DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO
CS/APR 2010/CSC159/428/ITC150
CONFIDENTIAL
UNIVERSITI TEKNOLOGI MARA
FINAL EXAMINATION
COURSE
COMPUTER ORGANISATION
COURSE CODE
CSC159/428/ITC150
EXAMINATION
APRIL 2010
TIME
3 HOURS
INSTRUCTIONS TO CANDIDATES
1.
This question paper consists of three (3) parts:
2.
Answer ALL questions from all three (3) parts:
i)
ii)
PART A (25 Questions)
PART B (7 Questions)
PART C (4 Questions)
Answer PART A in the Objective Answer Sheet.
Answer PART B and C in the Answer Booklet. Start each answer on a new page.
3.
Do not bring any material into the examination room unless permission is given by the
invigilator.
4.
Please check to make sure that this examination pack consists of:
i)
ii)
iii)
the Question Paper
an Answer Booklet - provided by the Faculty
an Objective Answer Sheet - provided by the Faculty
DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO
This examination paper consists of 10 printed pages
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
2
CS/APR 2010/CSC159/428/ITC150
PART A (25 MARKS)
1.
In 1946 John Mauchly and J. Eckert come out with first digital computer called
A.
B.
C.
D.
2.
Which of the following is/are the advantages of transistor?
A.
B.
C.
D.
3.
57
-57
185
-185
What is the decimal representation of OCTAL number 256?
A.
B.
C.
D.
5.
Smaller and cheaper.
Dissipates less heat
Consumes less power.
All of the above
What is the decimal equivalent value of the sign-and-magnitude binary sequence
10111001?
A.
B.
C.
D.
4.
ABC
UNIVAC
IAS
ENIAC
153
163
173
174
Calculate 57.58 in decimal.
A.
B.
C.
D.
47.625
71.625
57.625
47.5
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
3
CONFIDENTIAL
CS/APR2010/CSC159/428/ITC150
The 1 's complement of a number is performed by simply.
A.
B.
C.
D.
changing
changing
changing
changing
number.
every 0 to a 1 and every 1 to a 0, including the sign bit.
every 0 to a 1 and every 1 to a 0, not including the sign bit.
the first three digits from left of the complemented number.
every 0 to 1 and every 1 to 0 then, adding 1 to the complemented
Which of the following are the functions of control unit?
It's
It's
It's
It's
A.
B.
C.
D.
issuing the signals necessary to control the operation of microprocessor.
responsible for sequencing actions.
decoding of the instruction.
holding the actual instruction being executed currently by the computer.
, ii, iii and iv
ii and iv
and ii
, ii and iv
When instruction is called from memory, the address of the instruction must be
placed on the
A.
B.
C.
D.
data bus
control bus
address bus
instruction bus
holds the adc
address in the memory, which is to be "opened" for
The
data.
A.
B.
C.
D.
10.
memory data register
memory buffer register
memory address register
instruction register
Given a computer's memory specification is 128KB. What is the capacity of the
memory in bytes?
A.
B.
C.
D.
131072
131071
134217728
134217727
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
11.
The
execute cycle.
A.
B.
C.
D.
12.
machine cycle
instruction cycle
decode cycle
address cycle
A call for the microprocessor to interact or service the interrupting unit.
Technique/approach to taking care of peripheral devices.
An action taken by the processor when an interrupt occurs.
None of the above
Logical way
Hardware or software
First come first serve
Assigning a priority number to each interrupts
After execution of PUSH instruction in 8086 machines,
A.
B.
C.
D.
15.
is composed of two main cycles, the fetch cycle and the
Which of the following is NOT the method used to establish priorities for various
interrupt?
A.
B.
C.
D.
14.
CS/APR 2010/CSC159/428/ITC150
What is an interrupt handler program?
A.
B.
C.
D.
13.
4
SP
SP
SP
SP
is decremented by one
is neither incremented nor decremented
is incremented by one
is incremented by two
The following statements are TRUE about stack EXCEPT:
A.
B.
C.
D.
The location where the contents of the registers in the microprocessor are
temporary stored.
The information in the stack is stored in a Last In First Out (LIFO)
configuration.
It is possible to save only some of the register in a microprocessor when
building a stack.
The stack pointer register always point to the first entry on the stack.
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
16.
18.
i.
ii.
iii.
iv.
RISC
Cache memory
Memory interleaving
Wide path memory access
A.
B.
C.
D.
i and ii
i, ii and iii
ii, iii and iv
i, iii and iv
The situation in which the request is not present in cache memory is known as a
hit
miss
tag
hit ratio
A method by which each CPU has identical access to the operating system and to all
system resources is
.
A.
B.
C.
D.
20.
CISC architecture
RISC architecture
virtual memory
pipeline machine
Which of the following approaches are used to enhance the performance of
memory?
A.
B.
C.
D.
19.
CS/APR 2010/CSC159/428/ITC150
The common way to upgrade performance of processors is by doing more than one
task at one time, and this concept is practiced in the
.
A.
B.
C.
D.
17.
5
master-slave multiprocessing
symmetrical multiprocessing
parallel processing
serial processing
"They represent locations in the program, but they do not have any reality outside the
program /tee/f."This statement refers to
.
A.
B.
C.
D.
physical addresses
paging
logical addresses
none of the above
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
21.
7Fh
3Fh
FBh
7Bh
If a CMP instruction is used to compare two values, which combination of flags can
tell you if one operand were less than the other?
A.
B.
C.
D.
25.
dividing by 2
adding 2
multiplying by 2
subtracting 2
If an arithmetic shift right is performed on the byte F7h, the result will be:
A.
B.
C.
D.
24.
1
2
4
16
Shifting a byte-sized value one place to the left is equivalent to:
A.
B.
C.
D.
23.
CS/APR 2010/CSC159/428/ITC150
In the 8086 Intel processor, how many memory locations will be occupied if a 16-bit
memory address is to be stored in memory?
A.
B.
C.
D.
22.
6
CF and SF
CF and PF
CF and OF
CFandZF
What is the value of accumulator after second time executing the following
instructions?
NEXT: MOV
MOV
INC
DEC
JMP
A.
B.
C.
D.
AX, OOOBh
BX, 0007H
BX
AX
NEXT
OOlOh
OOOAh
0009h
0008h
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
7
CS/APR 2010/CSC159/428/ITC150
PART B (50 MARKS)
QUESTION 1
a)
Define the THREE (3) major components that interact in a computer system that
follows the von Neumann architecture.
(6 marks)
QUESTION 2
a)
Convert the following numbers into its respective numbering system. Show your
work.
i.
ii.
101100112 to octal representation
5CB1 6 to binary representation
(4 marks)
b)
Perform the following arithmetic operations using two's complement method. Show
your work.
i.
23-io— 31io
ii.
— 31-10 — 23io
iii.
508 - 738
(6 marks)
QUESTION 3
a)
Convert the IEEE single precision floating point number, 3F000000H into decimal
form.
(5 marks)
b)
Convert -71 1 0 to IEEE single precision floating point representation. Give your
answer in hexadecimal form.
(5 marks)
QUESTION 4
a)
List TWO (2) basic I/O system architectures.
(2 marks)
b)
List FIVE (5) components involved in the interaction/communication CPU and the I/O
peripherals/devices.
(5 marks)
c)
Draw a diagram to show the connections between the components listed in 4 b).
(2 marks)
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
8
CS/APR 2010/CSC159/428/ITC150
QUESTION 5
Describe any TWO (2) differences between the parallel bus and serial bus.
(6 marks)
QUESTION 6
a)
Based on the following instructions, draw a stack diagram starting from address
FF03h.
Instructions:
MOV A X , 1245h
MOV BX, A B l l h
MOV CX, 0022h
PUSH AX
PUSH CX
(3 marks)
b)
Give the value of the stack pointer register after the stack building is completed.
(1 mark)
c)
Rearrange the words in the stack using Big Endian format.
(1 mark)
QUESTION 7
Briefly explain any TWO (2) main features that are used to differentiate an RISC design from
a CISC design.
(4 marks)
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
9
CS/APR 2010/CSC159/428/ITC150
PART C (25 MARKS)
QUESTION 1
Verify whether the following statements are TRUE or FALSE.
a)
The XCHG instruction copies data from one operand to another operand.
b)
The INC and DEC instructions add 1 to or subtract 1 from a single operand,
respectively.
c)
TEST does not modify the destination operand.
d)
The SAR instruction shifts all the bits in the destination operand to the left one bit
and makes copy of the sign bit.
e)
The Zero flag is set when the result of arithmetic or logical operations generates a
result of non-zero.
(5 marks)
QUESTION 2
Determine the result of executing the following sequence of assembly instructions. Show
your work.
a)
b)
c)
MOV AL, 9A
MOV CL, 3
SHR AL, CL
AX:
, CF:
MOV
MOV
ROR
MOV
MOV
MUL
AX:
, BX:
, CF:
DX:
, SF:
, ZF:
BX,
CL,
BX,
AL,
BL,
BL
234A
02
CL
25H
65H
MOV DH, 54H
XOR DH, 78H
(8 marks)
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
10
CS/APR 2010/CSC159/428/ITC150
QUESTION 3
By using shift instructions, write a program segment in assembly language for the following
arithmetic expression (assume the result is in 16-bits form):
RESULT = ( 5 0 i s * 4 1 6 )
/
2016
(5 marks)
QUESTION 4
a)
Trace the output of the following program segment:
MOV AX, OOOOh
MOV CX, 0005h
HERE: ADD AX, CX
LOOP HERE
INT 21h
(6 marks)
b)
What is the purpose of the above program?
(1 mark)
END OF QUESTION PAPER
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
UNIVERSITI TEKNOLOGI MARA
FINAL EXAMINATION
COURSE
COMPUTER ORGANISATION
COURSE CODE
CSC159/428/ITC150
EXAMINATION
APRIL 2010
TIME
3 HOURS
INSTRUCTIONS TO CANDIDATES
1.
This question paper consists of three (3) parts:
2.
Answer ALL questions from all three (3) parts:
i)
ii)
PART A (25 Questions)
PART B (7 Questions)
PART C (4 Questions)
Answer PART A in the Objective Answer Sheet.
Answer PART B and C in the Answer Booklet. Start each answer on a new page.
3.
Do not bring any material into the examination room unless permission is given by the
invigilator.
4.
Please check to make sure that this examination pack consists of:
i)
ii)
iii)
the Question Paper
an Answer Booklet - provided by the Faculty
an Objective Answer Sheet - provided by the Faculty
DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO
This examination paper consists of 10 printed pages
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
2
CS/APR 2010/CSC159/428/ITC150
PART A (25 MARKS)
1.
In 1946 John Mauchly and J. Eckert come out with first digital computer called
A.
B.
C.
D.
2.
Which of the following is/are the advantages of transistor?
A.
B.
C.
D.
3.
57
-57
185
-185
What is the decimal representation of OCTAL number 256?
A.
B.
C.
D.
5.
Smaller and cheaper.
Dissipates less heat
Consumes less power.
All of the above
What is the decimal equivalent value of the sign-and-magnitude binary sequence
10111001?
A.
B.
C.
D.
4.
ABC
UNIVAC
IAS
ENIAC
153
163
173
174
Calculate 57.58 in decimal.
A.
B.
C.
D.
47.625
71.625
57.625
47.5
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
3
CONFIDENTIAL
CS/APR2010/CSC159/428/ITC150
The 1 's complement of a number is performed by simply.
A.
B.
C.
D.
changing
changing
changing
changing
number.
every 0 to a 1 and every 1 to a 0, including the sign bit.
every 0 to a 1 and every 1 to a 0, not including the sign bit.
the first three digits from left of the complemented number.
every 0 to 1 and every 1 to 0 then, adding 1 to the complemented
Which of the following are the functions of control unit?
It's
It's
It's
It's
A.
B.
C.
D.
issuing the signals necessary to control the operation of microprocessor.
responsible for sequencing actions.
decoding of the instruction.
holding the actual instruction being executed currently by the computer.
, ii, iii and iv
ii and iv
and ii
, ii and iv
When instruction is called from memory, the address of the instruction must be
placed on the
A.
B.
C.
D.
data bus
control bus
address bus
instruction bus
holds the adc
address in the memory, which is to be "opened" for
The
data.
A.
B.
C.
D.
10.
memory data register
memory buffer register
memory address register
instruction register
Given a computer's memory specification is 128KB. What is the capacity of the
memory in bytes?
A.
B.
C.
D.
131072
131071
134217728
134217727
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
11.
The
execute cycle.
A.
B.
C.
D.
12.
machine cycle
instruction cycle
decode cycle
address cycle
A call for the microprocessor to interact or service the interrupting unit.
Technique/approach to taking care of peripheral devices.
An action taken by the processor when an interrupt occurs.
None of the above
Logical way
Hardware or software
First come first serve
Assigning a priority number to each interrupts
After execution of PUSH instruction in 8086 machines,
A.
B.
C.
D.
15.
is composed of two main cycles, the fetch cycle and the
Which of the following is NOT the method used to establish priorities for various
interrupt?
A.
B.
C.
D.
14.
CS/APR 2010/CSC159/428/ITC150
What is an interrupt handler program?
A.
B.
C.
D.
13.
4
SP
SP
SP
SP
is decremented by one
is neither incremented nor decremented
is incremented by one
is incremented by two
The following statements are TRUE about stack EXCEPT:
A.
B.
C.
D.
The location where the contents of the registers in the microprocessor are
temporary stored.
The information in the stack is stored in a Last In First Out (LIFO)
configuration.
It is possible to save only some of the register in a microprocessor when
building a stack.
The stack pointer register always point to the first entry on the stack.
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
16.
18.
i.
ii.
iii.
iv.
RISC
Cache memory
Memory interleaving
Wide path memory access
A.
B.
C.
D.
i and ii
i, ii and iii
ii, iii and iv
i, iii and iv
The situation in which the request is not present in cache memory is known as a
hit
miss
tag
hit ratio
A method by which each CPU has identical access to the operating system and to all
system resources is
.
A.
B.
C.
D.
20.
CISC architecture
RISC architecture
virtual memory
pipeline machine
Which of the following approaches are used to enhance the performance of
memory?
A.
B.
C.
D.
19.
CS/APR 2010/CSC159/428/ITC150
The common way to upgrade performance of processors is by doing more than one
task at one time, and this concept is practiced in the
.
A.
B.
C.
D.
17.
5
master-slave multiprocessing
symmetrical multiprocessing
parallel processing
serial processing
"They represent locations in the program, but they do not have any reality outside the
program /tee/f."This statement refers to
.
A.
B.
C.
D.
physical addresses
paging
logical addresses
none of the above
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
21.
7Fh
3Fh
FBh
7Bh
If a CMP instruction is used to compare two values, which combination of flags can
tell you if one operand were less than the other?
A.
B.
C.
D.
25.
dividing by 2
adding 2
multiplying by 2
subtracting 2
If an arithmetic shift right is performed on the byte F7h, the result will be:
A.
B.
C.
D.
24.
1
2
4
16
Shifting a byte-sized value one place to the left is equivalent to:
A.
B.
C.
D.
23.
CS/APR 2010/CSC159/428/ITC150
In the 8086 Intel processor, how many memory locations will be occupied if a 16-bit
memory address is to be stored in memory?
A.
B.
C.
D.
22.
6
CF and SF
CF and PF
CF and OF
CFandZF
What is the value of accumulator after second time executing the following
instructions?
NEXT: MOV
MOV
INC
DEC
JMP
A.
B.
C.
D.
AX, OOOBh
BX, 0007H
BX
AX
NEXT
OOlOh
OOOAh
0009h
0008h
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
7
CS/APR 2010/CSC159/428/ITC150
PART B (50 MARKS)
QUESTION 1
a)
Define the THREE (3) major components that interact in a computer system that
follows the von Neumann architecture.
(6 marks)
QUESTION 2
a)
Convert the following numbers into its respective numbering system. Show your
work.
i.
ii.
101100112 to octal representation
5CB1 6 to binary representation
(4 marks)
b)
Perform the following arithmetic operations using two's complement method. Show
your work.
i.
23-io— 31io
ii.
— 31-10 — 23io
iii.
508 - 738
(6 marks)
QUESTION 3
a)
Convert the IEEE single precision floating point number, 3F000000H into decimal
form.
(5 marks)
b)
Convert -71 1 0 to IEEE single precision floating point representation. Give your
answer in hexadecimal form.
(5 marks)
QUESTION 4
a)
List TWO (2) basic I/O system architectures.
(2 marks)
b)
List FIVE (5) components involved in the interaction/communication CPU and the I/O
peripherals/devices.
(5 marks)
c)
Draw a diagram to show the connections between the components listed in 4 b).
(2 marks)
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
8
CS/APR 2010/CSC159/428/ITC150
QUESTION 5
Describe any TWO (2) differences between the parallel bus and serial bus.
(6 marks)
QUESTION 6
a)
Based on the following instructions, draw a stack diagram starting from address
FF03h.
Instructions:
MOV A X , 1245h
MOV BX, A B l l h
MOV CX, 0022h
PUSH AX
PUSH CX
(3 marks)
b)
Give the value of the stack pointer register after the stack building is completed.
(1 mark)
c)
Rearrange the words in the stack using Big Endian format.
(1 mark)
QUESTION 7
Briefly explain any TWO (2) main features that are used to differentiate an RISC design from
a CISC design.
(4 marks)
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
9
CS/APR 2010/CSC159/428/ITC150
PART C (25 MARKS)
QUESTION 1
Verify whether the following statements are TRUE or FALSE.
a)
The XCHG instruction copies data from one operand to another operand.
b)
The INC and DEC instructions add 1 to or subtract 1 from a single operand,
respectively.
c)
TEST does not modify the destination operand.
d)
The SAR instruction shifts all the bits in the destination operand to the left one bit
and makes copy of the sign bit.
e)
The Zero flag is set when the result of arithmetic or logical operations generates a
result of non-zero.
(5 marks)
QUESTION 2
Determine the result of executing the following sequence of assembly instructions. Show
your work.
a)
b)
c)
MOV AL, 9A
MOV CL, 3
SHR AL, CL
AX:
, CF:
MOV
MOV
ROR
MOV
MOV
MUL
AX:
, BX:
, CF:
DX:
, SF:
, ZF:
BX,
CL,
BX,
AL,
BL,
BL
234A
02
CL
25H
65H
MOV DH, 54H
XOR DH, 78H
(8 marks)
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
10
CS/APR 2010/CSC159/428/ITC150
QUESTION 3
By using shift instructions, write a program segment in assembly language for the following
arithmetic expression (assume the result is in 16-bits form):
RESULT = ( 5 0 i s * 4 1 6 )
/
2016
(5 marks)
QUESTION 4
a)
Trace the output of the following program segment:
MOV AX, OOOOh
MOV CX, 0005h
HERE: ADD AX, CX
LOOP HERE
INT 21h
(6 marks)
b)
What is the purpose of the above program?
(1 mark)
END OF QUESTION PAPER
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL