) Decoder

Answer: MUX

39. The product of -13 & 11 is ______________

(A) 1100110011

(B) 1101110001

(C) 1010101010

(D) 1111111000

Answer: 1101110001

40. The method used to reduce the maximum number of summands by half is _______

(A) Fast multiplication

(B) Bit-pair recording

(C) Quick multiplication

(D) None of the mentioned

Answer: Bit-pair recording

41. The bits 1 & 1 are recorded as _______ in bit-pair recording.

(A) -1

(B) 0

(C) +1

(D) both -1 and 0

Answer: both -1 and 0

42. The multiplier -6(11010) is recorded as _______

(A) 0-1-2

(B) 0-1+1-10

(C) -2-10

(D) None of the mentioned

Answer: 0-1-2

43.  _____ pushes the heads away from the surface as they rotate at their standard rates.

(A) Magnetic tension

(B) Electric force

(C) Air pressure

(D) None of the mentioned

Answer: Air pressure

44. The air pressure can be countered by putting ______ in the head-disc surface arrangement.

(A) Air filter

(B) Spring mechanism

(C) coolant

(D) None of the mentioned

Answer: Spring mechanism

45. The associatively mapped virtual memory makes use of _______

(A) TLB

(B) Page table

(C) Frame table

(D) None of the mentioned

Answer: TLB

46. The main reason for the discontinuation of semi conductor based storage devices for providing large storage space is _________

(A) Lack of sufficient resources

(B) High cost per bit value

(C) Lack of speed of operation

(D) None of the mentioned

Answer: High cost per bit value

47. The digital information is stored on the hard disk by ____________

(A) Applying a suitable electric pulse

(B) Applying a suitable magnetic field

(C) Applying a suitable nuclear field

(D) By using optic waves

Answer: Applying a suitable electric pulse

48. For the synchronization of the read head, we make use of a _______

(A) Framing bit

(B) Synchronization bit

(C) Clock

(D) Dirty bit

Answer: Clock

49. One of the most widely used schemes of encoding used is _________

(A) NRZ-polar

(B) RZ-polar

(C) Manchester

(D) Block encoding

Answer: Manchester

50. The method of placing the heads and the discs in an air tight environment is also called as ______

(A) RAID Arrays

(B) ATP tech

(C) Winchester technology

(D) Fleming reduction

Answer: Winchester technology

51. A hard disk with 20 surfaces will have _____ heads.

(A) 10

(B) 5

(C) 1

(D) 20

Answer: 20

52. The disk system consists of which of the following?

i. Disk

ii. Disk drive

iii. Disk controller

(A) i and ii

(B) i, ii and iii

(C) ii and iii

(D) i

Answer: i, ii and iii

53. The set of corresponding tracks on all surfaces of a stack of disks form a ______

(A) Cluster

(B) Cylinder

(C) Group

(D) Set

Answer: Cylinder

54. The data can be accessed from the disk using _________

(A) Surface number

(B) Sector number

(C) Track number

(D) All of the mentioned

Answer: All of the mentioned

55. The read and write operations usually start at ______ of the sector.

(A) Center

(B) Middle

(C) From the last used point

(D) Boundaries

Answer: Boundaries

56. To distinguish between two sectors we make use of ________

(A) Inter sector gap

(B) Splitting bit

(C) Numbering bit

(D) None of the mentioned

Answer: Inter sector gap

57. The _____ process divides the disk into sectors and tracks.

(A) Creation

(B) Initiation

(C) Formatting

(D) Modification

Answer: Formatting

58. The access time is composed of __________

(A) Seek time

(B) Rotational delay

(C) Latency

(D) Both Seek time and Rotational delay

Answer: Both Seek time and Rotational delay

59. The disk drive is connected to the system by using the _____

(A) PCI bus

(B) SCSI bus

(C) HDMI

(D) ISA

Answer: SCSI bus

60. _______ is used to deal with the difference in the transfer rates between the drive and the bus.

(A) Data repeaters

(B) Enhancers

(C) Data buffers

(D) None of the mentioned

Answer: Data buffers

61. The sub-routine service procedure is similar to that of the interrupt service routine in ________

(A) Method of context switch

(B) Returning

(C) Process execution

(D) Method of context switch & Process execution

Answer: Method of context switch & Process execution

62. In memory-mapped I/O ____________

(A) The I/O devices and the memory share the same address space

(B) The I/O devices have a separate address space

(C) The memory and I/O devices have an associated address space

(D) A part of the memory is specifically set aside for the I/O operation

Answer: The I/O devices and the memory share the same address space

63. The usual BUS structure used to connect the I/O devices is ___________

(A) Star BUS structure

(B) Multiple BUS structure

(C) Single BUS structure

(D) Node to Node BUS structure

Answer: Single BUS structure

64. In intel’s IA-32 architecture there is a separate 16 bit address space for the I/O devices.

(A) False

(B) True

Answer: True

65. The advantage of I/O mapped devices to memory mapped is ___________

(A) The former offers faster transfer of data

(B) The devices connected using I/O mapping have a bigger buffer space

(C) The devices have to deal with fewer address lines

(D) No advantage as such

Answer: The devices have to deal with fewer address lines

66. The system is notified of a read or write operation by ___________

(A) Appending an extra bit of the address

(B) Enabling the read or write bits of the devices

(C) Raising an appropriate interrupt signal

(D) Sending a special signal along the BUS

Answer: Sending a special signal along the BUS

67. To overcome the lag in the operating speeds of the I/O device and the processor we use ___________

(A) BUffer spaces

(B) Status flags

(C) Interrupt signals

(D) Exceptions

Answer: Status flags

68. The method of accessing the I/O devices by repeatedly checking the status flags is ___________

(A) Program-controlled I/O

(B) Memory-mapped I/O

(C) I/O mapped

(D) All of the mentioned

Answer: Program-controlled I/O

69. The method of synchronising the processor with the I/O device in which the device sends a signal when it is ready is?

(A) Exceptions

(B) Signal handling

(C) Interrupts

(D) DMA

Answer: Interrupts

70. The method which offers higher speeds of I/O transfers is ___________

(A) Interrupts

(B) Memory mapping

(C) Program-controlled I/O

(D) DMA

Answer: “2012-01-10 10:40:00 EST” “2011-12-09 09:10:00 EST”

71. The process wherein the processor constantly checks the status flags is called as ___________

(A) Polling

(B) Inspection

(C) Reviewing

(D) Echoing

Answer: Polling

72. The interrupt-request line is a part of the ___________

(A) Data line

(B) Control line

(C) Address line

(D) None of the mentioned

Answer: Control line

73. The return address from the interrupt-service routine is stored on the ___________

(A) System heap

(B) Processor register

(C) Processor stack

(D) Memory

Answer: Processor stack

74. The signal sent to the device from the processor to the device after receiving an interrupt is ___________

(A) Interrupt-acknowledge

(B) Return signal

(C) Service signal

(D) Permission signal

Answer: Interrupt-acknowledge

75. When the process is returned after an interrupt service ______ should be loaded again.

i) Register contents

ii) Condition codes

iii) Stack contents

iv) Return addresses

(A) i, iv

(B) ii, iii and iv

(C) iii, iv

(D) i, ii

Answer: i, ii

76. The time between the receiver of an interrupt and its service is ______

(A) Interrupt delay

(B) Interrupt latency

(C) Cycle time

(D) All of the mentioned

Answer: Interrupt latency

77. Interrupts form an important part of _____ systems.

(A) Batch processing

(B) Multitasking

(C) Real-time processing

(D) Multi-user

Answer: Real-time processing

78. A single Interrupt line can be used to service n different devices.

(A) True

(B) False

Answer: True

79. ______ type circuits are generally used for interrupt service lines.

i) open-collector

ii) open-drain

iii) XOR

iv) XNOR

(A) i, ii

(B) ii

(C) ii, iii

(D) ii, iv

Answer: i, ii

80. The resistor which is attached to the service line is called _____

(A) Push-down resistor

(B) Pull-up resistor

(C) Break down resistor

(D) Line resistor

Answer: Pull-up resistor

81. The data is stored on the disk in the form of blocks called _____

(A) Pages

(B) Frames

(C) Sectors

(D) Tables

Answer: Sectors

82. The transfer rate, when the USB is operating in low-speed of operation is _____

(A) 5 Mb/s

(B) 12 Mb/s

(C) 2.5 Mb/s

(D) 1.5 Mb/s

Answer: 1.5 Mb/s

83. The high speed mode of operation of the USB was introduced by _____

(A) ISA

(B) USB 3.0

(C) USB 2.0

(D) ANSI

Answer: USB 2.0

84. The sampling process in speaker output is a ________ process.

(A) Asynchronous

(B) Synchronous

(C) Isochronous

(D) None of the mentioned

Answer: Isochronous

85. The USB device follows _______ structure.

(A) List

(B) Huffman

(C) Hash

(D) Tree

Answer: Tree

86. The I/O devices form the _____ of the tree structure.

(A) Leaves

(B) Subordinate roots

(C) Left subtrees

(D) Right subtrees

Answer: Leaves

87. USB is a parallel mode of transmission of data and this enables for the fast speeds of data transfers.

(A) True

(B) False

Answer: False

88. In USB the devices can communicate with each other.

(A) True

(B) False

(C) Logging

(D) Debugging

Answer: False

89. The device can send a message to the host by taking part in _____ for the communication path.

(A) Arbitration

(B) Polling

(C) Prioritizing

(D) None of the mentioned

Answer: Polling

90. When the USB is connected to a system, its root hub is connected to the ________

(A) PCI BUS

(B) SCSI BUS

(C) Processor BUS

(D) IDE

Answer: Processor BUS

91. The devices connected to USB is assigned a ____ address.

(A) 9 bit

(B) 16 bit

(C) 4 bit

(D) 7 bit

Answer: 7 bit

92. The USB address space can be shared by the user’s memory space.

(A) True

(B) False

Answer: False

93. The initial address of a device just connected to the HUB is ________

(A) AHFG890

(B) 0000000

(C) FFFFFFF

(D) 0101010

Answer: 0000000

94. Locations in the device to or from which data transfers can take place is called ________

(A) End points

(B) Hosts

(C) Source

(D) None of the mentioned

Answer: End points

95. A USB pipe is a ______ channel.

(A) Simplex

(B) Half-Duplex

(C) Full-Duplex

(D) Both Simplex and Full-Duplex

Answer: Full-Duplex

96. The type/s of packets sent by the USB is/are _______

(A) Data

(B) Address

(C) Control

(D) Both Data and Control

Answer: Both Data and Control

97. The first field of any packet is _____

(A) PID

(B) ADDR

(C) ENDP

(D) CRC16

Answer: PID

98. The 4 bit PID’s are transmitted twice.

(A) True

(B) False

Answer: True

99. The last field in the packet is ______

(A) PID

(B) ADDR

(C) ENDP

(D) CRC

Answer: CRC

100. The CRC bits are computed based on the values of the _____

(A) PID

(B) ADDR

(C) ENDP

(D) Both ADDR and ENDP

Answer: Both ADDR and ENDP