Professional Documents
Culture Documents
com
Code No: 07A4EC13 Set No. 1 JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD II B.Tech. II Sem., I Mid-Term Examinations, March 2010 COMPUTER ORGANIZATION Objective Exam Name: ______________________________ Hall Ticket No. A I 1. Choose the correct alternative: The transfer of information from a remoty word to the outside environment is called a ________ operation. [ ] a) Read b) write c) both d) none There are ___________ different logical operations that can be performed with 2 binary variables [ ] a) 2 b) 4 c) 8 d) 16 The solution to any problem that is stated by a finite number of well defined procedural steps is _________ [ ] a) algorithm b) flowchart c) coding d) instruction _________ are methods for dividing numbers a) comparison b) non restoring c) both
Answer All Questions. All Questions Carry Equal Marks.Time: 20 Min. Marks: 20.
2.
3.
4.
5.
The operation of deletion in called ___________ a) push b) pop c) both d) none Stack follows the __________ operation a) L I F O b) F I F O
6.
7.
The control unit of computer is designed to go through an instruction cycle that is divided into _______ phases [ a) 1 b) 2 c) 3 d) 4 __________ instruction transfer data between processor register and a memory stack. a) push b) pop c) both d) none [
T N
W U
c) S J F d) SETC
R O
d) none
D L
[ d) none
8.
9.
10.
The large variety of addressing modes in CISC typically from 5 to _______ modes a) 10 b) 15 c) 18 d) 20
Cont.2
www.jntuworld.com
www.jntuworld.com
07A4EC13
:2:
Set No. 1
Fill in the blanks: A micro operation is an elementary operation performed on the information stored in __________ Register The register that holds an address for the memory unit is called __________ The Control signals are generated by h/w using conventional logic design techniques, the control unit said to be _________ The data register sometimes called ___________ register The convenient method for presenting algorithm is a _________ The h/w method just described is called the __________method
12. 13.
The register that holds the address for the stack is called a _____________
The last instruction of every subroutine, commonly called ____________ subroutine. A control unit whose binary control variables are stored in memory is called __________ Internal interrupts also called __________
T N
W U
-oOo-
R O
D L
www.jntuworld.com
www.jntuworld.com
Code No: 07A4EC13 Set No. 2 JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD II B.Tech. II Sem., I Mid-Term Examinations, March 2010 COMPUTER ORGANIZATION Objective Exam Name: ______________________________ Hall Ticket No. A I 1. Choose the correct alternative: _________ are methods for dividing numbers a) comparison b) non restoring c) both The operation of deletion in called ___________ a) push b) pop c) both d) none Stack follows the __________ operation a) L I F O b) F I F O [ d) none ]
Answer All Questions. All Questions Carry Equal Marks.Time: 20 Min. Marks: 20.
2.
3.
c) S J F
4.
The control unit of computer is designed to go through an instruction cycle that is divided into _______ phases [ a) 1 b) 2 c) 3 d) 4 __________ instruction transfer data between processor register and a memory stack. a) push b) pop c) both d) none
5.
6.
7.
The large variety of addressing modes in CISC typically from 5 to _______ modes a) 10 b) 15 c) 18 d) 20
8.
9.
The transfer of information from a remoty word to the outside environment is called a ________ operation. [ ] a) Read b) write c) both d) none There are ___________ different logical operations that can be performed with 2 binary variables [ ] a) 2 b) 4 c) 8 d) 16 The solution to any problem that is stated by a finite number of well defined procedural steps is _________ [ ] a) algorithm b) flowchart c) coding d) instruction Cont.2
T N
W U
d) SETC
R O
d) none
D L
10.
www.jntuworld.com
www.jntuworld.com
Code No: II 11. 12. 13. 14. 15. 16. 17. 18.
07A4EC13
:2:
Set No. 2
Fill in the blanks: The data register sometimes called ___________ register The convenient method for presenting algorithm is a _________ The h/w method just described is called the __________method The register that holds the address for the stack is called a _____________ The last instruction of every subroutine, commonly called ____________ subroutine.
A control unit whose binary control variables are stored in memory is called __________ Internal interrupts also called __________
A micro operation is an elementary operation performed on the information stored in __________ Register The register that holds an address for the memory unit is called __________ The Control signals are generated by h/w using conventional logic design techniques, the control unit said to be _________
19. 20.
T N
W U
-oOo-
R O
D L
www.jntuworld.com
www.jntuworld.com
Code No: 07A4EC13 Set No. 3 JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD II B.Tech. II Sem., I Mid-Term Examinations, March 2010 COMPUTER ORGANIZATION Objective Exam Name: ______________________________ Hall Ticket No. A I 1. Choose the correct alternative: Stack follows the __________ operation a) L I F O b) F I F O [ c) S J F d) none ]
Answer All Questions. All Questions Carry Equal Marks.Time: 20 Min. Marks: 20.
2.
The control unit of computer is designed to go through an instruction cycle that is divided into _______ phases [ a) 1 b) 2 c) 3 d) 4 __________ instruction transfer data between processor register and a memory stack. a) push b) pop c) both d) none
3.
4.
5.
The large variety of addressing modes in CISC typically from 5 to _______ modes a) 10 b) 15 c) 18 d) 20
6.
The transfer of information from a remoty word to the outside environment is called a ________ operation. [ ] a) Read b) write c) both d) none There are ___________ different logical operations that can be performed with 2 binary variables [ ] a) 2 b) 4 c) 8 d) 16 The solution to any problem that is stated by a finite number of well defined procedural steps is _________ [ ] a) algorithm b) flowchart c) coding d) instruction _________ are methods for dividing numbers a) comparison b) non restoring c) both The operation of deletion in called ___________ a) push b) pop c) both d) none [ d) none [ ] ]
7.
T N
W U
d) SETC
R O
D L
8.
9.
10.
Cont.2
www.jntuworld.com
www.jntuworld.com
07A4EC13
:2:
Set No. 3
Fill in the blanks: The h/w method just described is called the __________method The register that holds the address for the stack is called a _____________ The last instruction of every subroutine, commonly called ____________ subroutine. A control unit whose binary control variables are stored in memory is called __________ Internal interrupts also called __________
A micro operation is an elementary operation performed on the information stored in __________ Register The register that holds an address for the memory unit is called __________
17. 18.
The Control signals are generated by h/w using conventional logic design techniques, the control unit said to be _________ The data register sometimes called ___________ register
19. 20.
T N
W U
-oOo-
R O
D L
www.jntuworld.com
www.jntuworld.com
Code No: 07A4EC13 Set No. 4 JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD II B.Tech. II Sem., I Mid-Term Examinations, March 2010 COMPUTER ORGANIZATION Objective Exam Name: ______________________________ Hall Ticket No. A I 1. Choose the correct alternative: __________ instruction transfer data between processor register and a memory stack. a) push b) pop c) both d) none [ ]
Answer All Questions. All Questions Carry Equal Marks.Time: 20 Min. Marks: 20.
2.
d) SETC
3.
The large variety of addressing modes in CISC typically from 5 to _______ modes a) 10 b) 15 c) 18 d) 20
4.
The transfer of information from a remoty word to the outside environment is called a ________ operation. [ ] a) Read b) write c) both d) none There are ___________ different logical operations that can be performed with 2 binary variables [ ] a) 2 b) 4 c) 8 d) 16 The solution to any problem that is stated by a finite number of well defined procedural steps is _________ [ ] a) algorithm b) flowchart c) coding d) instruction _________ are methods for dividing numbers a) comparison b) non restoring c) both The operation of deletion in called ___________ a) push b) pop c) both d) none Stack follows the __________ operation a) L I F O b) F I F O
5.
6.
7.
T N
W U
c) S J F
R O
d) none
D L
8.
9.
[ d) none
10.
The control unit of computer is designed to go through an instruction cycle that is divided into _______ phases [ a) 1 b) 2 c) 3 d) 4 Cont.2
www.jntuworld.com
www.jntuworld.com
07A4EC13
:2:
Set No. 4
Fill in the blanks: The last instruction of every subroutine, commonly called ____________ subroutine. A control unit whose binary control variables are stored in memory is called __________ Internal interrupts also called __________ A micro operation is an elementary operation performed on the information stored in __________ Register The register that holds an address for the memory unit is called __________
15. 16.
The Control signals are generated by h/w using conventional logic design techniques, the control unit said to be _________ The data register sometimes called ___________ register
The register that holds the address for the stack is called a _____________
T N
W U
-oOo-
R O
D L
www.jntuworld.com