Professional Documents
Culture Documents
CONFIDENTIAL
COURSE
COURSE CODE
CSC159/428/ITC150
EXAMINATION
APRIL 2011
TIME
3 HOURS
INSTRUCTIONS TO CANDIDATES
1.
This question paper consists of three (3) parts : PART A (25 Questions)
PART B (7 Questions)
PART C (3 Questions)
2.
3.
Do not bring any material into the examination room unless permission is given by the
invigilator.
4.
Please check to make sure that this examination pack consists of:
i)
ii)
iii)
CONFIDENTIAL
CONFIDENTIAL
CS/APR 2011/CSC159/428/ITC150
3.
first
second
third
fourth
Which of the following are TRUE about the first generation of computer?
I. The computers were powered by thousand of transistors.
II. The computer's memory was stored on magnetic storage devices, primarily
magnetic tapes and magnetic drums.
III. Most of the data were entered into the computers on punched cards.
IV. Output consisted of cards or paper.
A.
B.
C.
D.
4.
I, II, III
Ill, IV
II, III, IV
I, II, III, IV
5.
0
1
3
4
21.625
21.6525
23.625
23.6525
CONFIDENTIAL
CONFIDENTIAL
CS/APR 2011/CSC159/428/ITC150
3.
first
second
third
fourth
Which of the following are TRUE about the first generation of computer?
I. The computers were powered by thousand of transistors.
II. The computer's memory was stored on magnetic storage devices, primarily
magnetic tapes and magnetic drums.
III. Most of the data were entered into the computers on punched cards.
IV. Output consisted of cards or paper.
A.
B.
C.
D.
4.
I, II, III
Ill, IV
II, III, IV
I, II, III, IV
5.
0
1
3
4
21.625
21.6525
23.625
23.6525
CONFIDENTIAL
CONFIDENTIAL
6.
01001010
11001010
10110110
10110101
The function of
a computer system.
A.
B.
C.
D.
9.
MDR
MBR
MAR
IR
11.
10.
CS/APR 2011/CSC159/428/ITC150
A.
B.
C.
D.
7.
64MB
124 MB
32MB
16MB
A.
B.
C.
D.
2Oh
CONFIDENTIAL
CONFIDENTIAL
12.
16.
13.
15.
CS/APR 2011/CSC159/428/ITC150
14.
Gigabyte
Hertz
Bytes
MIPS (Millions of Instructions per second)
A.
B.
C.
D.
Ill, I, II, IV
II, IV, I, III
Ill, IV, I, II
II, IV, III, I
I, III
I, II, III
II, III
II, IV
CONFIDENTIAL
CONFIDENTIAL
17.
19.
I.
II.
III.
IV.
A.
B.
C.
D.
I,
I,
I,
I,
II, IV
III, IV
II, III
II, III, IV
A method by which the computer is able to conceptually separate the addresses used
in a program from the addresses that actually identify physical locations in memory is
called
.
static memory
virtual memory
primary memory
cache memory
21.
A.
B.
C.
D.
20.
CS/APR 2011/CSC159/428/ITC150
18.
Instruction Pointer
Index Pointer
Stack Pointer
Program Pointer
CONFIDENTIAL
CONFIDENTIAL
22.
23.
Symmetrical multiprocessing
Master slave multiprocessing
Channel architecture
I/O architecture
It is called
processing when many instructions are dispatched and
executed in parallel in multiple execution units.
A.
B.
C.
D.
25.
Vectored
Maskable
Non - maskable
None of the above
, in which each CPU has identical access to Operating System (OS) and
to all system resources.
A.
B.
C.
D.
24.
CS/APR 2011/CSC159/428/ITC150
superscalar
channel
virtual
scalar
"This method is faster, since writes to memory are made only when a cache line is
actually replaced, but more care is required in the design to ensure that there are no
circumstances under which data loss could occur."
This statement refers to the
A.
B.
C.
D.
method.
write back
write through
cache controller
locality of reference
CONFIDENTIAL
CONFIDENTIAL
CS/APR 2011/CSC159/428/ITC150
QUESTION 1
QUESTION 3
Binary
Hexadecimal
(4 marks)
b) Perform the following arithmetic operations. Show your work.
i) C421 16 -AA88 16
ii) IIIOOOI2-OIIHOOO2
(4 marks)
CONFIDENTIAL
CS/APR 2011/CSC159/428/ITC150
CONFIDENTIAL
QUESTION 4
a) Convert 132.510 to floating point numbers in IEEE single precision format. Give the
answer in hexadecimal.
(5 marks)
b) What is the decimal number equivalent to the following IEEE single precision floating
point given in hexadecimal 40B1000016?
(5 marks)
QUESTION 5
7723
3A12
6666
1982
45FF
BYTE
X
0
i)
X
0
X
0
AX
1
BX
0
CX
1
DX
0
PC
1
Build a stack following the sequences of AX, DX, BX, PC and CX starting from
address FFFA.
(4 marks)
ii) Continue building the stack when the following instructions are encountered.
POP BX
POP AX
MOV DX, 3004
PUSH DX
(3 marks)
CONFIDENTIAL
CONFIDENTIAL
CS/APR 2011/CSC159/428/ITC150
QUESTION 6
a) What are the main features that are used to differentiate a RISC design from a CISC
design?
(3 marks)
b) Define memory interleaving.
(2 marks)
CONFIDENTIAL
CONFIDENTIAL
10
CS/APR 2011/CSC159/428/ITC150
QUESTION 1
Name the type of addressing mode for each of the following instructions
a)
i)
SUB AX,
24h
[BX]
(3 marks)
b) Identify the error of the syntax in following instructions (if any).
i)
MUL AX,
ii)
SAL BX,'
[BL]
(2 marks)
QUESTION 2
NUMBER =
(3 *
(15 + 2 ) )
AND 1 8 0
(6 marks)
b) By using SHIFT instructions, write the assembly language instructions to:
i)
CONFIDENTIAL
CONFIDENTIAL
11
CS/APR 2011/CSC159/428/ITC150
QUESTION 3
Trace the above program segment and show the contents of the register AX, BX, CX and
Carry flag involved after each instruction is executed. Give your answer in hexadecimal.
(10 marks)
CONFIDENTIAL