You are on page 1of 8

www.jntuworld.

com

Code No: 07A4EC13 Set No. 1 JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD II B.Tech. II Sem., I Mid-Term Examinations, March 2010 COMPUTER ORGANIZATION Objective Exam Name: ______________________________ Hall Ticket No. A I 1. Choose the correct alternative: The transfer of information from a remoty word to the outside environment is called a ________ operation. [ ] a) Read b) write c) both d) none There are ___________ different logical operations that can be performed with 2 binary variables [ ] a) 2 b) 4 c) 8 d) 16 The solution to any problem that is stated by a finite number of well defined procedural steps is _________ [ ] a) algorithm b) flowchart c) coding d) instruction _________ are methods for dividing numbers a) comparison b) non restoring c) both

Answer All Questions. All Questions Carry Equal Marks.Time: 20 Min. Marks: 20.

2.

3.

4.

5.

The operation of deletion in called ___________ a) push b) pop c) both d) none Stack follows the __________ operation a) L I F O b) F I F O

6.

7.

The control unit of computer is designed to go through an instruction cycle that is divided into _______ phases [ a) 1 b) 2 c) 3 d) 4 __________ instruction transfer data between processor register and a memory stack. a) push b) pop c) both d) none [

T N

W U
c) S J F d) SETC

R O
d) none

D L

[ d) none

8.

9.

Which of the following is shift instruction a) RORC b) CALL C) SKP

10.

The large variety of addressing modes in CISC typically from 5 to _______ modes a) 10 b) 15 c) 18 d) 20

Cont.2

www.jntuworld.com

www.jntuworld.com

Code No: II 11.

07A4EC13

:2:

Set No. 1

Fill in the blanks: A micro operation is an elementary operation performed on the information stored in __________ Register The register that holds an address for the memory unit is called __________ The Control signals are generated by h/w using conventional logic design techniques, the control unit said to be _________ The data register sometimes called ___________ register The convenient method for presenting algorithm is a _________ The h/w method just described is called the __________method

12. 13.

14. 15. 16. 17. 18. 19. 20.

The register that holds the address for the stack is called a _____________

The last instruction of every subroutine, commonly called ____________ subroutine. A control unit whose binary control variables are stored in memory is called __________ Internal interrupts also called __________

T N

W U
-oOo-

R O

D L

www.jntuworld.com

www.jntuworld.com

Code No: 07A4EC13 Set No. 2 JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD II B.Tech. II Sem., I Mid-Term Examinations, March 2010 COMPUTER ORGANIZATION Objective Exam Name: ______________________________ Hall Ticket No. A I 1. Choose the correct alternative: _________ are methods for dividing numbers a) comparison b) non restoring c) both The operation of deletion in called ___________ a) push b) pop c) both d) none Stack follows the __________ operation a) L I F O b) F I F O [ d) none ]

Answer All Questions. All Questions Carry Equal Marks.Time: 20 Min. Marks: 20.

2.

3.

c) S J F

4.

The control unit of computer is designed to go through an instruction cycle that is divided into _______ phases [ a) 1 b) 2 c) 3 d) 4 __________ instruction transfer data between processor register and a memory stack. a) push b) pop c) both d) none

5.

6.

Which of the following is shift instruction a) RORC b) CALL C) SKP

7.

The large variety of addressing modes in CISC typically from 5 to _______ modes a) 10 b) 15 c) 18 d) 20

8.

9.

The transfer of information from a remoty word to the outside environment is called a ________ operation. [ ] a) Read b) write c) both d) none There are ___________ different logical operations that can be performed with 2 binary variables [ ] a) 2 b) 4 c) 8 d) 16 The solution to any problem that is stated by a finite number of well defined procedural steps is _________ [ ] a) algorithm b) flowchart c) coding d) instruction Cont.2

T N

W U
d) SETC

R O

d) none

D L

10.

www.jntuworld.com

www.jntuworld.com

Code No: II 11. 12. 13. 14. 15. 16. 17. 18.

07A4EC13

:2:

Set No. 2

Fill in the blanks: The data register sometimes called ___________ register The convenient method for presenting algorithm is a _________ The h/w method just described is called the __________method The register that holds the address for the stack is called a _____________ The last instruction of every subroutine, commonly called ____________ subroutine.

A control unit whose binary control variables are stored in memory is called __________ Internal interrupts also called __________

A micro operation is an elementary operation performed on the information stored in __________ Register The register that holds an address for the memory unit is called __________ The Control signals are generated by h/w using conventional logic design techniques, the control unit said to be _________

19. 20.

T N

W U
-oOo-

R O

D L

www.jntuworld.com

www.jntuworld.com

Code No: 07A4EC13 Set No. 3 JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD II B.Tech. II Sem., I Mid-Term Examinations, March 2010 COMPUTER ORGANIZATION Objective Exam Name: ______________________________ Hall Ticket No. A I 1. Choose the correct alternative: Stack follows the __________ operation a) L I F O b) F I F O [ c) S J F d) none ]

Answer All Questions. All Questions Carry Equal Marks.Time: 20 Min. Marks: 20.

2.

The control unit of computer is designed to go through an instruction cycle that is divided into _______ phases [ a) 1 b) 2 c) 3 d) 4 __________ instruction transfer data between processor register and a memory stack. a) push b) pop c) both d) none

3.

4.

Which of the following is shift instruction a) RORC b) CALL C) SKP

5.

The large variety of addressing modes in CISC typically from 5 to _______ modes a) 10 b) 15 c) 18 d) 20

6.

The transfer of information from a remoty word to the outside environment is called a ________ operation. [ ] a) Read b) write c) both d) none There are ___________ different logical operations that can be performed with 2 binary variables [ ] a) 2 b) 4 c) 8 d) 16 The solution to any problem that is stated by a finite number of well defined procedural steps is _________ [ ] a) algorithm b) flowchart c) coding d) instruction _________ are methods for dividing numbers a) comparison b) non restoring c) both The operation of deletion in called ___________ a) push b) pop c) both d) none [ d) none [ ] ]

7.

T N

W U
d) SETC

R O

D L

8.

9.

10.

Cont.2

www.jntuworld.com

www.jntuworld.com

Code No: II 11. 12. 13. 14. 15. 16.

07A4EC13

:2:

Set No. 3

Fill in the blanks: The h/w method just described is called the __________method The register that holds the address for the stack is called a _____________ The last instruction of every subroutine, commonly called ____________ subroutine. A control unit whose binary control variables are stored in memory is called __________ Internal interrupts also called __________

A micro operation is an elementary operation performed on the information stored in __________ Register The register that holds an address for the memory unit is called __________

17. 18.

The Control signals are generated by h/w using conventional logic design techniques, the control unit said to be _________ The data register sometimes called ___________ register

19. 20.

The convenient method for presenting algorithm is a _________

T N

W U
-oOo-

R O

D L

www.jntuworld.com

www.jntuworld.com

Code No: 07A4EC13 Set No. 4 JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD II B.Tech. II Sem., I Mid-Term Examinations, March 2010 COMPUTER ORGANIZATION Objective Exam Name: ______________________________ Hall Ticket No. A I 1. Choose the correct alternative: __________ instruction transfer data between processor register and a memory stack. a) push b) pop c) both d) none [ ]

Answer All Questions. All Questions Carry Equal Marks.Time: 20 Min. Marks: 20.

2.

Which of the following is shift instruction a) RORC b) CALL C) SKP

d) SETC

3.

The large variety of addressing modes in CISC typically from 5 to _______ modes a) 10 b) 15 c) 18 d) 20

4.

The transfer of information from a remoty word to the outside environment is called a ________ operation. [ ] a) Read b) write c) both d) none There are ___________ different logical operations that can be performed with 2 binary variables [ ] a) 2 b) 4 c) 8 d) 16 The solution to any problem that is stated by a finite number of well defined procedural steps is _________ [ ] a) algorithm b) flowchart c) coding d) instruction _________ are methods for dividing numbers a) comparison b) non restoring c) both The operation of deletion in called ___________ a) push b) pop c) both d) none Stack follows the __________ operation a) L I F O b) F I F O

5.

6.

7.

T N

W U
c) S J F

R O
d) none

D L

8.

9.

[ d) none

10.

The control unit of computer is designed to go through an instruction cycle that is divided into _______ phases [ a) 1 b) 2 c) 3 d) 4 Cont.2

www.jntuworld.com

www.jntuworld.com

Code No: II 11. 12. 13. 14.

07A4EC13

:2:

Set No. 4

Fill in the blanks: The last instruction of every subroutine, commonly called ____________ subroutine. A control unit whose binary control variables are stored in memory is called __________ Internal interrupts also called __________ A micro operation is an elementary operation performed on the information stored in __________ Register The register that holds an address for the memory unit is called __________

15. 16.

The Control signals are generated by h/w using conventional logic design techniques, the control unit said to be _________ The data register sometimes called ___________ register

17. 18. 19. 20.

The convenient method for presenting algorithm is a _________

The h/w method just described is called the __________method

The register that holds the address for the stack is called a _____________

T N

W U
-oOo-

R O

D L

www.jntuworld.com

You might also like