Digital Electronics Computer and Organisation Set 2

QN1: Where does a computer add and compare data?
a. Hard disk
b. Floppy disk
c. CPU chip
d. Memory chip
Answer

Answer: c. CPU chip

QN2: Which of the following registers is used to keep track of address of the memory
location where the next instruction is located?
a. Memory Address Register
b. Memory Data Register
c. Instruction Register
d. Program Register
Answer

Answer: d. Program Register

QN3: A complete microcomputer system consists of
a. microprocessor
b. memory
c. peripheral equipment
d. all of above
Answer

Answer: d. all of above

QN4: CPU does not perform the operation
a. data transfer
b. logic operation
c. arithmetic operation
d. all of above
Answer

Answer: d. all of above

QN5: Pipelining strategy is called implement
a. instruction execution
b. instruction prefetch
c. instruction decoding
d. instruction manipulation
Answer

Answer: b. instruction prefetch

QN6: A stack is
a. an 8-bit register in the microprocessor
b. a 16-bit register in the microprocessor
c. a set of memory locations in R/WM reserved for storing information temporarily during the execution of computer
d. a 16-bit memory address stored in the program counter
Answer

Answer: c. a set of memory locations in R/WM reserved for storing information temporarily during the execution of computer

QN7: A stack pointer is
a. a 16-bit register in the microprocessor that indicate the beginning of the stack memory.
b. a register that decodes and executes 16-bit arithmetic expression.
c. The first memory location where a subroutine address is stored.
d. a register in which flag bits are stored
Answer

Answer: a. a 16-bit register in the microprocessor that indicate the beginning of the stack memory.

QN8: The branch logic that provides decision making capabilities in the control unit is known as
a. controlled transfer
b. conditional transfer
c. unconditional transfer
d. none of above
Answer

Answer: c. unconditional transfer

QN9: Interrupts which are initiated by an instruction are
a. internal
b. external
c. hardware
d. software
Answer

Answer: d. software

QN10: A time sharing system imply
a. more than one processor in the system
b. more than one program in memory
c. more than one memory in the system
d. None of above
Answer

Answer: b. more than one program in memory

QN11: Processors of all computers, whether micro, mini or mainframe must have
a. ALU
b. Primary Storage
c. Control unit
d. All of above
Answer

Answer: d. All of above

QN12: What is the control unit’s function in the CPU?
a. To transfer data to primary storage
b. to store program instruction
c. to perform logic operations
d. to decode program instruction
Answer

Answer: d. to decode program instruction

QN13: What is meant by a dedicated computer?
a. which is used by one person only
b. which is assigned to one and only one task
c. which does one kind of software
d. which is meant for application software only
Answer

Answer: b. which is assigned to one and only one task

QN14: The most common addressing techiniques employed by a CPU is
a. immediate
b. direct
c. indirect
d. register
e. all of the above
Answer

Answer: e. all of the above

QN15: Pipeline implement
a. fetch instruction
b. decode instruction
c. fetch operand
d. calculate operand
e. execute instruction
f. all of above
Answer

Answer: f. all of above

QN16: Which of the following code is used in present day computing was developed
by IBM corporation?
a. ASCII
b. Hollerith Code
c. Baudot code
d. EBCDIC code
Answer

Answer: d. EBCDIC code

QN17: When a subroutine is called, the address of the instruction following the CALL instructions stored in/on the
a. stack pointer
b. accumulator
c. program counter
d. stack
Answer

Answer: d. stack

QN18: A microprogram written as string of 0’s and 1’s is a
a. symbolic microinstruction
b. binary microinstruction
c. symbolic microprogram
d. binary microprogram
Answer

Answer: d. binary microprogram

QN19: Interrupts which are initiated by an instruction are
a. internal
b. external
c. hardware
d. software
Answer

Answer: b. external

QN20: Memory access in RISC architecture is limited to instructions
a. CALL and RET
b. PUSH and POP
c. STA and LDA
d. MOV and JMP
Answer

Answer: c. STA and LDA

QN21: A collection of 8 bits is called
a. byte
b. word
c. record
Answer

Answer: a. byte

QN22: The ascending order or a data Hierarchy is
a. bit – bytes – fields – record – file – database
b. bit – bytes – record – field – file – database
c. bytes – bit- field – record – file – database
d. bytes -bit – record – field – file – database
Answer

Answer: a. bit – bytes – fields – record – file – database

QN23: How many address lines are needed to address each memory locations in a 2048 x 4 memory chip?
a. 10
b. 11
c. 8
d. 12
Answer

Answer: b. 11

QN24: A computer program that converts an entire program into machine language at one time is called a/an
a. interpreter
b. simulator
c. compiler
d. commander
Answer

Answer: c. compiler

QN25: In immediate addressing the operand is placed
a. in the CPU register
b. after OP code in the instruction
c. in memory
d. in stack
Answer

Answer: b. after OP code in the instruction

QN26: Microprocessor 8085 can address location upto
a. 32K
b. 128K
c. 64K
d. 1M
Answer

Answer: c. 64K

QN27: The ALU and control unit of most of the microcomputers are combined and manufacture on a single silicon chip. What is it called?
a. monochip
b. microprocessor
c. ALU
d. control unit
Answer

Answer: b. microprocessor

QN28: When the RET instruction at the end of subroutine is executed,
a. the information where the stack is iniatialized is transferred to the stack pointer
b. the memory address of the RET instruction is transferred to the program counter
c. two data bytes stored in the top two locations of the stack are transferred to the program counter
d. two data bytes stored in the top two locations of the stack are transferred to the stack
pointer
Answer

Answer: c. two data bytes stored in the top two locations of the stack are transferred to the program counter

QN29: A microporgram is sequencer perform the operation
a. read
b. write
c. execute
d. read and write
e. read and execute
Answer

Answer: e. read and execute

QN30: Interrupts which are initiated by an I/O drive are
a. internal
b. external
c. software
d. all of above
Answer

Answer: b. external

QN31: In half adder EX-OR gate O/P is
a. Carry
b. Remainder
c. Sum
d. None of the above
Answer

Answer: c. Sum

QN32: Half adder consist of ____ & ___ Gates.
a. EX- OR & AND
b. EX- OR & OR
c. EX- OR & NOT
d. None of the above
Answer

Answer: a. EX- OR & AND

QN33: Subtract (1010)2 from (1101)2 using 1st complement
a. (1100)2
b. (0011)2
c. (1001)2
d. (0101)2
Answer

Answer: b. (0011)2

QN34: Using 2’s Complement, subtraction, of (1010)2 from (0011)2 is
a) (0111)2
b) (1001)2
c) -(0111)2
d) -(1001)2
Answer

Answer: c) -(0111)2

QN35: Full adder is constructed by using …………….
a) Two Half Adder& one OR gate
b) two OR gate &one HA
c) One HA & two OR gate
d) One OR gate & one HA
Answer

Answer: a) Two Half Adder& one OR gate

QN36: The K-map eqn for following truth table is—–
A B YQN0: 0 0QN0: 1 0QN1: 0 1QN1: 1 1
a) AB+AB
b) ?B +AB
c) AB+ ?B
d) None of above .
Answer

Answer: c) AB+ ?B

QN37: K-map technique generally used up to ——–Variables
a) 2
b) 8
c) 7
d) 6
Answer

Answer: d) 6

QN38: What will be the hexadecimal equivalent of decimal number (54977)
a. D6C1
b.DC61
c. D6C5
d. none
Answer

Answer: a. D6C1

QN39: The address / data bus in 8085 is ____
a) Multiplexed
b)Demultiplexed
c) Decoded
d) Loaded
Answer

Answer: a) Multiplexed

QN40: A full adder:
a.) adds 2 bits fed to it
b.) adds 3 bits fed to it
c.) adds 2 bits fed to it and produces sum and carry bit
d.) adds 3 bits fed to it and produces sum and carry bit
Answer

Answer: d.) adds 3 bits fed to it and produces sum and carry bit

ed010d383e1f191bdb025d5985cc03fc?s=120&d=mm&r=g

DistPub Team

Distance Publisher (DistPub.com) provide project writing help from year 2007 and provide writing and editing help to hundreds student every year.