

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) .
101. |
What is subroutine nesting? |
A. | having multiple subroutines in a program |
B. | using a linking nest statement to put many subroutines under the same name |
C. | having one routine call the other |
D. | none of the mentioned |
Answer» C. having one routine call the other | |
Explanation: none. |
102. |
The order in which the return addresses are generated and used is |
A. | lifo |
B. | fifo |
C. | random |
D. | highest priority |
Answer» A. lifo | |
Explanation: that is the routine called first is returned first. |
103. |
In case of nested subroutines the return addresses are stored in |
A. | system heap |
B. | special memory buffers |
C. | processor stack |
D. | registers |
Answer» C. processor stack | |
Explanation: in this case, there will be more number of return addresses it is stored on the processor stack. |
104. |
The appropriate return addresses are obtained with the help of in case of nested routines. |
A. | mar |
B. | mdr |
C. | buffers |
D. | stack-pointers |
Answer» D. stack-pointers | |
Explanation: the pointers are used to point to the location on the stack where the address is stored. |
105. |
When parameters are being passed on to the subroutines they are stored in |
A. | registers |
B. | memory locations |
C. | processor stacks |
D. | all of the mentioned |
Answer» D. all of the mentioned | |
Explanation: in the case of, parameter passing the data can be stored on any of the storage space. |
106. |
The most efficient way of handling parameter passing is by using |
A. | general purpose registers |
B. | stacks |
C. | memory locations |
D. | none of the mentioned |
Answer» A. general purpose registers | |
Explanation: by using general purpose registers for the parameter passing we make the process more efficient. |
107. |
The most Flexible way of logging the return addresses of the subroutines is by using |
A. | registers |
B. | stacks |
C. | memory locations |
D. | none of the mentioned |
Answer» B. stacks | |
Explanation: the stacks are used as logs for return addresses of the subroutines. |
108. |
The private work space dedicated to a subroutine is called as |
A. | system heap |
B. | reserve |
C. | stack frame |
D. | allocation |
Answer» C. stack frame | |
Explanation: this work space is where the intermediate values of the subroutines are stored. |
109. |
If the subroutine exceeds the private space allocated to it then the values are pushed onto |
A. | stack |
B. | system heap |
C. | reserve space |
D. | stack frame |
Answer» A. stack | |
Explanation: if the allocated work space is exceeded then the data is pushed onto the system stack. |
110. |
pointer is used to point to parameters passed or local parameters of the subroutine. |
A. | stack pointer |
B. | frame pointer |
C. | parameter register |
D. | log register |
Answer» B. frame pointer | |
Explanation: this pointer is used to track the current position of the stack being used. |
111. |
The reserved memory or private space of the subroutine gets deallocated when |
A. | the stop instruction is executed by the routine |
B. | the pointer reaches the end of the space |
C. | when the routine’s return statement is executed |
D. | none of the mentioned |
Answer» C. when the routine’s return statement is executed | |
Explanation: the work space allocated to a subroutine gets deallocated when the routine is completed. |
112. |
The private space gets allocated to each subroutine when |
A. | the first statement of the routine is executed |
B. | when the context switch takes place |
C. | when the routine gets called |
D. | when the allocate instruction is executed |
Answer» C. when the routine gets called | |
Explanation: when the call statement is executed, simultaneously space also gets allocated. |
113. |
the most suitable data structure used to store the return addresses in the case of nested subroutines. |
A. | heap |
B. | stack |
C. | queue |
D. | list |
Answer» B. stack | |
Explanation: none. |
114. |
In the case of nested subroutines, the stack top is always |
A. | the saved contents of the called sub routine |
B. | the saved contents of the calling sub routine |
C. | the return addresses of the called sub routine |
D. | none of the mentioned |
Answer» A. the saved contents of the called sub routine | |
Explanation: none. |
115. |
The stack frame for each subroutine is present in |
A. | main memory |
B. | system heap |
C. | processor stack |
D. | none of the mentioned |
Answer» C. processor stack | |
Explanation: the memory for the work space is allocated from the processor stack. |
116. |
The data structure suitable for scheduling processes is |
A. | list |
B. | heap |
C. | queue |
D. | stack |
Answer» C. queue | |
Explanation: the queue data structure is generally used for scheduling as it is two directional. |
117. |
The sub-routine service procedure is similar to that of the interrupt service routine in |
A. | method of context switch |
B. | returning |
C. | process execution |
D. | method of context switch & process execution |
Answer» D. method of context switch & process execution | |
Explanation: the subroutine service procedure is the same as the interrupt service routine in all aspects, except the |
118. |
In memory-mapped I/O |
A. | the i/o devices and the memory share the same address space |
B. | the i/o devices have a separate address space |
C. | the memory and i/o devices have an associated address space |
D. | a part of the memory is specifically set aside for the i/o operation |
Answer» A. the i/o devices and the memory share the same address space | |
Explanation: its the different modes of accessing the i/o devices. |
119. |
The usual BUS structure used to connect the I/O devices is |
A. | star bus structure |
B. | multiple bus structure |
C. | single bus structure |
D. | node to node bus structure |
Answer» C. single bus structure | |
Explanation: bus is a collection of address, control and data lines used to connect the various devices of the computer. |
120. |
In intel’s IA-32 architecture there is a separate 16 bit address space for the I/O devices. |
A. | false |
B. | true |
Answer» B. true | |
Explanation: this type of access is called as i/o mapped devices. |
121. |
The system is notified of a read or write operation by |
A. | appending an extra bit of the address |
B. | enabling the read or write bits of the devices |
C. | raising an appropriate interrupt signal |
D. | sending a special signal along the bus |
Answer» D. sending a special signal along the bus | |
Explanation: it is necessary for the processor to send a signal intimating the request as either read or write. |
122. |
To overcome the lag in the operating speeds of the I/O device and the processor we use |
A. | buffer spaces |
B. | status flags |
C. | interrupt signals |
D. | exceptions |
Answer» B. status flags | |
Explanation: the processor operating is much faster than that of the i/o devices, so by using the status flags the processor need not wait till the i/o operation is done. it can continue with its work until the status flag is set. |
123. |
The method of accessing the I/O devices by repeatedly checking the status flags is |
A. | program-controlled i/o |
B. | memory-mapped i/o |
C. | i/o mapped |
D. | none of the mentioned |
Answer» A. program-controlled i/o | |
Explanation: in this method, the processor constantly checks the status flags, and when it finds that the flag is set it performs the appropriate operation. |
124. |
The method of synchronising the processor with the I/O device in which the device sends a signal when it is ready is? |
A. | exceptions |
B. | signal handling |
C. | interrupts |
D. | dma |
Answer» C. interrupts | |
Explanation: this is a method of |
125. |
The interrupt-request line is a part of the |
A. | data line |
B. | control line |
C. | address line |
D. | none of the mentioned |
Answer» B. control line | |
Explanation: the interrupt-request line is a control line along which the device is allowed to send the interrupt signal. |
126. |
The method which offers higher speeds of I/O transfers is |
A. | interrupts |
B. | memory mapping |
C. | program-controlled i/o |
D. | dma |
Answer» D. dma | |
Explanation: in dma the i/o devices are directly allowed to interact with the memory without the intervention of the processor and the transfers take place in the form of blocks increasing the speed of operation. |
127. |
The signal sent to the device from the processor to the device after receiving an interrupt is |
A. | interrupt-acknowledge |
B. | return signal |
C. | service signal |
D. | permission signal |
Answer» A. interrupt-acknowledge | |
Explanation: the processor upon receiving the interrupt should let the device know that its request is received. |
128. |
The time between the receiver of an interrupt and its service is |
A. | interrupt delay |
B. | interrupt latency |
C. | cycle time |
D. | switching time |
Answer» B. interrupt latency | |
Explanation: the delay in servicing of an interrupt happens due to the time is taken for contact switch to take place. |
129. |
A single Interrupt line can be used to service n different devices. |
A. | true |
B. | false |
Answer» A. true | |
Explanation: none. |
130. |
The resistor which is attached to the service line is called |
A. | push-down resistor |
B. | pull-up resistor |
C. | break down resistor |
D. | line resistor |
Answer» B. pull-up resistor | |
Explanation: this resistor is used to pull up the voltage of the interrupt service line. |
131. |
An interrupt that can be temporarily ignored is |
A. | vectored interrupt |
B. | non-maskable interrupt |
C. | maskable interrupt |
D. | high priority interrupt |
Answer» C. maskable interrupt | |
Explanation: the maskable interrupts are usually low priority interrupts which can be ignored if a higher priority process is being executed. |
132. |
Which interrupt is unmaskable? |
A. | rst 5.5 |
B. | rst 7.5 |
C. | trap |
D. | both rst 5.5 and 7.5 |
Answer» C. trap | |
Explanation: the trap is a non- maskable interrupt as it deals with the ongoing process in the processor. the trap is initiated by the process being executed due to lack of data required |
133. |
When dealing with multiple devices interrupts, which mechanism is easy to implement? |
A. | polling method |
B. | vectored interrupts |
C. | interrupt nesting |
D. | none of the mentioned |
Answer» A. polling method | |
Explanation: in this method, the processor checks the irq bits of all the devices, whichever is enabled first that device is serviced. |
134. |
The interrupt servicing mechanism in which the requesting device identifies itself to the processor to be serviced is |
A. | polling |
B. | vectored interrupts |
C. | interrupt nesting |
D. | simultaneous requesting |
Answer» B. vectored interrupts | |
Explanation: none. |
135. |
In vectored interrupts, how does the device identify itself to the processor? |
A. | by sending its device id |
B. | by sending the machine code for the interrupt service routine |
C. | by sending the starting address of the service routine |
D. | none of the mentioned |
Answer» C. by sending the starting address of the service routine | |
Explanation: by sending the starting address of the routine the device ids the routine required and thereby identifying itself. |
136. |
The code sent by the device in vectored interrupt is long. |
A. | upto 16 bits |
B. | upto 32 bits |
C. | upto 24 bits |
D. | 4-8 bits |
Answer» D. 4-8 bits | |
Explanation: none. |
137. |
The starting address sent by the device in vectored interrupt is called as |
A. | location id |
B. | interrupt vector |
C. | service location |
D. | service id |
Answer» B. interrupt vector | |
Explanation: none. |
138. |
The processor indicates to the devices that it is ready to receive interrupts |
A. | by enabling the interrupt request line |
B. | by enabling the irq bits |
C. | by activating the interrupt acknowledge line |
D. | none of the mentioned |
Answer» C. by activating the interrupt acknowledge line | |
Explanation: when the processor activates the acknowledge line the devices send their interrupts to the processor. |
139. |
Which table handle stores the addresses of the interrupt handling sub- routines? |
A. | interrupt-vector table |
B. | vector table |
C. | symbol link table |
D. | none of the mentioned |
Answer» A. interrupt-vector table | |
Explanation: none. |
140. |
method is used to establish priority by serially connecting all devices that request an interrupt. |
A. | vectored-interrupting |
B. | daisy chain |
C. | priority |
D. | polling |
Answer» B. daisy chain | |
Explanation: in the daisy chain mechanism, all the devices are connected using a single request line and they’re serviced based on the interrupting device’s priority. |
141. |
In daisy chaining device 0 will pass the signal only if it has |
A. | interrupt request |
B. | no interrupt request |
C. | both no interrupt and interrupt request |
D. | none of the mentioned |
Answer» B. no interrupt request | |
Explanation: in daisy chaining since there is only one request line and only one acknowledges line, the acknowledge signal passes from device to device until the one with the interrupt is found. |
142. |
interrupt method uses register whose bits are set separately by interrupt signal for each device. |
A. | parallel priority interrupt |
B. | serial priority interrupt |
C. | daisy chaining |
D. | none of the mentioned |
Answer» A. parallel priority interrupt | |
Explanation: none. |
143. |
register is used for the purpose of controlling the status of each interrupt request in parallel priority interrupt. |
A. | mass |
B. | mark |
C. | make |
D. | mask |
Answer» D. mask | |
Explanation: none. |
144. |
The added output of the bits of the interrupt register and the mask register is set as an input of |
A. | priority decoder |
B. | priority encoder |
C. | process id encoder |
D. | multiplexer |
Answer» B. priority encoder | |
Explanation: in a parallel priority |
145. |
Interrupts initiated by an instruction is called as |
A. | internal |
B. | external |
C. | hardware |
D. | software |
Answer» B. external | |
Explanation: none. |
146. |
If during the execution of an instruction an exception is raised then |
A. | the instruction is executed and the exception is handled |
B. | the instruction is halted and the exception is handled |
C. | the processor completes the execution and saves the data and then handle the exception |
D. | none of the mentioned |
Answer» B. the instruction is halted and the exception is handled | |
Explanation: since the interrupt was raised during the execution of the instruction, the instruction cannot be executed and the exception is served immediately. |
147. |
is/are types of exceptions. |
A. | trap |
B. | interrupt |
C. | system calls |
D. | all of the mentioned |
Answer» D. all of the mentioned | |
Explanation: none. |
148. |
The program used to find out errors is called |
A. | debugger |
B. | compiler |
C. | assembler |
D. | scanner |
Answer» A. debugger | |
Explanation: debugger is a program used to detect and correct errors in the program. |
149. |
The two facilities provided by the debugger is |
A. | trace points |
B. | break points |
C. | compile |
D. | both trace and break points |
Answer» D. both trace and break points | |
Explanation: the debugger provides us with the two facilities to improve the checking of errors. |
150. |
In trace mode of operation is |
A. | the program is interrupted after each detection |
B. | the program will not be stopped and the errors are sorted out after the complete program is scanned |
C. | there is no effect on the program, i.e the program is executed without rectification of errors |
D. | the program is halted only at specific points |
Answer» A. the program is interrupted after each detection | |
Explanation: in trace mode, the program is checked line by line and if errors are detected then exceptions are raised right away. |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.