InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Tell Me How Does Cloud Architecture Overcome The Difficulties Faced By Traditional Architecture? |
|
Answer» Cloud architecture provide LARGE pool of DYNAMIC resources that can be accessed any time whenever there is a requirement, which is not being given by the TRADITIONAL architecture. In traditional architecture it is not possible to dynamically associate a machine with the rising demand of infrastructure and the services. Cloud architecture provides scalable PROPERTIES to meet the high demand of infrastructure and provide on-demand access to the user. Cloud architecture provide large pool of dynamic resources that can be accessed any time whenever there is a requirement, which is not being given by the traditional architecture. In traditional architecture it is not possible to dynamically associate a machine with the rising demand of infrastructure and the services. Cloud architecture provides scalable properties to meet the high demand of infrastructure and provide on-demand access to the user. |
|
| 2. |
What Are The Requirement Of Page-table? |
|
Answer» For any computer GENERALLY the MEMORY space is LESSER as compared to the address space this implies that the MAIN memory is lesser as compared to the secondary memory. For any computer generally the memory space is lesser as compared to the address space this implies that the main memory is lesser as compared to the secondary memory. |
|
| 3. |
Explain Partitioning In Reference To Operating Systems? |
|
Answer» PARTITIONING involves the user to partition their HARD drives and then they can implement / install multiple OPERATING systems on them. The user REQUIRES a boot MANAGER to switch between different operating systems. Partitioning involves the user to partition their hard drives and then they can implement / install multiple operating systems on them. The user requires a boot manager to switch between different operating systems. |
|
| 4. |
Explain Virtualization With The Pros And Cons? |
|
Answer» In a WAY virtualization appears similar to emulation but ACTUALLY it shares hardware resources from the host OS.
In a way virtualization appears similar to emulation but actually it shares hardware resources from the host OS. |
|
| 5. |
Described The Features Of Assembly Language? |
Answer»
|
|
| 6. |
Explain Vertical Micro Code? |
| Answer» | |
| 7. |
Explain Direct Mapping? |
|
Answer» In direct mapping the RAM is made use of to store data and some is STORED in the cache. An address space is split into two PARTS index field and tag field. The cache is used to store the tag field whereas the rest is stored in the main memory. Direct mapping`s PERFORMANCE is directly PROPORTIONAL to the Hit ratio. In direct mapping the RAM is made use of to store data and some is stored in the cache. An address space is split into two parts index field and tag field. The cache is used to store the tag field whereas the rest is stored in the main memory. Direct mapping`s performance is directly proportional to the Hit ratio. |
|
| 8. |
What Is Associative Mapping? |
|
Answer» In this TYPE of mapping the associative MEMORY is USED to store content and addresses both of the memory word. This enables the placement of the any word at any PLACE in the cache memory. It is considered to be the fastest and the most flexible mapping FORM. In this type of mapping the associative memory is used to store content and addresses both of the memory word. This enables the placement of the any word at any place in the cache memory. It is considered to be the fastest and the most flexible mapping form. |
|
| 9. |
Explain Write Back Method? |
|
Answer» In this method only the location in the cache is UPDATED. Whenever such an update OCCURS a FLAG is set which makes sure that in case the word is removed from the cache the correct copy is SAVED to the main memory. This approach is USUALLY taken when a word is constantly updated at frequent intervals. In this method only the location in the cache is updated. Whenever such an update occurs a flag is set which makes sure that in case the word is removed from the cache the correct copy is saved to the main memory. This approach is usually taken when a word is constantly updated at frequent intervals. |
|
| 10. |
Explain Write Through Method? |
|
Answer» Considered to be the simplest this method involves the updating of the main memory CORRESPONDING to every write operation. With this the CACHE memory is also UPDATED in parallel in CASE it also contains the WORD specified at the address. The primary advantage of this method is data integrity, the primary and the cache memory both contain the same data. Considered to be the simplest this method involves the updating of the main memory corresponding to every write operation. With this the cache memory is also updated in parallel in case it also contains the word specified at the address. The primary advantage of this method is data integrity, the primary and the cache memory both contain the same data. |
|
| 11. |
List The Different Types Of Micro-operations? |
|
Answer» The micro-operations in computers are classified into the following categories: Register transfer micro-operations: These type of micro operations are used to transfer from one register to another binary information. The micro-operations in computers are classified into the following categories: Register transfer micro-operations: These type of micro operations are used to transfer from one register to another binary information. |
|
| 12. |
Described The Different Types Of Fields That Are Part Of An Instruction? |
|
Answer» An instruction can be considered to be a command that has been issued to a COMPUTER to perform a particular operation. The instruction format contains various field in them such as:
For ex: ADD R0, R1. In this case the ADD is the operand whereas the R1, ans R0 are the address fields. An instruction can be considered to be a command that has been issued to a computer to perform a particular operation. The instruction format contains various field in them such as: For ex: ADD R0, R1. In this case the ADD is the operand whereas the R1, ans R0 are the address fields. |
|
| 13. |
Explain About The Major Difficulties Of Pipeline Conflicts In Processors Supporting Pipe Lining? |
|
Answer» The following are the main reasons for pipe line conflicts in the PROCESSOR:
The following are the main reasons for pipe line conflicts in the processor: |
|
| 14. |
List The Components Of The Ven Neumann Architecture? |
|
Answer» The main components of the Von Neumann architecture were as FOLLOWS:
The main components of the Von Neumann architecture were as follows: |
|
| 15. |
Described Some Of The Common Rules Of Assembly Language? |
|
Answer» Some of the common RULES of assembly level LANGUAGE are as follows:
Some of the common rules of assembly level language are as follows: |
|
| 16. |
Can You Explain The Two Hardware Methods To Establish Priority? |
|
Answer» Two different ways of establishing HARDWARE priority are Daisy Chaining and parallel priority.
Two different ways of establishing hardware priority are Daisy Chaining and parallel priority. |
|
| 17. |
Explain About Designing Strategy Of A Control Unit Coded On Vertical Code? |
| Answer» | |
| 18. |
What Is Vertical Microcode? |
|
Answer» Vertical MICROCODE can be CONSIDERED to be a segment of CODE or operators that have been clubbed together into fields. In this field EVERY micro OPERATION is given a unique value. Vertical microcode can be considered to be a segment of code or operators that have been clubbed together into fields. In this field every micro operation is given a unique value. |
|
| 19. |
What Is Software Interrupts? |
|
Answer» These TYPES if interrupts can occur only during the execution of an instruction. They can be used by a PROGRAMMER to cause interrupts if need be. The primary purpose of such interrupts is to switch from USER mode to supervisor mode. These types if interrupts can occur only during the execution of an instruction. They can be used by a programmer to cause interrupts if need be. The primary purpose of such interrupts is to switch from user mode to supervisor mode. |
|
| 20. |
Mention The Pros And Cons Of Emulation? |
|
Answer» Emulation is the process in which a target CPU and its corresponding hardware WOULD be emulated exactly the same way.
Emulation is the process in which a target CPU and its corresponding hardware would be emulated exactly the same way. |
|
| 21. |
What Is Internal Interrupts? |
|
Answer» They are also known as traps and their causes could be due to some illegal OPERATION or the erroneous use of data. Instead of being triggered by an external event they are usually triggered due to any exception that has been caused by the PROGRAM itself. Some of the causes of these types of interrupts can be due to attempting a division by zero or an INVALID opcode ETC. They are also known as traps and their causes could be due to some illegal operation or the erroneous use of data. Instead of being triggered by an external event they are usually triggered due to any exception that has been caused by the program itself. Some of the causes of these types of interrupts can be due to attempting a division by zero or an invalid opcode etc. |
|
| 22. |
Explain Briefly Six Different Types Of Addressing Modes Of An Instruction? |
|
Answer» The different types of instructions are as follows:
The different types of instructions are as follows: |
|
| 23. |
What Is External Interrupts? |
|
Answer» These TYPES of INTERRUPTS generally come from external input / OUTPUT devices which are connected externally to the PROCESSOR. They are generally independent and oblivious of any programming that is CURRENTLY running on the processor. These types of interrupts generally come from external input / output devices which are connected externally to the processor. They are generally independent and oblivious of any programming that is currently running on the processor. |
|
| 24. |
Explain The Components Of The Ven Neumann Architecture? |
|
Answer» The main components of the Von Neumann architecture were as follows:
The main components of the Von Neumann architecture were as follows: |
|
| 25. |
Explain What Are Five Stages In A Dlx Pipeline? |
|
Answer» The instruction sets can be differentiated by:
The instruction sets can be differentiated by: |
|
| 26. |
What Are The Steps Involved In An Instruction Cycle? |
|
Answer» Any program residing in the memory contains a set of instruction that need to be executed by the computer in a sequential MANNER. This cycle for EVERY instruction is known as the instruction cycle . The cycle consists of the following steps:
Any program residing in the memory contains a set of instruction that need to be executed by the computer in a sequential manner. This cycle for every instruction is known as the instruction cycle . The cycle consists of the following steps: |
|
| 27. |
Explain A Snooping Cache? |
|
Answer» Snooping is the process where the individual CACHES monitor address lines for accesses to memory LOCATIONS that they have cached. When a write operation is observed to a location that a cache has a copy of, the cache controller invalidates its own copy of the snooped memory location. Snarfing is where a cache controller watches both address and data in an ATTEMPT to update its own copy of a memory location when a second master modifies a location in MAIN memory Snooping is the process where the individual caches monitor address lines for accesses to memory locations that they have cached. When a write operation is observed to a location that a cache has a copy of, the cache controller invalidates its own copy of the snooped memory location. Snarfing is where a cache controller watches both address and data in an attempt to update its own copy of a memory location when a second master modifies a location in main memory |
|
| 28. |
Point Out The Characteristics Of The Risc Architecture? |
|
Answer» RISC meaning reduced instruction set as the ACRONYM say aims to reduce the execution times of instructions by simplifying the instructions. The major characteristics of RISC are as follows:
RISC meaning reduced instruction set as the acronym say aims to reduce the execution times of instructions by simplifying the instructions. The major characteristics of RISC are as follows: |
|
| 29. |
Explain Mesi? |
|
Answer» The MESI protocol is also known as Illinois protocol due to its DEVELOPMENT at the University of Illinois at Urbana-Champaign and MESI is a widely used cache coherency and memory COHERENCE protocol. MESI is the most common protocol which SUPPORTS write-back cache. Its use in personal computers became WIDESPREAD with the INTRODUCTION of Intel's Pentium processor to "support the more efficient write-back cache in addition to the write-through cache previously used by the Intel 486 processor" The MESI protocol is also known as Illinois protocol due to its development at the University of Illinois at Urbana-Champaign and MESI is a widely used cache coherency and memory coherence protocol. MESI is the most common protocol which supports write-back cache. Its use in personal computers became widespread with the introduction of Intel's Pentium processor to "support the more efficient write-back cache in addition to the write-through cache previously used by the Intel 486 processor" |
|
| 30. |
What Are The Major Difficulties Of Pipeline Conflicts In Processors Supporting Pipe Lining? |
|
Answer» The following are the main reasons for pipe line conflicts in the processor:
The following are the main reasons for pipe line conflicts in the processor: |
|
| 31. |
What Are The Different Types Of Fields That Are Part Of An Instruction?explain? |
|
Answer» An instruction can be considered to be a COMMAND that has been issued to a computer to perform a particular operation. The instruction format contains various field in them such as: Operation CODE Field: Also known as the op code field, this field is used to specify the operation to be PERFORMED for the instruction. An instruction can be considered to be a command that has been issued to a computer to perform a particular operation. The instruction format contains various field in them such as: Operation Code Field: Also known as the op code field, this field is used to specify the operation to be performed for the instruction. |
|
| 32. |
Can You Explain What Are The Basic Components In A Microprocessor? |
Answer»
|
|
| 33. |
What Do You Understand By Virtualization?mention The Pros And Cons? |
|
Answer» In a way virtualization appears SIMILAR to EMULATION but actually it shares HARDWARE resources from the host OS.
In a way virtualization appears similar to emulation but actually it shares hardware resources from the host OS. |
|
| 34. |
Explain The Difference Between Interrupt Service Routine And Subroutine? |
|
Answer» Subroutine are the part of executing processes(LIKE any PROCESS can CALL a subroutine for achieve TASK),while the INTERRUPT subroutine never be the part.interrupt subroutine are subroutine that are external to a process. Subroutine are the part of executing processes(like any process can call a subroutine for achieve task),while the interrupt subroutine never be the part.interrupt subroutine are subroutine that are external to a process. |
|
| 35. |
What Do You Understand By Partitioning In Reference To Operating Systems? Give Their Advantages And Disadvantages? |
|
Answer» PARTITIONING involves the USER to partition their hard drives and then they can implement / install multiple operating systems on them. The user requires a boot manager to switch between different operating systems.
Partitioning involves the user to partition their hard drives and then they can implement / install multiple operating systems on them. The user requires a boot manager to switch between different operating systems. |
|
| 36. |
How Do We Handle Precise Exceptions Or Interrupts? |
|
Answer» Like java have a feature for HANDLING EXCEPTION handling "PRIME CATCH".the exception like DIVIDE by zero,out of bound. Like java have a feature for handling exception handling "prime catch".the exception like divide by zero,out of bound. |
|
| 37. |
Explain Briefly About Flip-flops? |
|
Answer» Flip flops are also known as bi-stable multi-vibrators. They are able to store one bit of DATA.
Flip flops are also known as bi-stable multi-vibrators. They are able to store one bit of data. |
|
| 38. |
Explain The Cpu Is Busy But You Want To Stop And Do Some Other Task. How Do You Do It? |
Answer»
|
|
| 39. |
Explain The Requirement Of Page-table And The Different Ways In Which The Table Can Be Organized? |
|
Answer» For any computer generally the MEMORY space is lesser as compared to the ADDRESS space this implies that the main memory is lesser as compared to the secondary memory.
For any computer generally the memory space is lesser as compared to the address space this implies that the main memory is lesser as compared to the secondary memory. |
|
| 40. |
Instead Of Just 5-8 Pipe Stages Why Not Have, Say, A Pipeline With 50 Pipe Stages? |
|
Answer» The latency of the ARCHITECTURE INCREASES with the PIPELINE stages. Penalty due to the flushing of the pipeline for instance will also increase CYCLES Per Instruction of the CPU architecture The latency of the architecture increases with the pipeline stages. Penalty due to the flushing of the pipeline for instance will also increase Cycles Per Instruction of the CPU architecture |
|
| 41. |
Briefly Explain The Two Hardware Methods To Establish Priority? |
|
Answer» Two different ways of establishing HARDWARE priority are Daisy Chaining and parallel priority.
Two different ways of establishing hardware priority are Daisy Chaining and parallel priority. |
|
| 42. |
Explain What Are The Different Hazards? How Do We Avoid Them? |
|
Answer» There are situations, CALLED hazards, that prevent the next instruction in the instruction stream from executing during its designated clock cycle. Hazards reduce the performance from the ideal speedup gained by pipelining. There are three classes of Hazards:
There are situations, called hazards, that prevent the next instruction in the instruction stream from executing during its designated clock cycle. Hazards reduce the performance from the ideal speedup gained by pipelining. There are three classes of Hazards: |
|
| 43. |
What Do You Understand Vertical Micro Code, Explain The Designing Strategy Of A Control Unit Coded On Vertical Code? |
|
Answer» Vertical microcode can be considered to be a SEGMENT of CODE or operators that have been clubbed TOGETHER into fields. In this field every micro operation is given a unique value.
Vertical microcode can be considered to be a segment of code or operators that have been clubbed together into fields. In this field every micro operation is given a unique value. |
|
| 44. |
Explain How Many Types Of Memory In Computer Architecture? |
|
Answer» computer have different type of memory LIKE primary memory , AUXILIARY memory , buffer memory , Cache memory , virtual memory ,the work of all memory heterogeneously primary memory is directly communicate with the CPU . Auxiliary memory are used for storing the data for long time . Buffer memory are mainly used for storing the intermediate data between the TRAVEL . cache memory are used for storing the those data that currently required at process time for increase the SPEED of the data . virtual memory are put in between the two memory for increase the speed of data or instruction it means it put between HDD and RAM . computer have different type of memory like primary memory , Auxiliary memory , buffer memory , Cache memory , virtual memory ,the work of all memory heterogeneously primary memory is directly communicate with the CPU . Auxiliary memory are used for storing the data for long time . Buffer memory are mainly used for storing the intermediate data between the travel . cache memory are used for storing the those data that currently required at process time for increase the speed of the data . virtual memory are put in between the two memory for increase the speed of data or instruction it means it put between HDD and RAM . |
|
| 45. |
State Some Of The Common Rules Of Assembly Language? |
|
Answer» Some of the common rules of ASSEMBLY level language are as follows:
Some of the common rules of assembly level language are as follows: |
|
| 46. |
What Is Virtual Memory In Computer? |
|
Answer» Virtual MEMORY is that when the available RAM memory is not sufficient for the system to run the current APPLICATIONS it will TAKE some memory from hard disk.This memory is termed as Virtual memory. Virtual memory is that when the available RAM memory is not sufficient for the system to run the current applications it will take some memory from hard disk.This memory is termed as Virtual memory. |
|
| 47. |
What Are The Different Types Of Interrupts In A Microprocessor System, Explain? |
|
Answer» In the normal EXECUTION of a program there are three TYPES of interrupts that can cause a break: External Interrupts: These types of interrupts generally come from external input / output devices which are connected externally to the processor. They are generally independent and OBLIVIOUS of any programming that is currently running on the processor. Internal Interrupts: They are also known as traps and their causes could be due to some illegal operation or the ERRONEOUS use of data. Instead of being TRIGGERED by an external event they are usually triggered due to any exception that has been caused by the program itself. Some of the causes of these types of interrupts can be due to attempting a division by zero or an invalid opcode etc. Software interrupts: These types if interrupts can occur only during the execution of an instruction. They can be used by a programmer to cause interrupts if need be. The primary purpose of such interrupts is to switch from user mode to supervisor mode. In the normal execution of a program there are three types of interrupts that can cause a break: External Interrupts: These types of interrupts generally come from external input / output devices which are connected externally to the processor. They are generally independent and oblivious of any programming that is currently running on the processor. Internal Interrupts: They are also known as traps and their causes could be due to some illegal operation or the erroneous use of data. Instead of being triggered by an external event they are usually triggered due to any exception that has been caused by the program itself. Some of the causes of these types of interrupts can be due to attempting a division by zero or an invalid opcode etc. Software interrupts: These types if interrupts can occur only during the execution of an instruction. They can be used by a programmer to cause interrupts if need be. The primary purpose of such interrupts is to switch from user mode to supervisor mode. |
|