0% found this document useful (0 votes)
30 views

IT233 Final Revision

IT233 Final Revision

Uploaded by

Omar Elouelji
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views

IT233 Final Revision

IT233 Final Revision

Uploaded by

Omar Elouelji
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

‫‪IT233‬‬

‫تحذير هام‬

‫هذا الملف للمشتركين في موسى اكاديمي فقط‬


‫وغير مسموح بنشره او التعامل به لغير المشتركين‬
‫ونشكركم لحفظكم االمانة وحقوق الملكية‬
‫فريق عمل موسى اكاديمي‬

‫‪Moussa Academy‬‬
‫‪00201007153601‬‬
‫‪WWW.MOUSSAACADEMY.COM‬‬
Mid Term Exam: Questions IT233
and Answers
Computer
Organization I

Moussa Academy
00201007153601
WWW.MOUSSAACADEMY.COM
I. Chapter Questions and Answers

1) Which of the following memories holds software that is not expected to change over the life of the system?
• RAM
• Cache
• SRAM
• ROM
2) 38 in decimal system is equal to _____ in BCD.
• 0011 1000
• 1000 0011
• 0111 1111
• 1100 1000
3) The Binary equivalent of the decimal number (9.5)10 is:
• (1001.010)2
• (1010.111)2
• (1010.101)2
• (1001.100)2
4) Compare between Parallel and Serial Buses, List two points for each one.
Parallel:
• High throughput
• Expensive and require a lot of space.
• Subject to radio-generated electrical interference which limits their speed and length.
• Generally used for short distances and on computer motherboards.
Serial:
• 1 bit transmitted at a timed.
• Single data line pair and a few control lines.
• For many applications, throughput is higher than for parallel because of the lack of electrical
interference.
5) The OCTAL equivalent of the Hexadecimal number (12)16 is:
• (21)8
• (11)8
• (22)8
• (12)8
6) The device used to read the Alphanumeric data from credit cards is:
• Camera
• Scanner
• Magnetic stripe reader
• RFID
7) Which of the following registers stores instruction fetched from memory?
• MAR
• PC
• IR
• MDR

1|Page www.MoussaAcademy.com

00201007153601
8) One of the main features of client-server architecture is:
• Inconsistency
• Decentralization
• Centralization
• Sharing files between personal computers
9) _____ is a bundle of wires that carry signals and power between different components.
• ALU
• CU
• Bus
• IPO
10) Binary addition of 101 and 011 is:
• 1000
• 101011
• 111
• 111111
11) Complementary arithmetic is usually the method of choice for ______.
• BCD
• signed integers.
• ASCII
• unsigned integers
12) Perform the following operations:
a) Find the 1's complement of 1001.
0110
b) Convert (1101011100110)2 to base 16.
1AE6
c) Compute 1101-1110 using 2's Complement.
1111
13) _____ is an example of lossless compression
• MP-3
• GIF
• JPEG
• MPEG videos
14) Which of the following protocols is used between computers on the internet and local area networks?
• TCP/IP
• HTTP
• SATA
• RSS
15) In addition to the actual data representing points in an image or characters being displayed, the system must
have information that interprets the meaning of the data, this information is known as:
• Graphic data
• Metadata
• Storage data
• Standard data

2|Page www.MoussaAcademy.com

00201007153601
16) The two major categories of software are:
• Network Module and Kernel
• File management and I/O applications
• System software and Application software
• Memory management and Resource scheduling
17) Based on the LMC model, the STORE instruction copies data from the:
• basket to the calculator
• mailbox to the basket
• mailbox to the calculator
• calculator to a mailbox
18) Which of the following is NOT a component of the CPU?
• CU
• Interface unit
• Modem
• ALU
19) The model that is based on client computer, web server, and database server is example of:
• Client-server architecture
• Peer to peer architecture
• Centralized processing
• One-tier architecture
20) The largest two-digit hexadecimal number is:
• (EF)16
• (FE)16
• (FF)16
• (FD)16
21) Data storage location identified by _____ mnemonic.
• DLL
• DEL
• DAT
• DSL
22) The code for each pixel is translated into actual color values using a color translation table known as a/an:
• Palette
• Arrays
• Resolution
• Object
23) Based on the LMC model, the OUTPUT instruction takes data from the:
• out basket and place it in the mailbox.
• out basket and places it in the calculator
• calculator and place it to the mailbox.
• calculator and places it in the out basket

3|Page www.MoussaAcademy.com

00201007153601
Midterm Revision Part 2 IT233
Questions & Answers
Computer
Organization I

Moussa Academy
00201007153601
WWW.MOUSSAACADEMY.COM
I. Questions

1. The ________ approach allows us to focus on the specific areas of interest without the distraction of
details that are irrelevant for the level that we are studying.
a) downside-up
b) bottom-up
c) top-down
d) bottom-side-up

2. The 2's Binary Complement of 01101 is _______.


a) 10011
b) 10010
c) 00111
d) 11100

3. The 10’s Decimal Complement of -21 is ________.


a) 87
b) 78
c) 79
d) 97

4. The largest unsigned decimal number that can be represented in binary using 8 bits is__________.
a) 255
b) 256
c) 128
d) 127

5. All the following are Multimedia standards EXCEPT ________.


a) MPEG-4
b) EBCDIC
c) DivX
d) MP3

1|Page www.MoussaAcademy.com
6. Which of the following assembly language instructions is used to perform arithmetic operations?
a) CMP
b) MOV
c) JMP
d) ADD

7. The BCD equivalent of the decimal number 68 is ________.


a) 1000100
b) 01101000
c) 11110000
d) 10000110

8. ideas, methods, processes, principles, and policies of systems are classified as __________.
a) Tangible
b) Conceptual
c) Perceptible
d) Physical

9. To multiply a number by its base we can perform_______.


a) A left shift
b) A right shift
c) A complex equation
d) A bit op

10. When recording sound, the data that describes how long a time period each captured sound
measurement represents is known as the_______.
a) MIDI
b) amplitude
c) sampling rate
d) WAVE

11. ________ moves instructions and data between the CPU and other hardware components.
a) RAM
b) ALU
c) Interface Unit
d) CU

2|Page www.MoussaAcademy.com
12. Linked components of a system also define the ______ for the system.
a) Boundary
b) Interface
c) Links
d) Conceptual

13. How many numbers can be stored using 1 or 2 digits in base 2, 8, 10 and 16?
The equation for knowing how many range of numbers can be stored using a number of digits is as follows:
R = BK where
R = range
B = base
K = number of digits
We apply this function for every base given:

Base 2: we have 2 digits in this system, 0 and 1


R = 21 = 2 possible range of numbers
R = 22 = 4 possible range of numbers
Base 8: we have 8 digits in this system, 0 through 7
R = 81 = 8 possible range of numbers
R = 82 = 64 possible range of numbers
Base 10: we have 10 digits in this system, 0 through 9
R = 101 = 10 possible range of numbers
R = 102 = 100 possible range of numbers
Base 16: we have 16 digits in this system, 0 through 9 then A, B, C, D, E, F
R = 161 = 16 possible range of numbers
R = 162 = 256 possible range of numbers

14. The size of image with resolution 100 pixels by 50 pixels, where 8 bits required for each pixel is
_________.
a) 320000 bits
b) 10000 bits
c) 40000 bits
d) 5000 bits

3|Page www.MoussaAcademy.com
15. Dennis Ritchie developed the programming language ________ which was used to rewrite much of
UNIX in a high-level language.
a) C
b) PASCAL
c) COBOL
d) JAVA

16. The 9's Decimal Complement of -13 is _________.


a) 86
b) 14
c) 87
d) 13

17. The number of different items that can be represented by a given number of digits, n, in a particular
base, b, is given by the formula: equals ________.
a) radix
b) range
c) field
d) parameter

18. The 1's Binary Complement of 11110000 is ________.


a) 00000000
b) 00001111
c) 10101010
d) 11111111

19. The .WAV format is a general-purpose format used to store and reproduce a _______.
a) text
b) sound
c) pictures
d) movies

20. In assembly language _______ are used to mark specific locations in the program that can be
referenced by other parts of the code, such as for branching and jumping?
a) operands
b) opcodes
c) constants
d) labels

4|Page www.MoussaAcademy.com
21. Which of the following is NOT one of the common alphanumeric codes?
a) ASCII
b) Unicode
c) EBCDIC
d) Ordinal

22. List two examples for Input, 2 examples for Output, and 2 examples for Storage in the Input-Process-
Output Model (IPO).
Input: keyboard, mouse
Output: monitor, printer
Storage: hard drive, optical media

23. Original sound waves are analog in nature and must be converted to digital form for use in the
computer. The circuit that performs this function is called a(n)- ________.
a) digital inverter
b) A-to-D converter
c) digital to analog converter.
d) analog inverter

24. __________ is NOT a protocol.


a) TCP
b) SIP
c) SATA
d) THCP.

25. The Binary Number 01001 is equivalent to the Decimal Number ________.
a) 9
a) 7
b) 8
c) 6

5|Page www.MoussaAcademy.com
Final Exam Part 1:
Questions & Answers
IT233
(5 – 2022) Computer
Organization I

Moussa Academy
00201007153601
WWW.MOUSSAACADEMY.COM
I. Chapter Questions with Answers

1) Which of the following is not an option to reduce a video image’s file size?
• Limit the number of colors.
• Reduce the frame rate.
• Reduce the image’s size.
• Increase the frame rate
2) The value F in base 16 is equivalent to ____ in base 2.
• 1111
• 1110
• 1000
• 1100
3) The combination of client-server technology and peer-to-peer architecture is known as:
• 3-tier architecture
• Web-based computing
• A hybrid model.
• 2-tier architecture
4) In the input—process—output model (IPO), a fax machine is an example of:
• Output
• Processing
• Input
• Storage
5) The BCD equivalent of 6810 is:
• 0110 1000
• 1001 1001
• 1010 1010
• 0100 0100
6) The minimum number of disks in a striped array is:
• 2
• 1
• 3
• 0
7) Which of the following is NOT true about registers?
• Can hold data, an address, or an instruction.
• Size in bits or bytes.
• Small and volatile storage locations within the RAM.
• Manipulated directly by the control unit.

1|Page www.MoussaAcademy.com

00201007153601
8) To handle multiple interrupts:
• Low priority will be handled first.
• High priority will be handled first.
• They will be handled randomly
• The first interrupt will be handled first regardless of its priority.
9) The CPU unit responsible for performing arithmetic and Boolean logical calculations is:
• The interface unit.
• The memory.
• The arithmetic/logic unit (ALU).
• The control unit (CU).
10) Which CPU philosophy architecture usually need Fewer instructions per program?
• Parallel CPUs
• RISC
• CISC
• Both have same number of instructions
11) Which of the following statements reflects a disadvantage of peer-to-peer computing?
• It allows sharing of files and other resources between computers.
• It treats all computers in a network as equals.
• It does not require administration because each user sets their own permissions for managing their system.
• It is difficult to establish centralized control to restrict inappropriate access and to ensure data integrity.
12) The standard method(s) of implementing a disk array is/are:
• mirrored array, random array, and striped array
• mirrored array and striped array
• mirrored array only
• striped array only
13) Which of the following is not considered as a true RAID?
• RAID 5
• RAID 3
• RAID 1
• RAID 0
14) The signal that causes the CPU to alter its normal flow of instruction execution is known as:
• CPU
• OS
• Kernel
• Interrupt

2|Page www.MoussaAcademy.com

00201007153601
15) The octal system is a system of positional notation based on powers of:
• 2
• 16
• 10
• 8
16) Including the address of the interrupting device as part of the interrupt routine is known as:
• Kernel
• vectored interrupt
• polling
• CPU
17) Which of the following is not a type of instruction?
• Data movement
• Data authentication
• Data processing
• Data storage
18) Which of the following is not a hardware component?
• Operating system
• CPU
• Memory
• Storage device
19) Conventional and cache memory are referred to as
• Output device
• Primary memory
• Input device
• Secondary storage
20) Memory capacity is determined by two factors ______ and ______.
• number of bits in the MDR, size of the address portion of the instruction.
• number of bits in the MAR, number of bytes in the MDR.
• number of bits in the MAR, number of bits in the MDR.
• number of bits in the MAR, size of the address portion of the instruction.
21) Assembly-line technique to allow overlapping between fetch-execute cycles of sequences of instructions is
known as _____ .
• Pipelining
• stalling
• super Scalar processing
• Scalar processing
22) Which of the following is true about second generation programming languages?
• Python is an example of second-generation programming languages.
• The code is converted directly to machine code.
• Require a virtual machine to run the code.
• Require compiler to convert the code to machine code.

3|Page www.MoussaAcademy.com

00201007153601
23) Which part of the CPU moves data between CPU registers and other hardware components?
• Control Unit.
• I/O interface.
• Memory management unit.
• Arithmetic logic unit.
24) Assembly is a _____ generation programming language.
• third
• second
• first
• fourth
25) Which of the following storage devices is used for archival purposes and disaster recovery?
• Magnetic disks
• Cache memory
• Solid state memory
• Magnetic tap
26) Devices that are separate from the basic computer are known as:
• Power supply
• Peripherals
• Memory
• CPU
27) The number of different digits in the number system is known as _____.
• Digit
• Bit
• Number system unit
• Base
28) What is the 10’s complement representation of 499?
• 499
• -501
• -499
• 501
29) The speed of accessing a storage device can be measured by:
• Data transfer rate only
• Error correcting code
• Access time and data transfer rate
• Access time only
30) The complete collection of instructions that are understood by a CPU is known as _____.
• Binary
• Instruction Set
• Machine Code
• assembly codes

4|Page www.MoussaAcademy.com

00201007153601
31) The method of continuously checking the status of the devices to discover whether they require attention is
called:
• Vectored interrupt
• Polling
• Supervising
• Direct access
32) In base 10, when moving a number’s decimal point one place to the left, we:
• Divide the number by the base number.
• Subtract the number from the base number.
• Add the number to the base number.
• Multiply the number by the base number.
33) Which of the following file uses lossless compression?
• MP3
• JPEG
• GIF
• TIFF
34) When separate fetch-execute units are used in CPU organization, fetch unit consist of _____.
• Instruction fetch unit and Instruction decode unit.
• Instruction decode unit.
• Arithmetic logic unit.
• Instruction fetch unit.
35) Which of the following is true about VLIW architecture?
• 8 Instructions are processed in parallel.
• Instructions are processed in pairs.
• 4 Instructions are processed in parallel.
• Instructions are processed one by one.
36) In programming, all non-machine code _____.
• has to go through translation phase into machine code.
• Stop executing the code.
• Not processed by the computer.
• Considered as text.
37) Which of the following storage devices needs the lowest amount of time to access it?
• CPU registers
• Magnetic tape
• Optical disc drive
• Flash memory
38) Screen size is measured by:
• circumference of a screen
• width of the screen
• height of the screen
• diagonal length of screen
39) The loop counter of a program that is being executed, is saved in _____.
• ROM
• Flag register
• General purpose registers.
• Memory (RAM)

5|Page www.MoussaAcademy.com

00201007153601
40) Which of the following architectures represents a decentralized network where each node can be both a client
and a server?
• Peer-to-peer architecture
• 3-tier architecture
• N-tier architecture
• 2-tier architecture
41) Instruction set is usually represented by ______.
• charts
• Assembly code
• Machine code
• Binary
42) Which of the following is a volatile memory?
• SRAM
• ROM
• Flash Memory
• EEPROM
43) When separate fetch-execute units are used in CPU organization, ______.
• Instructions are fetched one by one.
• Several instructions are fetched and saved in the stack.
• Instructions are fetched in pairs.
• Several instructions are fetched in parallel.
44) In early computers, instruction format commonly used .......
• Two addresses
• Zero addresses
• Three addresses
• One address
45) Which part of the CPU performs fetch/ execute cycle?
• Memory management unit.
• Arithmetic logic unit.
• Registers.
• Control Unit.
46) Which statement of the following is best describing Little Man Computer?
• An abstraction of the CPU.
• A real computer that leads to smaller size computers.
• A thought exercise that allows us to conceptualize a real computer in an abstract way.
• An analysis of RAM and how data are stored in different addresses.

6|Page www.MoussaAcademy.com

00201007153601
47) Which of the following is an example of nonvolatile memory?
• RAM
• Flash memory
• DRAM
• Cache memory
48) Which programming language is usually used when the programmer needs a precise control over hardware?
• Assembly
• High level language
• Python
• Java
49) What is the role of Instruction Set Architecture?
• Serves as an interface between software and hardware.
• Serves as an interface between the CPU and the memory.
• Serves as translator between devices.
• Serves as protective layer to protect hardware.
50) All of the following are examples of using interrupt EXCEPT:
• If there is a normal event
• If there are illegal instructions
• If there is an unexpected input
• Allocating CPU time
51) ______ is defined as the average time it takes a computer to locate data and read it.
• Formatting time
• Access time
• Deleting time
• Data transfer rate
52) For a given number, a larger base requires ______ digits.
• An arbitrary amount of
• More
• The same amount of
• Fewer
53) Which of the following statement is false?
• Each interrupt has a corresponding interrupt service routine.
• Interrupt is a signal caused by an external I/O device.
• Interrupts cannot be prioritized.
• Interrupt used to remind CPU to perform routine tasks.
54) Pixel color is determined by the intensity of which 3 colors?
• White, green, and blue (WGB)
• Black, green, and blue (BGB)
• Red, green and blue (RGB)
• Yellow, green, and blue (YGB)
55) ______ is a standard set of rules that allow electronic devices to communicate with each other.
• Protocol
• Data format
• network media
• network

7|Page www.MoussaAcademy.com

00201007153601
56) VLIW stands for:
• View Large Instruction Word
• Very Large Instruction Word
• Vary Long Instruction Word
• Very Long Instruction Word
57) For a given number, a larger base requires _____ symbols.
• The same amount of
• Less
• An arbitrary amount of
• More
58) What is the decimal equivalent of 10102 + 00102
• 1111
• 1011
• 1100
• 1000
59) What is the purpose of code morphing layer in VLIW architecture?
• Divide instructions to 32-bit instructions.
• Reduce the time needed to run an instruction.
• Translate instructions written for other CPUs into molecules.
• Connect CPU to other hardware devices.

8|Page www.MoussaAcademy.com

00201007153601
60) What is the 2’s complement of 1010 1110?
• 0101 0010
• 1111 1010
• 1010 1110
• 1010 1111
61) Discuss two advantages of using flash memory.
• It allows for the reading and writing of individual bytes or small blocks of data.
• Faster than disks but more expensive.
• Useful for nonvolatile portable computer storage.
• Its small size makes it ideal for use in portable devices (such as thumb drives, digital cameras, cell
phones, and music players.)
• It is relatively resistant to physical shocks.
• It produces little heat or noise during operation.
62) What are the reasons for having multiprocessing system? List configurations of multiprocessing system.
Reasons:
• Increase the processing power.
• Parallel Processing
Configurations:
• Master-slave multiprocessing
o Manages the system
o Controls all resources and scheduling
o Assigns tasks to slave CPUs
Advantages
o Simplicity
o Protection of system and data
Disadvantages
o Master CPU becomes a bottleneck
o Reliability issues – if master CPU fails entire system fails

• Symmetrical multiprocessing
o Each CPU has equal access to resources
o Each CPU determines what to run using a standard algorithm
Advantages
o High reliability
o Fault tolerant support is straightforward
o Balanced workload
Disadvantages
o Resource conflicts – memory, i/o, etc.
o Complex implementation

9|Page www.MoussaAcademy.com

00201007153601
63) Compare mirrored array and striped array.
Mirrored:
• A pair of disks store identical copies of data.
• Data is read by alternating blocks between the hard drives and combining them.
• Access time is improved by the number of disk drives in the array.
• In case of a read failure, the block is marked and then read from the mirrored drive.
• In the case of three or more mirrored drives, majority logic is employed in the event of a failure, and this
technique is used in fault-tolerant computers.
Striped:
• Minimum of three drives needed because one disk drive is reserved for error checking.
• Writes – block of parity words from each block of data is created and put on the reserved error checking
disk.
• Reads – parity data is used to check original data
64) List fetch and execute steps that take place in Little Man Computer.
FETCH
• Little Man reads the address from the location counter
• He walks over to the mailbox that corresponds to the location counter
• And reads the number on the slip of paper (he puts the slip back in case he needs to read it again later)
EXECUTE
• The Little Man goes to the mailbox address specified in the instruction he just fetched.
• He reads the number in that mailbox (he remembers to replace it in case he needs it later).
• He walks over to the calculator and punches the number in.
• He walks over to the location counter and clicks it, which gets him ready to fetch the next instruction.

10 | P a g e www.MoussaAcademy.com

00201007153601

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy