CoolInterview.com - World's Largest Collection of Interview Questions & Answers, FAQs, queries, sample papers, exam papers, dumps, what, why, how, where, when questions
Our Services
Get 9,000 Interview Questions & Answers in an eBook.




Get it now !!
Send your Resume to 6000 Companies
Computer Architecture and Design Interview Questions & Answers - Learning Mode
COOLINTERVIEW.COM COMPUTER HARDWARE INTERVIEW QUESTIONS COMPUTER ARCHITECTURE AND DESIGN INTERVIEW QUESTIONS QUESTIONS & ANSWERS - LEARNING MODE

Computer Architecture and Design Interview Questions & Answers - Learning Mode

Computer Architecture is the conceptual design and fundamental operational structure of a computer system. It is the technical drawings and functional description of all design requirements (especially speeds and interconnections), it is how to design and implement various parts of a computer ? focusing largely on the way by which the central processing unit (CPU) operates internally and how it accesses addresses in memory. It can be defined as the science and art of selecting and interconnecting hardware components to create computers that meet functional, performance and cost goals.

Try Computer Architecture and Design Interview Questions & Answers - Exam Mode

1 2 Next

Sort By : Latest First | Oldest First | By Rating

Computer Architecture and Design Interview Questions & Answers - Learning Mode
Try Computer Architecture and Design Interview Questions & Answers - Exam Mode
Question: What is a Snooping cache?

Answer:
Question: What are the five stages in a DLX pipeline?

Answer: The instruction sets can be differentiated by

* Operand storage in the CPU
* Number of explicit operands per instruction
* Operand location
* Operations
* Type and size of operands

Submitted by Sowjanya Rao (Sowjanya_Rao@Dell.com) Source: CoolInterview.com
Question: What?s the difference between Write-Through and Write-Back Caches? Explain advantages and disadvantages of each.

Answer:
Question: what is the difference between interrupt service routine and subroutine ?

Answer: Subroutine are the part of executing processes(like any process can call a subroutine for achieve task),while the interrupt subroutine never be the part.interrupt subroutine are subroutine that are external to a process. Source: CoolInterview.com
Question: can u send me some questions on general computer concepts because i am preparing for keane software there they are asking questions on computers

Answer:
Question: Convert 65(Hex) to Binary.

Answer:
Question: How do you handle precise exceptions or interrupts?

Answer:
Question: Instead of just 5-8 pipe stages why not have, say, a pipeline with 50 pipe stages?

Answer:
Question: The CPU is busy but you want to stop and do some other task. How do you do it?

Answer:
Question: What is a cache?

Answer: It turns out that caching is an important computer-science process that appears on every computer in a variety of forms. There are memory caches, hardware and software disk caches, page caches and more. Virtual memory is even a form of caching.
Caching is a technology based on the memory subsystem of your computer. The main purpose of a cache is to accelerate your computer while keeping the price of the computer low. Caching allows you to do your computer tasks more rapidly. Cache technology Source: CoolInterview.com
Question: What are the different hazards? How do you avoid them?


Answer: There are situations, called hazards, that prevent the next instruction in the instruction stream from executing during its designated clock cycle. Hazards reduce the performance from the ideal speedup gained by pipelining.


There are three classes of Hazards:
1. Structural Hazards: It arise from resource conflicts when the hardware cannot support all possible combinations of instructions simultaniously in ovelapped execution.

2. Data Hazards: It arise when an instruction dep Source: CoolInterview.com
Question: What are the different hazards? How do you avoid them?

Answer: There are situations, called hazards, that prevent the next instruction in the instruction stream from executing during its designated clock cycle. Hazards reduce the performance from the ideal speedup gained by pipelining. There are three classes of Hazards:

1. Structural Hazards: It arise from resource conflicts when the hardware cannot support all possible combinations of instructions simultaniously in ovelapped execution.

2. Data Hazards: It arise when an instruction depends on Source: CoolInterview.com
Question: What is pipelining?

Answer: A technique used in advanced microprocessors where the microprocessor begins executing a second instuction before the first has been completed. That is, several instructions are in the pipeline simultaneously, each at a different processing stage.

Submitted by Sowjanya Rao (Sowjanya_Rao@Dell.com)

________

Pipeline is a device within the CPU that enables it to fetch (read) instructions in advance of executing them - so that when an instruction is completed, the next one is re Source: CoolInterview.com
Question: Cache Size is 64KB, Block size is 32B and the cache is Two-Way Set Associative. For a 32-bit physical address, give the division between Block Offset, Index and Tag.

Answer:
Question: What is the difference between interrupt service routine and subroutine?

Answer: Subroutine are the part of executing processes(like any process can call a subroutine for achieve task),while the interrupt subroutine never be the part.interrupt subroutine are subroutine that are external to a process. Source: CoolInterview.com
Question: What is Virtual Memory?

Answer: Virtual memory is a concept that, when implemented by a computer and its operating system, allows programmers to use a very large range of memory or storage addresses for stored data. The computing system maps the programmer's virtual addresses to real hardware storage addresses. Usually, the programmer is freed from having to be concerned about the availability of data storage.<br> <br>In addition to managing the mapping of virtual storage addresses to real storage addresses, a Source: CoolInterview.com
Question: What is Cache Coherency?

Answer: Cache coherence refers to the integrity of data stored in local caches of a shared resource. Cache coherence is a special case of memory coherence. When clients in a system, particularly CPUs in a multiprocessing system cache occurs. Source: CoolInterview.com
Question: What is your Responsibilities in your project ?


Answer: While doing a project ,certain rules are there.
System study
Feasibility study
System analysis
System design
Coding
Testing
Implementation
Maintenance
in this which is your role that is your responsibility



Source: CoolInterview.com
Question: What is ACBF(Hex) divided by 16?

Answer:
Question: For a pipeline with ?n? stages, what?s the ideal throughput? What prevents us from achieving this ideal throughput?

Answer: With "n" stage pipeline the throughput should be "n" instructions.
As the pipe stages can't be perfectly balanced ( time to perform task in a pipeline stage), furthermore pipeline does involve some
overheads.

Submitted by Rajesh Taneja (rajesht@embed.isquareit.ac.in) Source: CoolInterview.com

1 2 Next



India News Network
Latest 20 Questions
Payment of time- barred debt is: (a) Valid (b) Void (c) Illegal (d) Voidable
Consideration is defined in the Indian Contract Act,1872 in: (a) Section 2(f) (b) Section 2(e) (c) Section 2(g) (d) Section 2(d)
Which of the following is not an exception to the rule, "No consideration, No contract": (a) Natural love and affection (b) Compensation for involuntary services (c) Completed gift (d) Agency
Consideration must move at the desire of: (a) The promisor (b) The promisee (c) The promisor or any other party (d) Both the promisor and the promisee
An offer which is open for acceptance over a period of time is: (a) Cross Offer (b) Counter Offer (c) Standing Offer (d) Implied Offer
Specific offer can be communicated to__________ (a) All the parties of contract (b) General public in universe (c) Specific person (d) None of the above
_________ amounts to rejection of the original offer. (a) Cross offer (b) Special offer (c) Standing offer (d) Counter offer
A advertises to sell his old car by advertising in a newspaper. This offer is caleed: (a) General Offer (b) Special Offer (c) Continuing Offer (d) None of the above
In case a counter offer is made, the original offer stands: (a) Rejected (b) Accepted automatically (c) Accepted subject to certain modifications and variations (d) None of the above
In case of unenforceable contract having some technical defect, parties (a) Can sue upon it (b) Cannot sue upon it (c) Should consider it to be illegal (d) None of the above
If entire specified goods is perished before entering into contract of sale, the contract is (a) Valid (b) Void (c) Voidable (d) Cancelled
______________ contracts are also caled contracts with executed consideration. (a) Unilateral (b) Completed (c) Bilateral (d) Executory
A offers B to supply books @ Rs 100 each but B accepts the same with condition of 10% discount. This is a case of (a) Counter Offer (b) Cross Offer (c) Specific Offer (d) General Offer
_____________ is a game of chance. (a) Conditional Contract (b) Contingent Contract (c) Wagering Contract (d) Quasi Contract
There is no binding contract in case of _______ as one's offer cannot be constructed as acceptance (a) Cross Offer (b) Standing Offer (c) Counter Offer (d) Special Offer
An offer is made with an intention to have negotiation from other party. This type of offer is: (a) Invitation to offer (b) Valid offer (c) Voidable (d) None of the above
When an offer is made to the world at large, it is ____________ offer. (a) Counter (b) Special (c) General (d) None of the above
Implied contract even if not in writing or express words is perfectly _______________ if all the conditions are satisfied:- (a) Void (b) Voidable (c) Valid (d) Illegal
A specific offer can be accepted by ___________. (a) Any person (b) Any friend to offeror (c) The person to whom it is made (d) Any friend of offeree
An agreement toput a fire on a person's car is a ______: (a) Legal (b) Voidable (c) Valid (d) Illegal
Cache = 0.03125 Seconds