CA Model Question Paper 03

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 15

CA MODEL PAPER 3

Answer any four. Each questions carries 2 marks


1.Define Computer Architecture.
Ans: Computer Architecture is the organization of the components
which make up a computer system and the meaning of the operations which
guide its function.

2. Write the symbol and truth table for NAND gate.


Ans

TRUTH TABLE IS SHOWN BELOW:

A B Q
0 0 1
0 1 1
1 0 1
1 1 0

3. What are the three control inputs for registers?


Ans. 1. LD (Load) : The particular register whose LD (load) input is enabled
receives the data from the bus.
2. INR(increment) : When enabled , register contents get
incremented by one.
3.CLR (clear) : When enabled , register contents are erased or
previous contents are cleared .
4. LIST the basic computer registers with their functions .
Ans.
REGI FUNCTIONS
STER
S
AC (Accumulator) This register holds the intermediate storage
of arithmetic and logic data in computer’s
CPU
5. Define cache memory .
Ans: Cache memory is a small, high-speed memory unit located within or very
close to the CPU. Its primary purpose is to temporarily store copies of
frequently accessed or recently accessed data and instructions
from the main memory . The main goal of cache memory is to improve the
overall speed and efficiency of the computer system by reducing the average
time it takes to access data and instructions.
6. State any two characteristics of multiprocessors.
Ans: 1. In multiprocessors organization an overall function can be
partitioned in to a number of tasks that each processors can hand
individually
2. System tasks may be allocated to special purpose processors whose
design is optimized to perform certain types of processing efficiently.

Answer any four questions . Each carries 5 marks.

7. Explain the working of JK flip – flop with a neat diagram.


Ans:
JK flip-flop is a versatile sequential logic device commonly used in digital
circuits for tasks such as data storage, frequency division, and state
machine implementations. Its ability to toggle its state makes it particularly
useful in various
1. Initial State: The flip-flop can be in one of two states: "set" (Q=1,
Q'=0) or "reset" (Q=0, Q'=1). At the beginning, the initial state is
undefined, but it can be set or reset using external inputs.
2. Input: J (set): When J=1, it sets the output to 1.
- K (reset): When K=1, it resets the output to 0.

3. Clock Signal: A clock signal is used to control when the flip-flop


changes its state. The flip-flop can operate in either synchronous or
asynchronous mode.

4. Working:
- Asynchronous Mode In this mode, the flip-flop changes its state
immediately when the inputs J or K change. For example:
- If J=1 and K=0, the flip-flop is set (Q=1, Q'=0).
- If J=0 and K=1, the flip-flop is reset (Q=0, Q'=1).
- If both J and K are 0, the flip-flop retains its current state.
- If both J and K are 1, the flip-flop toggles its state: if it was set, it
resets; if it was reset, it sets.
- Synchronous Mode: In this mode, the flip-flop only changes its state when
a clock signal is applied. The inputs J and K are sampled only at the rising or
falling edge of the clock signal, depending on the specific implementation.

8. Differentiate between RISC and CISC.

CIS RISC
C
Emphasis is on hardware. Emphasis is on software
It include multi-clock complex It includes single-clock, reduced
instructions. instructions only.
Memory-to-memory: ”LOAD” and Register to register: “LOAD” and
“STORE” incorporated in “STORE” are independent
instructions. instructions.
Code size is small but complex Code size is large but simple.
High cycles per second Low cycles per second.

8.Explain DMA controller with a neat diagram with a neat diagram.


A DMA (Direct Memory Access) controller is a specialized hardware device
used in computer systems to facilitate data transfers between peripheral
devices and the main memory (RAM) without involving the CPU. The
primary purpose of a DMA controller is to offload data transfer tasks from
the CPU, thereby improving overall system performance and efficiency.

9. What is ILP? State its limitation.


Ans: instruction – level – parallelism [ILP] is a measure of how many of the
operations in a computer program can be performed
simultaneously the potential overlap among instructions is called instruction
level parallelism.
LIMITATIONS OF ILP ARE GIVER BELOW:
1. An instruction stream needs to be rum on an ideal processor with no
significant limitations.
2. The ideal processor always predicts branches correctly , has no
structural hazards
3. This eliminates all control and name dependencies.
4. Theoretically it is possible for the last dynamically executed
instruction in the program to be scheduled on the first cycle.
11. What is RAID? What are the advantages of using RAID technology
for secondary storage?
Ans: RAID stands for Redundant Array of Independent Disks. It's a technology
used in computer storage to combine multiple physical disks into a single logical
unit. There are several RAID levels, each offering different configurations for
performance, redundancy, and capacity. RAID arrays can provide benefits such as
increased data reliability, improved performance, or a combination of both,
depending on the RAID level used.
ADVANTAGES OF RAID IS GIVEN BELOW:

Using RAID technology for secondary storage offers several advantages:


1. Data Protection: RAID configurations such as RAID 1 (mirroring) or
RAID 6 (striping with double parity) provide redundancy, ensuring that data
remains accessible even if one or more disks fail. This is particularly crucial
for secondary storage, where data backup and
archival are primary concerns.
2. Improved Reliability: By distributing data across multiple disks and
incorporating redundancy, RAID helps minimize the risk of data loss due to
hardware failures. This increased reliability is essential for secondary storage,
where data integrity and long-term retention are paramount.

3. Increased Performance: RAID levels like RAID 5 or RAID 10 (striping


with parity or mirroring) can enhance performance by distributing data
across multiple disks or using parallel read/write operations. This
improved performance is beneficial for tasks such as data backup, archival,
and data recovery, where speed is essential.
4. Scalability: RAID arrays can be easily expanded by adding more disks,
allowing for flexible scalability of secondary storage as data storage
requirements grow over time. This scalability ensures that secondary storage
solutions can accommodate increasing amounts of data without significant
disruptions or downtime.
5. Cost Efficiency: While RAID may require an initial investment in
additional hardware, such as additional disks or RAID controllers, it can be
more cost-effective in the long run compared to other redundancy and
performance-enhancing solutions. This cost efficiency is advantageous for
secondary storage, where cost-effectiveness is a key consideration.
6.Data Accessibility: RAID configurations ensure continuous data accessibility
even during disk failures or maintenance tasks, ensuring that secondary storage
remains available for data backup, archival, and retrieval purposes.
ANSWER ANY FOUR. EACH CARRIES 8 MARKS

12. (a) simplify using K-MAP


F (P,Q,R,S)=∑(0,2,5,7,8,10,13,15)
(b)Differentiate between ASCII and
EBCDIC

ANS:

13.Explain 3 t o8 line decoder.

ANS:

◉ The following image shows a 3-to-8 line


decoder

14. With a flow chart explain the instruction cycle.


ANS: The Instruction Cycle –
Each phase of Instruction Cycle can be decomposed into a sequence of elementary
micro-operations. In the above examples, there is one sequence each for the Fetch,
Indirect, Execute and Interrupt Cycles.
The Indirect Cycle is always followed by the Execute Cycle. The Interrupt Cycle is
always followed by the Fetch Cycle. For both fetch and execute cycles, the next cycle
depends on the state of the system.
We assumed a new 2-bit register called Instruction Cycle Code (ICC). The ICC
designates the state of processor in terms of which portion of the cycle it is in:-

00 : Fetch Cycle
01 : Indirect Cycle
10 : Execute Cycle
11 : Interrupt Cycle
At the end of the each cycles, the ICC is set appropriately. The above flowchart
of Instruction Cycle describes the complete sequence of micro-operations, depending
only on the instruction sequence and the interrupt pattern(this is a simplified example).
The operation of the processor is described as the performance of a sequence of micro-
operation.

15.Explain logic and shift micro operations.


Ans:
Shift micro-operations are those micro-operations that are used for the serial transfer of
information. These are also used in conjunction with arithmetic micro-operation, logic
micro-operation, and other data-processing operations. There are three types of shift
micro-operations:
1. Logical Shift:
It transfers the 0 zero through the serial input. We use the symbols ‘<<‘ for the logical left
shift and ‘>>‘ for the logical right shift.
Logical Left Shift:
In this shift, one position moves each bit to the left one by one. The Empty least
significant bit (LSB) is filled with zero (i.e, the serial input), and the most significant bit
(MSB) is rejected.
The left shift operator is denoted by the double left arrow key (<<). The general syntax
for the left shift is shift-expression << k.

Logical Right Shift


In this shift, each bit moves to the right one by one and the least significant bit(LSB) is
rejected and the empty MSB is filled with zero.
The right shift operator is denoted by the double right arrow key (>>). The general syntax
for the right shift is “shift-expression >> k”.

2. Arithmetic Shift:
The arithmetic shift micro-operation moves the signed binary number either to the left or
to the right position.
Following are the two ways to perform the arithmetic shift.
1. Arithmetic Left Shift
2. Arithmetic Right Shift

Arithmetic Left Shift: In this shift, each bit is moved to the left one by one. The empty
least significant bit (LSB) is filled with zero and the most significant bit (MSB) is rejected.
Same as the Left Logical Shift.

Arithmetic Right Shift:


In this shift, each bit is moved to the right one by one and the least significant(LSB) bit is
rejected and the empty most significant bit(MSB) is filled with the value of the previous
MSB.
3. Circular Shift:
The circular shift circulates the bits in the sequence of the register around both ends
without any loss of information.
Following are the two ways to perform the circular shift.
1. Circular Shift Left
2. Circular Shift Right

Circular Left Shift: In this micro shift operation each bit in the register is shifted to the
left one by one. After shifting, the LSB becomes empty, so the value of the MSB is filled
in there.

Circular Right Shift:


In this micro shift operation each bit in the register is shifted to the right one by one. After
shifting, the MSB becomes empty, so the value of the LSB is filled in there.

16.What is paging ? Explain.


ANS: Paging is a function of memory management where a computer will store and
retrieve data from a device’s secondary storage to the primary storage. Memory
management is a crucial aspect of any computing device, and paging specifically is
important to the implementation of virtual memory.

Terminologies Associated with Memory Control


 Logical Address or Virtual Address: This is a deal that is generated through the
CPU and used by a technique to get the right of entry to reminiscence. It is known as
a logical or digital deal because it isn’t always a physical vicinity in memory but an
opportunity for a connection with a place inside the device’s logical address location.
 Logical Address Space or Virtual Address Space: This is the set of all logical
addresses generated via a software program. It is normally represented in phrases or
bytes and is split into regular-duration pages in a paging scheme.
 Physical Address: This is a cope that corresponds to a bodily place in reminiscence.
It is the actual cope with this that is available on the memory unit and is used by the
memory controller to get admission to the reminiscence.
 Physical Address Space: This is the set of all bodily addresses that correspond to
the logical addresses inside the way’s logical deal with place. It is usually represented
in words or bytes and is cut up into fixed-size frames in a paging scheme.

The mapping between logical pages and physical page frames is maintained by the page
table, which is used by the memory management unit to translate logical addresses
into physical addresses. The page table maps each logical page number to a physical
page frame number.

17.Explain memory hierarchy. In detail.


Ans: In the Computer System Design, Memory Hierarchy is an enhancement to organize
the memory such that it can minimize the access time. The Memory Hierarchy was
developed based on a program behavior known as locality of references. The figure
below clearly demonstrates the different levels of the memory hierarchy.
This Memory Hierarchy Design is divided into 2 main types:
 External Memory or Secondary Memory: Comprising of Magnetic Disk, Optical
Disk, and Magnetic Tape i.e. peripheral storage devices which are accessible by the
processor via an I/O Module.
 Internal Memory or Primary Memory: Comprising of Main Memory, Cache Memory
& CPU registers. This is directly accessible by the processor.
Memory Hierarchy Design

1. Registers

Registers are small, high-speed memory units located in the CPU. They are used to
store the most frequently used data and instructions. Registers have the fastest access
time and the smallest storage capacity, typically ranging from 16 to 64 bits.

2. Cache Memory

Cache memory is a small, fast memory unit located close to the CPU. It stores frequently
used data and instructions that have been recently accessed from the main memory.
Cache memory is designed to minimize the time it takes to access data by providing the
CPU with quick access to frequently used data.
3. Main Memory
Main memory, also known as RAM (Random Access Memory), is the primary memory of
a computer system. It has a larger storage capacity than cache memory, but it is slower.
Main memory is used to store data and instructions that are currently in use by the CPU.

4. Secondary Storage

Secondary storage, such as hard disk drives (HDD) and solid-state drives (SSD), is a
non-volatile memory unit that has a larger storage capacity than main memory. It is used
to store data and instructions that are not currently in use by the CPU. Secondary
storage has the slowest access time and is typically the least expensive type of memory
in the memory hierarchy.
5. Magnetic Disk

Magnetic Disks are simply circular plates that are fabricated with either a metal or a
plastic or a magnetized material. The Magnetic disks work at a high speed inside the
computer and these are frequently used.

6. Magnetic Tape

Magnetic Tape is simply a magnetic recording device that is covered with a plastic film. It
is generally used for the backup of data. In the case of a magnetic tape, the access time
for a computer is a little slower and therefore, it requires some amount of time for
accessing the strip.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy