0% found this document useful (0 votes)
15 views10 pages

Computer Architecture -Tutorial 1-1

The document consists of tutorial exercises for a Computer Architecture course at FOMIC Polytechnic University, covering various topics such as types of computers, computer generations, architecture principles, memory types, and data transmission methods. Each exercise includes multiple-choice questions aimed at assessing students' understanding of key concepts in computer architecture and engineering. The exercises are structured to facilitate learning and reinforce knowledge in software engineering.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views10 pages

Computer Architecture -Tutorial 1-1

The document consists of tutorial exercises for a Computer Architecture course at FOMIC Polytechnic University, covering various topics such as types of computers, computer generations, architecture principles, memory types, and data transmission methods. Each exercise includes multiple-choice questions aimed at assessing students' understanding of key concepts in computer architecture and engineering. The exercises are structured to facilitate learning and reinforce knowledge in software engineering.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

FOMIC POLYTECHNIC UNIVERSITY

SOFTWARE ENGINEERING
Computer Architecture HND2
Course Instructor: Mr John NKENGAFAC
TUTORIAL 1

EXERCISE 1
1. Identify the primary characteristic that distinguishes a general-purpose computer from a special-
purpose computer.
A) Ability to process analog signals
B) Capability to perform multiple tasks
C) Size and physical dimensions
D) Brand and model specifications
2. Which type of computer operates using binary digits (0s and 1s) and is known for its high accuracy?
A) Analog Computer
B) Hybrid Computer
C) Digital Computer
D) Special Purpose Computer
3. In terms of size classification, which computer type is characterized by being the largest and most
powerful?
A) Mainframe Computer
B) Micro Computer
C) Mini Computer
D) Super Computer
4. Supercomputers are primarily utilized in which of the following fields?
A) Personal computing tasks
B) General office applications
C) Scientific simulations and mathematical computations
D) Graphic designing and multimedia production
5. Which of the following statements accurately describes mainframe computers?
A) They are designed for single-user access.
B) They are less powerful than mini computers.
C) They can support hundreds of users simultaneously.
D) They are primarily used for personal tasks.
6. What differentiates microcomputers from mini computers in terms of user access?
A) Microcomputers can serve multiple users at once.
B) Mini computers are designed for single-user access.

Page 1 of 10
C) Microcomputers are typically used in network servers.
D) Mini computers can support multiple users simultaneously.
7. Identify the correct statement about the IBM PC.
A) It was the first personal computer developed by Apple.
B) It operates solely on Linux operating systems.
C) It was introduced in 1981 by IBM Corporation.
D) It is not compatible with any other PCs.
8. In terms of working principle, how do analog computers function?
A) By processing discrete data using binary digits
B) By measuring continuous data through physical quantities
C) By converting analog signals to digital format for processing
D) By executing multiple tasks simultaneously
9. Which type of computer is specifically designed to handle both analog and digital data?
A) Digital Computer
B) Hybrid Computer
C) Mainframe Computer
D) Micro Computer
10. Identify the main advantage of using a mini computer over a micro computer in a business
environment.
A) Lower cost compared to micro computers.
B) More powerful processing capabilities suitable for multiple users.
C) Smaller physical size and portability.
D) Exclusive use for personal tasks only.

Page 2 of 10
EXERCISE 2

1. In which generation of computers did vacuum tubes primarily serve as the main technology?
A) First Generation
B) Second Generation
C) Third Generation
D) Fourth Generation
2. Transistors replaced vacuum tubes in which generation of computers?
A) First Generation
B) Second Generation
C) Third Generation
D) Fourth Generation
3. Which generation of computers is characterized by the use of integrated circuits?
A) First Generation
B) Second Generation
C) Third Generation
D) Fourth Generation
4. What technological advancement is primarily associated with the fourth generation of computers?
A) Vacuum tubes
B) Transistors
C) Microprocessors
D) Magnetic core memory
5. During which generation did computers become significantly smaller and more affordable for
personal use?
A) First Generation
B) Second Generation
C) Third Generation
D) Fourth Generation
6. Identify the main feature that distinguishes fifth-generation computers from previous generations.
A) Use of microprocessors
B) Development of artificial intelligence
C) Utilization of transistors
D) Introduction of integrated circuits
7. Which generation of computers primarily utilized magnetic tape and punch cards for input and
storage?
A) First Generation
B) Second Generation
C) Third Generation
D) Fourth Generation
8. In the context of computer generations, what does the term "artificial intelligence" refer to in fifth-
generation computers?
A) The ability to perform calculations faster than human beings.
B) The capability to learn and adapt through algorithms.
C) The use of binary code for processing data.
D) The reliance on physical components like transistors and circuits.
9. Which generation introduced personal computers that were affordable for individual users?
A) First Generation
Page 3 of 10
B) Second Generation
C) Third Generation
D) Fourth Generation
10. What was a significant limitation of first-generation computers that utilized vacuum tubes?
A) High energy consumption and heat production
B) Limited processing power compared to modern standards
C) Inability to connect to networks
D) Use of integrated circuits

11. Identify the primary component that allowed third-generation computers to be more reliable than
their predecessors.
A) Vacuum tubes
B) Integrated circuits
C) Magnetic tapes
D) Punch cards
12. Which technology is a hallmark of fourth-generation computing, enabling complex calculations at
high speeds?
A) Transistors
B) Microprocessors
C) Vacuum tubes
D) Magnetic core memory
13. What is the primary focus of research and development in fifth-generation computing?
A) Increasing processing speed
B) Enhancing graphical user interfaces
C) Achieving human-like reasoning capabilities
D) Reducing physical size and weight

Page 4 of 10
EXERCISE 3
1. Which architecture is characterized by a single memory space for both data and instructions?
A) Harvard Architecture
B) Von-Neumann Architecture
C) RISC Architecture
D) CISC Architecture
2. In the context of computer architecture, what does the term 'bus' refer to?
A) An input device
B) A storage unit
C) A communication system that transfers data between components
D) A type of software
Answer: C) A communication system that transfers data between components
3. What is the primary function of the Memory Address Register (MAR)?
A) To store data temporarily
B) To hold the address of the next instruction to be executed
C) To store the memory locations of instructions to be fetched or stored
D) To execute arithmetic operations
4. Which component of the CPU is responsible for performing arithmetic and logical operations?
A) Control Unit (CU)
B) Memory Data Register (MDR)
C) Arithmetic and Logic Unit (ALU)
D) Program Counter (PC)
5. What advantage does Harvard architecture provide over Von-Neumann architecture?
A) Lower cost of implementation
B) Simultaneous access to data and instructions
C) Simpler design
D) Greater flexibility in memory usage
6. Which type of software is essential for a computer system to operate?
A) Application Software
B) Utility Software
C) System Software
D) Firmware
7. What is a key feature of fixed instruction length in Harvard architecture?
A) It allows for variable instruction sizes.
B) It simplifies instruction fetching and processing.
C) It increases memory requirements.
D) It limits parallel processing capabilities.

Page 5 of 10
8. Which operating system is known for its open-source nature, allowing modifications by users?
A) Microsoft Windows
B) macOS
C) Linux
D) Android OS
9. What role does the Control Unit (CU) play within the CPU?
A) It performs arithmetic calculations.
B) It fetches instructions from memory.
C) It directs control signals and manages data flow.
D) It stores temporary data during processing.
10. How does Harvard architecture improve performance in real-time applications?
A) By using a single bus system for all operations.
B) By allowing simultaneous access to instructions and data.
C) By employing variable instruction lengths.
D) By simplifying the overall design of the CPU.
11. Which register temporarily holds data fetched from memory before it is processed by the CPU?
A) Current Instruction Register (CIR)
B) Memory Data Register (MDR)
C) Instruction Buffer Register (IBR)
D) Program Counter (PC)
12. What is one disadvantage of using Harvard architecture compared to Von-Neumann
architecture?
A) Increased speed in processing instructions.
B) Higher complexity and manufacturing costs.
C) Better security against buffer overflow attacks.
D) More efficient memory usage.
13. Which component in a computer system is primarily responsible for managing hardware
resources?
A) Application Software
B) System Software
C) Utility Software
D) Firmware
14. What does the term 'embedded systems' typically refer to in relation to computer architecture?
A) Systems designed for general-purpose computing tasks.
B) Specialized computing systems integrated into larger devices.
C) Systems that require complex user interfaces.
D) Systems that operate without any software support.

Page 6 of 10
15. In which type of computer architecture are programs stored in separate memory from data,
allowing faster access?
A) Von-Neumann Architecture
B) Harvard Architecture
C) RISC Architecture
D) Microcontroller Architecture
16. What is one characteristic that distinguishes application software from system software?
A) Application software runs independently of system software.
B) System software performs specific tasks requested by users.
C) Application software interacts directly with hardware components.
D) System software is essential for running application software on a computer.
17. Which type of bus carries addresses rather than actual data within a computer architecture?
A) Data Bus
B) Control Bus
C) Address Bus
D) Instruction Bus
18. What is a primary function of an operating system in a computer system?
A ) To perform calculations
B ) To manage hardware resources
C ) To store user files
D ) To provide internet connectivity
19. Which operating system was developed by Apple Inc. for Macintosh computers?
A ) Windows
B ) Linux
C ) macOS
D ) Unix

Page 7 of 10
EXERCISE 4

1. Identify the basic unit of memory in a computer.


A) Byte
B) Bit
C) Word
D) Register
2. How many bits are there in one byte?
A) 4
B) 8
C) 16
D) 32
3. Which type of memory is characterized by being volatile?
A) ROM
B) Flash Memory
C) RAM
D) Magnetic Disks
4. What is the primary function of cache memory?
A) Long-term storage of data
B) Temporary storage for frequently accessed data
C) Backup data storage
D) Storing system firmware
5. In terms of access time, which memory type is the fastest?
A) Cache Memory
B) RAM
C) ROM
D) Magnetic Tape
6. What distinguishes DRAM from SRAM?
A) DRAM is faster than SRAM.
B) SRAM retains data as long as power is supplied, while DRAM requires periodic refreshing.
C) DRAM uses more transistors per bit than SRAM.
D) SRAM is non-volatile, whereas DRAM is volatile.
7. Which of the following describes the characteristics of secondary memory?
A) High speed and low capacity
B) Non-volatile and high capacity
C) Volatile and expensive
D) Direct access and temporary storage
8. What type of cache memory is embedded directly in the CPU?
A) L2 Cache
B) L3 Cache
C) L1 Cache
D) External Cache
9. Identify the correct sequence of memory hierarchy from fastest to slowest.
A) Registers → Cache → RAM → Secondary Memory
B) RAM → Registers → Cache → Secondary Memory
C) Secondary Memory → RAM → Cache → Registers
D) Cache → Secondary Memory → RAM → Registers
10. Which type of ROM can be erased using ultraviolet light?
A) PROM
Page 8 of 10
B) EEPROM
C) EPROM
D) Flash Memory
11. What is the primary limitation of cache memory?
A) High cost and limited capacity
B) Slow access speed
C) Non-volatile nature
D) Inability to store temporary data
12. How does magnetic tape store data?
A) Random access
B) Sequential access
C) Direct access
D) Parallel access
13. Which characteristic defines a read-only memory (ROM)?
A) Volatile storage
B) Can be written and erased multiple times
C) Permanent storage that cannot be easily modified
D) Fast access time compared to RAM
14. What type of memory typically has a size range from 512KB to 64GB?
A) ROM
B) Cache Memory
C) Secondary Memory
D) RAM
15. In a multicore processor, how is L3 cache utilized?
A) Each core has its own L3 cache.
B) All cores share a common L3 cache.
C) L3 cache is not used in multicore processors.
D) L3 cache only serves the main memory directly.

Page 9 of 10
EXERICSE 5
1. Which of the following best describes the role of the sender in data transmission?
A) The device that receives the data.
B) The device that initiates the transmission of data.
C) The medium through which data is transmitted.
D) The set of rules governing data format and timing.
2. In the context of data transmission, what does 'full duplex' imply?
A) Data can only flow in one direction.
B) Data can flow in both directions, but not simultaneously.
C) Data can flow in both directions simultaneously.
D) Data is transmitted using multiple channels at once.
3. What distinguishes synchronous transmission from asynchronous transmission?
A) Synchronous transmission uses start and stop bits, while asynchronous does not.
B) Synchronous transmission allows for idle time between bytes, while asynchronous does not.
C) Synchronous transmission combines bits into longer frames without gaps, while
asynchronous does not.
D) Synchronous transmission is less efficient than asynchronous due to overhead bits.
4. Which type of data transmission requires multiple wires for sending and receiving data?
A) Serial Transmission
B) Asynchronous Transmission
C) Parallel Transmission
D) Synchronous Transmission
5. What is a key disadvantage of serial transmission compared to parallel transmission?
A) It requires more wires for communication.
B) It is slower as bits are transmitted one at a time.
C) It is more expensive due to multiple connections.
D) It cannot maintain data integrity over long distances.
6. How does a start bit function in asynchronous transmission?
A) It indicates the end of a byte of data.
B) It alerts the receiver to the beginning of a new byte of data.
C) It serves as an error-checking mechanism during transmission.
D) It synchronizes the sender and receiver clocks.
7. What defines a half-duplex communication system?
A) Data flows in one direction only at a time.
B) Data can flow in both directions simultaneously.
C) Data can only be received, not sent back.
D) Data can be sent and received, but only one direction at a time.
8. In terms of cost efficiency, which type of transmission is generally cheaper?
A) Serial Transmission
B) Parallel Transmission
C) Synchronous Transmission
D) Asynchronous Transmission
9. What is the formula for calculating Data Transfer Rate (DTR)?
A) DTR = Time (seconds) / Amount of data transmitted
B) DTR = Amount of data transmitted / Time (seconds)
C) DTR = Amount of data transmitted + Time (seconds)
D) DTR = Time (seconds) + Amount of data transmitted
10. Which factor does NOT influence the Data Transfer Rate (DTR)?
A) Latency
B) Transmission media
C) Number of devices connected to the network
D) Size of the data being transferred

Page 10 of 10

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy