CA QR Ans Key 23 24 Even Sem
CA QR Ans Key 23 24 Even Sem
(PART A – 2 Marks)
UNIT - I
Knowledge
Difficulty
Q. No Questions CO Level
Level (1-5)
(Blooms)
What are the five classic components of a computer?
There are five basic components which include:
Input Unit.
Output Unit. CO1 K2 2
QA101*
Memory Unit.
Control Unit.
Arithmetical and Logical Unit.
1
= 𝐹𝑟𝑎𝑐𝑡𝑖𝑜𝑛𝑒𝑛ℎ𝑎𝑛𝑐𝑒𝑑
(1−𝑓𝑟𝑎𝑐𝑡𝑖𝑜𝑛𝑒𝑛ℎ𝑎𝑛𝑐𝑒𝑑 )+ )
𝑆𝑝𝑒𝑒𝑑𝑢𝑝𝑒𝑛ℎ𝑎𝑛𝑐𝑒𝑑
Write the formula for CPU execution time for a program.
CO1 K3 3
QA103*
CO2 K2 2
QA105*
Ex. MOVE #20 , A
The value 20 is copied into register A.
The special symbol # indicates, it is direct value.
UNIT - II
Knowledge
Difficulty
Q. No Questions CO Level
Level (1-5)
(Blooms)
Draw the circuit diagram for 4 bit full adder.
Full adder:
CO3 K2 2
QA201*
Write the overflow conditions for addition and subtraction
Overflow cannot occur in addition (subtraction), if the operands have different respective. Identical
signs.
Operation Operand A Operand B Result Indicating overflow CO3 K2 3
QA202*
A+B >=0 >=0 <0
A+B <0 <0 >=0
A-B >=0 <0 <0
A-B <0 >=0 >=0
CO3 K2 3
QA204*
UNIT - III
Knowledge
Difficulty
Q. No Questions CO Level
Level (1-5)
(Blooms)
Define data path.
Datapath is a unit used to operate on or hold data within processor. Its elements include the CO4 K2 2
QA301*
instruction and data memories, the register file, the ALU, and adders
UNIT - IV
Knowledge
Difficulty
Q. No Questions CO Level
Level (1-5)
(Blooms)
List the types of parallelism.
Bit-level parallelism
Instruction-level parallelism CO5 K2 2
QA401*
Task Parallelism
Data-level parallelism (DLP)
Definemulticoremicroprocessor
A multi-core processor is a processor chip that has more than one processor on a single chip CO5 K2 2
QA402*
contained in a single package.
What ismultithreading?
A mechanism by which the instruction streams is divided into several smaller Streams (threads) CO5 K2 2
QA403*
and can be executed in parallel is called multithreading.
What is PES’?
Processing elements (PEs) : Every processing element consists of ALU, local memory and its CO5 K2 2
QA404*
registers for storage of distributed data. This PEs has been interconnected via an interconnection
network.
UNIT - V
Knowledge
Difficulty
Q. No Questions CO Level
Level (1-5)
(Blooms)
Consider a cache with 64 blocks and a block size of 16 bytes. To what block number does
byte address 1200 map?
Top of FormBottom of FormTop of FormBlock size =16
Total No of Block=64
Memory block Number/Byte addressBlock Size =1206/16 =75. CO6 K2 4
QA501* Now we have to find a cache block number related to memory block number.
So In Direct Mapped cache,
Cache block Number=Memory block Number mod(Total Number of a block in cache)
=75mod64 =11.
UNIT - I
Knowledge
Difficulty
Q. No Questions CO Level
Level (1-5)
(Blooms)
Explain the various components of the Computer System with a neat diagram
Functional units of Computer System(7 )
Explanation(6 )
The computer is a combination of hardware and software. Hardware is the physical
component of a computer while the software is the set of programs or instructions. Both
hardware and software together make the computer system function. Every task given to a
computer follows an Input- Process- Output Cycle (IPO cycle).
CO1 K2 3
QB101 (a)*
A Computer has five functional independent units like Input Unit, Memory Unit,
Arithmetic & Logic Unit, Output Unit, and Control Unit.
Input Unit :-
CO2 K2 3
QB101 (b)* Computers take coded information via input unit. The most famous input device is
keyboard. Whenever we press any key it is automatically being translated to corresponding
binary code & transmitted over a cable to memory or proccessor.
Memory Unit :-
It stores programs as well as data and there are two types- Primary and Secondary Memory
Primary Memory is quite fast which works at electronic speed. Programs should be stored
in memory before getting executed. Random Access Memory are those memory in which
location can be accessed in a shorter period of time after specifying the address. Primary
memory is essential but expensive so we went for secondary memory which is quite
cheaper. It is used when large amount of data & programs are needed to store, particularly
the information that we dont access very frequently. Ex- Magnetic Disks, Tapes
All the arithmetic & Logical operations are performed by ALU and this operation are
initiated once the operands are brought into the processor.
Example:
Add LOCA, R0
This instruction adds the operand at memory location LOCA to the operand which
will be present in the Register R0.
The above mentioned example can be written as follows:
Load LOCA, R1
Add R1, R0
First instruction sends the contents of the memory location LOCA into processor
Register R0, and meanwhile the second instruction adds the contents of Register
R1 and R0 and places the output in the Register R1.
The memory and the processor are are swapped and are started by sending the
address of the memory location to be accessed to the memory unit and issuing the
appropriate control signals.
The data is then transferred to or from the memory.
Analysing how processor and memory are connected :–
Processors have various registers to perform various functions :-
Program Counter :- It contains the memory address of next instruction to be fetched.
Instruction Register:- It holds the instruction which is currently being executed.
MDR :- It facilities communication with memory. It contains the data to be written
into or read out of the addressed location.
MAR :- It holds the address of the location that is to be accessed
There are n general purpose registers that is R0 to Rn-1
Performance :-
Performance means how quickly a program can be excecuted.
Computer organization
In order to get the best performance it is required to design the compiler, machine
instruction set & hardware in a coordinated manner.
Connection B / W Processor & Memory
A PC is set to point to the first instruction of the program. The contents of the PC are
transferred to the MAR and a Read control signal is sent to the memory. The addressed
word is fetched from the location which is mentioned in the MAR and loaded
into MDR. This post thus contains all the important basic operational concepts.
Explain in detail about the performance metrics in computer with examples
Performance Matrix(8)
Example(5)
Performance
“Computer performance is the amount of work accomplished by a computer system”.
Defining Performance
When we say one computer has better performance than another, what do we
mean?
If you were running a program on two different desktop computers, you’d say that
the faster one is the desktop computer that gets the job done first.
If you were running a datacenter that had several servers running jobs
submitted by many users, you’d say that the faster computer was the one that
completed the most jobs during a day.
As an individual computer user, you are interested in reducing response time—the
time between the start and completion of a task—also referred to as execution
time.
Datacenter managers are oft en interested in increasing throughput or bandwidth— the total
amount of work done in a given time. Hence, in most cases, we will need different
performance metrics as well as different sets of applications to benchmark
personal mobile devices, which are more focused on response time, versus servers, which
are more focused on throughput.
Response Time
Response time Also called execution time.
“The total time required for the computer to complete a task”, including disk
accesses, memory accesses, I/O activities, operating system overhead, CPU
execution time, and so on.
Throughput
It is the “number of tasks completed per unit time”.
Throughput Also called bandwidth.
Execution Time
The actual time the CPU spends computing for a specific task.
CPU execution time also called CPU time.
User CPU time : The CPU time spent in a program itself.
System CPU time: The CPU time spent in the operating system performing tasks on behalf
of the program.
Instruction Count: Instruction counts The number of instructions executed by the program.
Instructions :
A segment of code that contains steps that need to be executed by the computer
processor.
Instruction Set :
A list of all the instructions with all the variants, which a processor can execute.
Operation code
Specifies the operation to be performed.
The operation is specified by the binary code.
It is otherwise called Opcode.
According to number of operations, the instructions are classified into some more
types,
1. Load and Store instructions.
2. Arithmetic Instructions.
3. Comparison Instructions.
4. Jump Instructions.
1.Load and Store instructions
LDA - Load the value to Accumulator.
LDB : load the value to register B from operand
LDX – Load the value to Index Register.
STA – Store the Accumulator content to some variable.
STB : store the value from register B to some operand.
STX – Store the Index register content into some variable.
2.Arithmetic Instructions
ADD – Add the operand value with Accumulator and result is stored in Accumulator.
SUB - Subtract the operand value with Accumulator and result is stored in Accumulator.
MUL - Multiply the operand value with Accumulator and result is stored in
Accumulator. DIV - Divide the operand value with Accumulator and result is stored in
Accumulator.
ADDF, SUBF, MULF, DIVF – Floating point arithmetic instructions.
1. Comparison Instructions
COMP : that instruction compares the value in the register A with another variable.
And sets the condition code CC to indicate if the accumulator value is < or =
or >
2. Jump Instructions
JLT : Jump less than
JEQ : Jump equal to
JGT : Jump greater
than
These instructions test the setting of CC and jumps accordingly.
Arithmetic Operations
Operation Description
Operation Description
Operation Description
Operation Description
Logical(7)
Decision Making(6)
Although the first computers operated on full words, it soon became clear that it was CO2 K2 3
QB103 (b)*
useful to operate on fields of bits within a word or even on individual bits.
Examining characters within a word, each of which is stored as 8 bits.
It follows that operations were added to programming languages and instruction set
architectures to simplify, among other things, the packing and unpacking of bits into
words.
These instructions are called logical operations.
Figure shows logical operations in C, Java, and MIPS.
The first class of such operations is called shifts.
They move all the bits in a word to the left or right, filling the emptied bits with 0s.
They move all the bits in a word to the left or right, filling the emptied bits with 0s.
For example, if register $s0 contained.
AND
A logical bit by bit operation with two operands that calculates a 1 only if there is a
1 in both operands.
OR
A logical bit by bit operation with two operands that calculates a 1 if there is a 1in
either operand.
NOT
A logical bit by bit operation with one operand that inverts the bits; that is, it
replaces every 1 with a 0, and every 0 with a 1.
NOR
A logical bit by bit operation with two operands that calculates the NOT of the OR
of the two operands.
That is, it calculates a 1 only if there is a 0 in both operands.
Bitwise operator works on bits and performs bit-by-bit operation. Assume if a = 60
and b = 13; now in binary format they will be as follows −
A = 0011 1100
B = 0000 1101
a &b = 0000 1100
~a = 1100 0011
UNIT - II
Knowledge
Difficulty
Q. No Questions CO Level
Level (1-5)
(Blooms)
Briefly Explain fast adder with propagate and generate function for 4 bit, 16 bit
circuits.
A carry-look ahead adder (CLA) is a type of adder used in digital logic. A carry-look ahead
adder improves speed by reducing the amount of time required to determine carry bits. The
carry-look ahead adder calculates one or more carry bits before the sum, which reduces the
wait time to calculate the result of the larger value bits.
Idea
Try to “predict” Ck earlier than Tc*k
Instead of passing through k stages, compute Ck separately using additional logic.
Operation Mechanism
Carry look ahead depends on two things:
1. Calculating, for each digit position, whether that position is going to propagate a
carry if one comes in from the right.
2. Combining these calculated values to be able to deduce quickly whether, for each
group of digits, that group is going to propagate a carry that comes in from the right. CO3 K2 2
QB201 (a)* CLA – Concept
To reduce the computation time, there are faster ways to add two binary numbers by
using carry look ahead adders.
They work by creating two signals P and G known to be Carry Propagator and
Carry Generator.
The carry propagator is propagated to the next level whereas the carry generator is
used to generate the output carry regardless of input carry.
The block diagram of a 4-bit Carry Look ahead Adder is shown here below
Design Issues
The corresponding Boolean expressions are given here to construct a carry look
ahead added. In the carry-look ahead circuit we need to generate the two signals
carry propagator(P)
and carry generator(G),
Pi = Ai ⊕ Bi
Gi = Ai · Bi
The output sum and carry can be expressed as
Sumi = Pi ⊕ Ci
Ci+1 = Gi + ( Pi · Ci)
Having these we could design the circuit. We can now write the Boolean function for
the carry output of each stage and substitute for each Ci its value from the previous
equations:
C1 = G0 + P0 · C0
C2 = G1 + P1 · C1 = G1 + P1 · G0 + P1 · P0 · C0
C3 = G2 + P2 · C2 = G2 P2 · G1 + P2 · P1 · G0 + P2 · P1 · P0 · C0
C4 = G3 + P3 · C3 = G3 P3 · G2 P3 · P2 · G1 + P3 · P2 · P1 · G0 + P3 · P2 · P1 · P0 · C0
(Or)
Explain in detail about the half adder, full adder and Nbit full adder with a circuit
diagram and also list the advantages and disadvantages.
Half adder( 4)
Half Adder
With the help of half adder, we can design circuits that are capable of performing
simple addition with the help of logic gates.
Let us first take a look at the addition of single bits. 0+0 = 0
0+1 = 1
1+0 = 1
1+1 = 10
These are the least possible single-bit combinations. But the result for 1+1 is 10.
Though this problem can be solved with the help of an EXOR Gate, if you do care
about the output, the sum result must be re-written as a 2-bit output.
Thus the above equations can be written as 0+0 = 00
0+1 = 01
1+0 = 01
1+1 = 10
Here the output ‘1’of ‘10’ becomes the carry-out. The result is shown in a truth- table
below. ‘SUM’ is the normal output and ‘CARRY’ is the carry-out.
CO3 K2 2
QB201 (b)*
INPUTS OUTPUTS
A B SUM CARRY
0 0 0 0
0 1 1 0
1 0 1 0
1 1 0 1
From the equation it is clear that this 1-bit adder can be easily implemented with the
help of EXOR Gate for the output ‘SUM’ and an AND Gate for the carry.
Take a look at the implementation below.
For complex addition, there may be cases when you have to add two 8-bit bytes
together. This can be done only with the help of full-adder logic.
Full Adder
This type of adder is a little more difficult to implement than a half-adder.
The main difference between a half-adder and a full-adder is that the full-
adder hasthree inputs and two outputs.
The first two inputs are A and B and the third input is an input carry
designated asCin.
When a full adder logic is designed we will be able to string eight of them
together to create a byte-wide adder and cascade the carry bit from one adder
to the next.
The output carry is designated as COUT and the normal output is designated
as S. Take a look at the truth-table.
INPUTS OUTPUTS
A B CIN COUT S
0 0 0 0 0
0 0 1 0 1
0 1 0 0 1
0 1 1 1 0
1 0 0 0 1
1 0 1 1 0
1 1 0 1 0
1 1 1 1 1
From the above truth-table, the full adder logic can be implemented.
We can see that the output S is an EX-OR between the input A and the
half-adderSUM output with B and Cin inputs.
We must also note that the Cout will only be true if any of the two inputs out
of thethree are HIGH.
Thus, we can implement a full adder circuit with the help of two half adder
circuits.
N bit full adder(3 )
N bit adder can be shown as following,
Advantages ( 3)
Allows addition of larger binary numbers.
Highly scalable.
Supports addition of numbers with more bits.
Disadvantages (3 )
A = 010111
B = 101100
Initialize:
Product (P) = 000000
Multiplier (A) = 010111
Multiplicand (B) = 101100
Step 1:
A = 010111
B = 101100
P = 000000
Step 2:
1. Since the LSB of A is 1 and the previous bit is 0, subtract B from P: P = P -
B = 000000 - 101100 = 010100
2. Right shift A and P: A = 001011, P = 001010
Step 3:
1. Since the LSB of A is 1 and the previous bit is 1, no operation needed.
2. Right shift A and P: A = 000101, P = 000101
Step 4:
1. Since the LSB of A is 0 and the previous bit is 1, add B to P: P = P + B =
000101 + 101100 = 110001
2. Right shift A and P: A = 000010, P = 011000
Step 5:
1. Since the LSB of A is 1 and the previous bit is 0, subtract B from P: P = P -
B = 011000 - 101100 = 001100
2. Right shift A and P: A = 000001, P = 000110
Step 6:
1. Since the LSB of A is 1 and the previous bit is 1, no operation needed.
2. Right shift A and P: A = 000000, P = 000011
(Or)
Multiply two numbers using Hardware multiplication A=1010 B=1101
Problem Solving(7)
X (1010)₂
Step 2: To begin with multiplication, we consider the corner most digit from
the right side. Taking the digit from the extreme right, first, multiply it with
the extreme right digit of the multiplicand and proceed in the same way
towards the left of the multiplicand.
1101
X 1010
___________
= 0000
Here, as the product of binary digit 0 with 0 and 1 is 0 so place 0s in the first
row.
Step 3: Proceeding the same way for the rest of the digits of the multiplicand
and multiplier, we get
1101
X1010
___________
= 0000
1101X
0000XX
1101XXX
___________
The product obtained in each row by multiplying a digit of the multiplier with
all the digits of the multiplicand is called an intermediate product.
Step 4: To obtain the final product, add up all the numbers obtained till now.
Adding all the intermediate products, we get
1101
X1010
___________
= 0000
1101X
0000XX
+1101XXX
___________
Step 5: Before adding all the numbers, always remember to apply the addition
rule for binary digits i.e.
0+0=0
0+1=1
1+0=1
1 + 1 = 10
For binary addition of 1 with itself, the sum becomes 10 and is written as 0 in
the place and 1 carried to the next digit.
1101
X1010
___________
0000
1101X
0000XX
+1101XXX
___________
10000010
___________
CO3 K3 2
QB203 (a)* Represent the number (1259.125)10 in single and double precision representation.
(Or)
Explain the algorithm and flow chart for floating point multiplication with an
example.
Here, we have discussed an algorithm to multiply two floating point numbers, x and y.
Algorithm:-
1. Convert these numbers in scientific notation, so that we can explicitly represent
hidden 1.
2. Let ‘a’ be the exponent of x and ‘b’ be the exponent of y.
3. Assume resulting exponent c = a+b. It can be adjusted after the next step.
4. Multiply mantissa of x to mantissa of y. Call this result m.
5. If m does not have a single 1 left of radix point, then adjust radix point so it does, and
adjust exponent c to compensate.
6. Add sign bits, mod 2, to get sign of resulting multiplication.
7. Convert back to one byte floating point representation, truncating bits if needed.
CO3 K3 2
QB203 (b)*
Example :-
Suppose you want to multiply following two numbers:
UNIT - III
Knowledge
Difficulty
Q. No Questions CO Level
Level (1-5)
(Blooms)
Draw and explain the function block diagram for the basic MIPS implementation with
necessary multiplexers and control lines
QB301 (a)* Function block diagram(7) CO4 K2 3
(Or)
What is pipelining? Discuss about pipelined datapath and control.
Pipelining(3)
A four-stage pipelined processor divides the execution of instructions into four sequential
stages, allowing multiple instructions to be processed concurrently. The four stages
typically include:
It's important to note that while a four-stage pipeline simplifies the processor design
compared to pipelines with more stages, it may also introduce limitations such as
potentially lower clock speeds due to shorter stage durations and higher susceptibility to
pipeline hazards. Managing these limitations effectively is crucial to maximizing the
benefits of pipelining in four-stage pipeline architecture.
2-STAGE PIPELINED EXECUTION
(Or)
Explain the basic concepts of pipelining.
The basic concepts of pipelining operation involve breaking down the execution of
instructions into smaller, sequential stages to improve processor efficiency. Here's an
overview of how pipelining works:
The first stage of the pipeline is responsible for fetching instructions from memory.
The program counter (PC) is used to determine the address of the next instruction to
be fetched.
The instruction fetched is usually stored in an instruction register.
Instruction Decode (ID):
In this stage, the fetched instruction is decoded to determine its type and operands.
QB302 (b)* The necessary control signals are generated to control subsequent stages of the pipeline CO4 K2 3
based on the instruction type.
Execution (EX):
The final stage of the pipeline is where the results of the instruction execution are
written back to the appropriate registers.
This stage updates the processor's architectural state, such as updating register
values with the result of arithmetic or logic operations.
These stages operate sequentially, with each stage processing a different instruction
concurrently. As one instruction moves from one stage to the next, the next
instruction enters the pipeline, resulting in a continuous flow of instructions through
the pipeline.
Overlap: Instructions are overlapped in time, so while one instruction is being executed,
another instruction can be decoded, and a third instruction can be fetched.
Hazards: Pipelining introduces hazards such as data hazards, structural hazards, and
control hazards, which must be managed to ensure correct execution and maintain
performance efficiency.
Advantages of Pipelining:
Disadvantages of Pipelining:
Pipeline Stall: Pipeline stalls occur when a hazard prevents the smooth progression
of instructions through the pipeline, leading to decreased throughput and
performance. Managing pipeline stalls effectively requires additional hardware
mechanisms, which can increase design complexity.
What is data hazard? How do you overcome it? What are its side effects?
Data Hazard(7)
A data hazard occurs in pipelined processors when there is a dependence between
QB303 (a)* instructions that can potentially lead to incorrect execution or stalls in the pipeline. This CO4 K2 4
dependence arises when an instruction requires data that is produced by a previous
instruction that has not yet completed execution. There are three types of data hazards:
Read after Write (RAW) Hazard: Also known as a data dependence hazard, it
occurs when an instruction reads a register before a prior instruction writes to it.
This can cause the second instruction to use incorrect or outdated data.
Write after Read (WAR) Hazard: This hazard occurs when an instruction writes
to a register before a prior instruction reads from it. While this doesn't affect the
correctness of the program's results, it can cause issues if the order of instructions
affects control flow or interrupts.
Write after Write (WAW) Hazard: This hazard occurs when two instructions
write to the same register in quick succession, potentially overwriting each other's
results.
Forwarding (or data bypassing): Also known as data forwarding, this technique
involves passing data directly from the output of one stage to the input of another
without writing it to memory. By doing this, the processor can provide the required
data to instructions that need it before the data is written back to memory.
Stall (or bubble insertion): This technique involves inserting bubbles (no-
operation instructions) into the pipeline to delay instruction execution until the
required data is available. While effective in resolving hazards, it can decrease
overall throughput and performance.
Side effects(6)
Control Hazard(6)
A control hazard occurs when there is a delay in the availability of a required control signal
for instruction execution in a pipelined processor. This delay can cause a stall in the
pipeline, leading to decreased performance and efficiency.
Explanation(7)
A small memory /buffer, which contains a bit that says whether the branch was recently
taken or not.
A branch predictor tells us whether or not a branch is taken.
Calculates the branch target address.
Using a cache to hold the branch target buffer
Delayed Branch
In MIPS, branches are delayed.
Branch Folding - This means that the instruction immediately following
the branch is always executed, independent of whether the branch
condition is true or false.
When the condition is false, the execution looks like a normal branch.
When the condition is true, a delayed branch first executes the
instruction immediately following the branch in sequential instruction
order before jumping to the specified branch target address.
UNIT - IV
Knowledge
Difficulty
Q. No Questions CO Level
Level (1-5)
(Blooms)
Discuss about SISD, SIMD in detail with suitable diagrams and examples.
QB401 SISD, SIMD(7)
Diagram(3)
CO5 K2 3
(a)*
Explanation(3)
(Or)
QB401 What is hardware multithreading? Compare and contrast Fine grained Multi-
Threading and Coarse grained Multi-Threading CO5 K2 2
(b)* Hardware multi threading (7)
Comparison (6)
Draw and discuss about the Cluster Architecture and its types
QB402
Cluster Architecture(6) CO5 K2 3
(a)* Types(7)
(Or)
QB403 Explain Multi core processors with a suitable diagram and examples.
Multi core processors(7 ) CO4 K2 4
(a)* Diagram ( 3)
Example (3)
(Or)
UNIT - V
Knowledge
Difficulty
Q. No Questions CO Level
Level (1-5)
(Blooms)
QB502 (a)* Discuss the methods used to measure and improve the performance of the cache . CO5 K2 3
Methods and performance(7)
Explanations(6)
(Or)
Explain the virtual memory address translation and TLB with necessary diagram
QB502 (b)* Memory address translation(8) CO5 K2 3
Diagram(5)
QB503 (a)* Describe in detail about programmed Input/ Output with neat diagram. CO6 K2 4
Programmed Input and output(7)
Diagram(6)
(Or)
Explain in detail about interrupts with diagram.
QB503 (b)* Interrupts( 7) CO6 K2 3
Diagram( 6)
UNIT - I
Knowledge
Difficulty
Q. No Questions CO Level
Level (1-5)
(Blooms)
Explain in detail the instructions based address, operations and operations and
QC101
operands in detail. CO2 K3 4
(a)*
Instructions( 5)
Operations(5)
Operand ( 5)
(Or)
Explain the following addressing modes in detail with diagram.
i)Immediate addressing ii)Register Addressing iii)Base or Displacement addressing
QC101 iv)PC-Relative Addressing v)Pseudo Direct Addressing
CO2 K3 4
(b)* Addressing types(7 )
Explanation(5 )
Diagram(3)
UNIT - II
Knowledg Difficulty
Q. No Questions CO e Level Level (1-
(Blooms) 5)
Explain in detail about floating point addition and add the numbers ( 0.510 ) and (-
QC201 0.437510) using binary floating point addition algorithm.
Problem Solving(8) CO3 K3 5
(a)*
Steps for Problem(7)
(Or)
Divide (12)10 by (3)10 using the Restoring and Non- restoring division algorithm with
step by step intermediate results and explain.
QC201 (b)*
Problem Solving(8)
CO3 K3 5
Steps for Problem(7)
UNIT - III
Knowledge
Difficulty
Q. No Questions CO Level
Level (1-5)
(Blooms)
Explain in detail how exceptions are handled in MIPS architecture?
Function block diagram(7)
QC301 (a)* MIPS architecture(8) CO4 K3 3
(Or)
Define pipelined Hazards? List the types and explain the different types of hazards
with example and solutions to the hazards.
QC301 (b)* CO4 K3 4
Pipelining hazard(3)
Different types of pipeline hazards (7)
Examples(5)
UNIT - IV
Knowledge
Difficulty
Q. No Questions CO Level
Level (1-5)
(Blooms)
Explain the different types of processors with neat diagram.
Types of processor (7)
QC401 (a)* CO5 K3 3
diagram (3)
Explanation(5)
(Or)
Explain the four principle approaches to multithreading with necessary diagrams
Types of approaches(8)
QC401 (b)* CO5 K3 4
Diagram(2)
Explanation(5)
UNIT - V
Knowledge
Difficulty
Q. No Questions CO Level
Level (1-5)
(Blooms)
Explain in detail about the bus arbitration techniques.
QC501 (a)* Bus arbitration techniques(8) CO6 K3 4
Explanation(7)
(Or)
Draw the typical block diagram of a DMA controller and explain how it is used for
direct data transfer between memory and peripherals.
QC501 (b) DMA Controller(8) CO6 K3 4
Diagram(2)
Explanation(5)
Applying
K1 Remembering (Knowledge) K2 Understanding (Comprehension) K3
(Application of Knowledge)