You are on page 1of 12

CS/APR 2011/CSC159/428/ITC150

CONFIDENTIAL

UNIVERSITI TEKNOLOGI MARA


FINAL EXAMINATION

COURSE

COMPUTER ORGANIZATION / COMPUTER


ORGANISATION

COURSE CODE

CSC159/428/ITC150

EXAMINATION

APRIL 2011

TIME

3 HOURS

INSTRUCTIONS TO CANDIDATES
1.

This question paper consists of three (3) parts : PART A (25 Questions)
PART B (7 Questions)
PART C (3 Questions)

2.

Answer ALL questions from all three (3) parts :


i)
ii)

Answer PART A in the Objective Answer Sheet.


Answer PART B and C in the Answer Booklet. Start each answer on a new page.

3.

Do not bring any material into the examination room unless permission is given by the
invigilator.

4.

Please check to make sure that this examination pack consists of:
i)
ii)
iii)

the Question Paper


an Answer Booklet - provided by the Faculty
an Objective Answer Sheet - provided by the Faculty

DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO


This examination paper consists of 11 printed pages
Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL

CS/APR 2011/CSC159/428/ITC150

PART A (25 MARKS)

has come out with a concept known as stored - program concept.


A.
B.
C.
D.
2.

Assembly language is the


generation of programming language that uses
abbreviations or mnemonic in its instructions.
A.
B.
C.
D.

3.

John Von Neumann


John Maunchly
J. Eckert
Baron Wilhelm

first
second
third
fourth

Which of the following are TRUE about the first generation of computer?
I. The computers were powered by thousand of transistors.
II. The computer's memory was stored on magnetic storage devices, primarily
magnetic tapes and magnetic drums.
III. Most of the data were entered into the computers on punched cards.
IV. Output consisted of cards or paper.
A.
B.
C.
D.

4.

I, II, III
Ill, IV
II, III, IV
I, II, III, IV

Determine the output of C if the input for A is 1 and B is 0.


A
B
A.
B.
C.
D.

5.

0
1
3
4

What is the decimal equivalent of the following binary value 10101.1012?


A.
B.
C.
D.

21.625
21.6525
23.625
23.6525

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL

CS/APR 2011/CSC159/428/ITC150

PART A (25 MARKS)

has come out with a concept known as stored - program concept.


A.
B.
C.
D.
2.

Assembly language is the


generation of programming language that uses
abbreviations or mnemonic in its instructions.
A.
B.
C.
D.

3.

John Von Neumann


John Maunchly
J. Eckert
Baron Wilhelm

first
second
third
fourth

Which of the following are TRUE about the first generation of computer?
I. The computers were powered by thousand of transistors.
II. The computer's memory was stored on magnetic storage devices, primarily
magnetic tapes and magnetic drums.
III. Most of the data were entered into the computers on punched cards.
IV. Output consisted of cards or paper.
A.
B.
C.
D.

4.

I, II, III
Ill, IV
II, III, IV
I, II, III, IV

Determine the output of C if the input for A is 1 and B is 0.


A
B
A.
B.
C.
D.

5.

0
1
3
4

What is the decimal equivalent of the following binary value 10101.1012?


A.
B.
C.
D.

21.625
21.6525
23.625
23.6525

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL
6.

01001010
11001010
10110110
10110101

The function of
a computer system.
A.
B.
C.
D.

arithmetic logic unit


control unit
random access memory
microprocessor

Hold binary value temporarily for storage, manipulation or simple calculation.


Permanent storage location within CPU
Manipulated directly by control unit during execution of instruction.
Carries out arithmetic and logic operations.

9.

holds the address of a memory location.


A.
B.
C.
D.

MDR
MBR
MAR
IR

The memory capacity of a 25-bit memory address register is


A.
B.
C.
D.

11.

is to interpret and control the execution of instructions in

Which of the following statement is FALSE about register?


A.
B.
C.
D.

10.

CS/APR 2011/CSC159/428/ITC150

How do you represent -7410 as an 8-bit signed number?

A.
B.
C.
D.
7.

64MB
124 MB
32MB
16MB

What type is the addressing mode of the following instruction?


MOV D L ,

A.
B.
C.
D.

2Oh

Register addressing mode


Immediate addressing mode
Base addressing mode
Memory addressing mode

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL
12.

is volatile, requires more chips and slower to access than


A.
B.
C.
D.

Static ROM, dynamic ROM


Static RAM, dynamic ROM
Dynamic ROM, static ROM
Dynamic RAM, static RAM

What is the measurement used to indicate the raw power of microprocessor?


A.
B.
C.
D.

16.

data to be transferred to memory


data that has been transferred from memory
the address of memory location
an instruction that has been transferred from memory

13.

15.

CS/APR 2011/CSC159/428/ITC150

The memory address register is used to hold


A.
B.
C.
D.

14.

Gigabyte
Hertz
Bytes
MIPS (Millions of Instructions per second)

Identify the correct sequence in FETCH operation.


I.
II.
III.
IV.

Address decoder will get the absolute address.


Program counter will generate the relevant address.
Instruction is transferred from memory location to memory data register.
Memory address register will receive address through address bus.

A.
B.
C.
D.

Ill, I, II, IV
II, IV, I, III
Ill, IV, I, II
II, IV, III, I

Which of the following is TRUE about serial bus?


I. A bus in which there is an individual line for each bit of data, address and control
being used.
II. A bus in which data is transferred sequentially, one bit at a time using a single data
line pair.
III. High throughput
IV. Low throughput
A.
B.
C.
D.

I, III
I, II, III
II, III
II, IV

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL
17.

19.

I.
II.
III.
IV.

Recognizes messages addressed to it from the CPU


Provides buffer
Control the disk drive
Produce Interrupts

A.
B.
C.
D.

I,
I,
I,
I,

II, IV
III, IV
II, III
II, III, IV

A method by which the computer is able to conceptually separate the addresses used
in a program from the addresses that actually identify physical locations in memory is
called
.
static memory
virtual memory
primary memory
cache memory

Which of the following pointers is used to store the address of a stack?


A.
B.
C.
D.

21.

Accelerated Graphics Port (AGP)


Instruction Set Architecture (ISA)
Peripheral Component Interconnect (PCI)
Small Computer System Interface (SCSI)

Which of the following are the functions of I/O modules?

A.
B.
C.
D.
20.

CS/APR 2011/CSC159/428/ITC150

Which of the following bus is NOT a system bus?


A.
B.
C.
D.

18.

Instruction Pointer
Index Pointer
Stack Pointer
Program Pointer

Which of the following is NOT an example of interrupt?


A.
B.
C.
D.

User command from keyboard


Execution of an illegal instruction
Read data from memory
Power failure

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL
22.

interrupt is an interrupt that never disabled and will always be


acknowledged and accepted.
A.
B.
C.
D.

23.

Symmetrical multiprocessing
Master slave multiprocessing
Channel architecture
I/O architecture

It is called
processing when many instructions are dispatched and
executed in parallel in multiple execution units.
A.
B.
C.
D.

25.

Vectored
Maskable
Non - maskable
None of the above

, in which each CPU has identical access to Operating System (OS) and
to all system resources.
A.
B.
C.
D.

24.

CS/APR 2011/CSC159/428/ITC150

superscalar
channel
virtual
scalar

"This method is faster, since writes to memory are made only when a cache line is
actually replaced, but more care is required in the design to ensure that there are no
circumstances under which data loss could occur."
This statement refers to the
A.
B.
C.
D.

method.

write back
write through
cache controller
locality of reference

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL

CS/APR 2011/CSC159/428/ITC150

PART B (50 MARKS)

QUESTION 1

Briefly describe the characteristics of


a) Vacuum tubes computer
b) Transistors computer
(4 marks)
QUESTION 2

a) Briefly explain the two types of addresses used in virtual storage.


(4 marks)
b) Given a computer's memory specifications is 128KB RAM. Calculate:
i) Memory capacity in byte
ii) Address size
iii) Largest address
(6 marks)

QUESTION 3

a) Convert the following octal numbers to binary and hexadecimal.


Octal
75114
5213

Binary

Hexadecimal

(4 marks)
b) Perform the following arithmetic operations. Show your work.
i) C421 16 -AA88 16
ii) IIIOOOI2-OIIHOOO2
(4 marks)

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CS/APR 2011/CSC159/428/ITC150

CONFIDENTIAL
QUESTION 4

a) Convert 132.510 to floating point numbers in IEEE single precision format. Give the
answer in hexadecimal.
(5 marks)
b) What is the decimal number equivalent to the following IEEE single precision floating
point given in hexadecimal 40B1000016?
(5 marks)

QUESTION 5

a) Given the following set of data:


AX =
BX =
CX =
DX =
PC =

7723
3A12
6666
1982
45FF

BYTE
X
0

i)

X
0

X
0

AX
1

BX
0

CX
1

DX
0

PC
1

Build a stack following the sequences of AX, DX, BX, PC and CX starting from
address FFFA.
(4 marks)

ii) Continue building the stack when the following instructions are encountered.
POP BX
POP AX
MOV DX, 3004
PUSH DX

(3 marks)

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL

CS/APR 2011/CSC159/428/ITC150

QUESTION 6

a) List TWO (2) types of interrupt.


(2 marks)
b) Differentiate between interrupt and polling.
(4 marks)
QUESTION 7

a) What are the main features that are used to differentiate a RISC design from a CISC
design?
(3 marks)
b) Define memory interleaving.
(2 marks)

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL

10

CS/APR 2011/CSC159/428/ITC150

PART C (25 MARKS)

QUESTION 1

Name the type of addressing mode for each of the following instructions
a)
i)

SUB AX,

ii) MOV AX,

24h
[BX]

iii) ADD CX, BX

(3 marks)
b) Identify the error of the syntax in following instructions (if any).
i)

MUL AX,

ii)

SAL BX,'

[BL]

(2 marks)
QUESTION 2

a) Write a program fragment in assembly language according to the following arithmetic


formula (assume NUMBER is declared as a 16 bit memory operand):

NUMBER =

(3 *

(15 + 2 ) )

AND 1 8 0

(6 marks)
b) By using SHIFT instructions, write the assembly language instructions to:

i)

Multiply the content of AX register with 32.

ii) Divide the content of BX register by 8.


(4 marks)

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL

11

CS/APR 2011/CSC159/428/ITC150

QUESTION 3

MOV AX, 25ABh


MOV BX, OFABCh
XCHG BH, AL
MOV CL, 2
ROL AL, CL
JC NEXT
DEC BX
JMP STOP
NEXT : INC AX
SHL AL, 1
STOP : INT 21h

Trace the above program segment and show the contents of the register AX, BX, CX and
Carry flag involved after each instruction is executed. Give your answer in hexadecimal.
(10 marks)

END OF QUESTION PAPER

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

You might also like