DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO

CS/APR 2009/CSC159/ITC150

CONFIDENTIAL

UNIVERSITI TEKNOLOGI MARA
FINAL EXAMINATION

COURSE

COMPUTER ORGANIZATION

COURSE CODE

CSC159/ITC150

EXAMINATION

APRIL 2009

TIME


3 HOURS

INSTRUCTIONS TO CANDIDATES
1.

This question paper consists of three (3) parts : PART A (25 Questions)
PART B (7 Questions)
PART C (4 Question)

2.

Answer ALL questions from all three (3) parts :
i)
ii)

Answer PART A in the Objective Answer Sheet
Answer PART B and PART C in the Answer Booklet. Start each answer on a new
page.

3.


Do not bring any material into the examination room unless permission is given by the
invigilator.

4.

Please check to make sure that this examination pack consists of:
)
)
)

the Question Paper
an Answer Booklet - provided by the Faculty
an Objective Answer Sheet - provided by the Faculty

DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO
This examination paper consists of 11 printed pages
© Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL


CS/APR 2009/CSC159/ITC150

2

CONFIDENTIAL

PART A (25 MARKS)

1. First generation computers were
A.
B.
C.
D.

.

large and heavy machines used by the military
large and heavy machines used for solving crossword puzzles
small and sleek machines used for solving crossword puzzles

similar to laptops

2. In the personal computer market segment, IBM championed the notion of open
architecture which generally means
.
A.
B.
C.
D.

making computers easy to use
designing more stylish computers
designing computers that think and act like humans
putting products from various companies together as a package

3. Charles Babbage produced an early prototype of the computer which he called the

A.
B.
C.

D.

Lovelace Music Machine
Difference Engine
ENIAC
Computer

4. Dynamic RAM is called "dynamic" because
A.
B.
C.
D.

it is faster than static RAM (SRAM)
it must be refreshed to keep the data valid
it has great features
it changes its value every clock cycle

5. Pipelining is a technique that allows
A.

B.
C.
D.

.

the CPU to be more efficient at handling multiple tasks at one time
data to be read more quickly by the CPU
RAM to be copied to the hard disk drive very quickly
cache memory to be ignored

© Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL

3

CS/APR 2009/CSC159/ITC150


6. Peripherals communicate with the CPU through the
A.
B.
C.
D.
7.

local buses
control unit
CPU registers
expansion buses

, which consists of small blocks of memory located next to the CPU chip, is a
layer of storage that has faster access than RAM.
A.
B.
C.
D.


Flash memory
Cache memory
ROM
Virtual storage

8. What are the five main components of a computer system?
A.
B.
C.
D.

CPU, CD-ROM, mouse, keyboard, sound card.
Memory, video card, monitor, software, hardware.
Modem, keyboard, word processor, printer, screen.
CPU, memory, system bus, input, output.

9. Which of the following extracts instructions from memory and passes them to other parts
of the computer?
A.
B.

C.
D.

Control unit
RAM
Data bus
ALU

10. Word size is the
A.
B.
C.
D.

size of the bus
number of bits the processor can interpret and execute at a given time
pace of the system clock
amount of time it takes the processor to read instructions from memory

11. A(n)

computer.
A.
B.
C.
D.

is an interface through which external devices are connected to your

processor bus
memory bus
interface unit
I/O interface

© Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL

4


CS/APR 2009/CSC159/ITC150

12. Whenever a word is to be transferred to main memory, the word must pass through the

A.
B.
C.
D.

memory data register
memory address register
input-output register
instruction register

13. CPU gets the address of next instruction to be processed from the
A.
B.
C.
D.

instruction register
memory address register
program counter
index register

14. What is 1001.12 in hexadecimal?
A.
B.
C.
D.

A.1 1 6
A.8ie
9.1 16
9.816

15. A program in memory which services an interrupt is called an interrupt
A.
B.
C.
D.

request
lines
handler
program

16. The instruction register stores
A.
B.
C.
D.

.

an instruction that has been decoded
an instruction that has been fetched from memory
an instruction that has been executed
the address of the next instruction to be executed

© Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL

5

CS/APR 2009/CSC159/ITC150

17. The effect of the following instructions on the content of the AX register is:
PUSH AX
ADD AX, 4
POP BX
MOV CX, AX
PUSH BX
POP AX
A.
B.
C.
D.

AX gets back its original value
4 is added to AX
AX is cleared
AX is doubled

18. After execution of POP instruction in 8086 machines,
A.
B.
C.
D.

SP is decremented by one
SP is neither incremented nor decremented
SP is incremented by one
SP is incremented by two

19. Which of the following is NOT a characteristic of CISC?
A.
B.
C.
D.

Variable length instruction formats.
Less number of instructions.
Large number of addressing modes.
Large number of instructions.

20. The
configuration provides reliability and optional support for fault-tolerant
computing.
A. master-slave
B. symmetrical
C. mapping
D. bridge
21.

refers to a situation when multiple CPUs share system's memory and I/O
resources.
A.
B.
C.
D.

Multiprocessing
Multiprogramming
Timesharing
Multitasking

© Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL

22.

6

CS/APR 2009/CSC159/ITC150

is a concept employed that allow the user to develop and run programs larger
in size than the available main memory space.
A.
B.
C.
D.

Locality of reference
Snooping
Virtual memory
Mapping

23. A memory management technique used to improve computer performance is
A.
B.
C.
D.

preventing data from being moved from the cache to primary
using the cache to store data that will most likely be needed soon
storing as much data as possible on disk
selecting memory chips based on their cost

24. Which of the following is a type of abnormal event indicator interrupt?
A.
B.
C.
D.

Keyboard input.
Open a program.
Divide by zero.
All of the above

25. The program addresses are referred to as
are referred to as
.
A.
B.
C.
D.

, and the actual memory addresses

data addresses; wired addresses.
wired addresses; data addresses.
logical addresses; physical addresses.
physical addresses; logical addresses.

© Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL

CS/APR 2009/CSC159/ITC150

7

PART B (50 MARKS)

QUESTION 1
a) Briefly describe the von Neumann model of computer architecture.
(3 marks)
b) Give TWO (2) significant improvements proposed by John von Neumann over the
ENIAC project.
(3 marks)
QUESTION 2
a) Represent the decimal value -18.375 using the 32-bit IEEE single-precision format. Give
the results in hexadecimal.
(5 marks)
b) Convert 42FA8000i6 IEEE single precision floating point number to decimal.
(5 marks)

QUESTION 3
a) Convert the following numbers to the respective numbering system.
652 8 =

2=

16 =

10

(3 marks)
b) Perform the following arithmetic operation. Give the answer in hexadecimal. Show your
work.
00100111 2 -00110011 2
(2marks)
QUESTION 4
a) What are THREE (3) features of a typical RISC chip architecture that help speed up
computing?
(3 marks)
b) Explain how superscalar processing enhances CPU performance.
(2 marks)

© Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL

CS/APR 2009/CSC159/ITC150

8

QUESTION 5
Briefly describe each of the following terms:
a) CPU
b) RAM
c) channel architecture
d) fetch-and-execute cycle
(8 marks)

QUESTION 6
During an interrupt, the processor loads the contents of the registers following the sequence
below:
AX
BX
CX
DX
PC
Flags Register:

2BEFh
0367h
3843h
F32Ah
3117h
12h

Assume that the last item stored in the stack is at location FFFCh and the registers to be
saved are determined by the following byte:
BYTE
X

X

1

i
PC

0

1

1

0

1

i

i

i

i

i

CX

DX

AX

BX

Flags Register

a) Draw the content of the stack after the interrupt occurred.
(5 marks)
b) What is the value of Stack Pointer Register after the interrupt process is completed?
(2 marks)
c) Stacks use LIFO structures. Explain LIFO.
(2 marks)

© Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL

9

CS/APR 2009/CSC159/ITC150

QUESTION 7
a) What is meant by "interrupt priority"?
(2 marks)
b) Describe briefly what are traps or exceptions? Give one example that generates a trap.
(2 marks)
c) Describe briefly what are device drivers? Why are they important?
(3marks)

© Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL

CS/APR 2009/CSC159/ITC150

10

PART C (25 MARKS)
QUESTION 1
Given,
AX = A203h

DX = 53FEh

CX = OOBah

Determine the value for the given registers after the respective instructions are executed.
Each of the instructions is related to the previous instructions. Show your work.

a) SAR CL, 2

;

CX=

CF =

b) SHR DL, 2

;

DX=

CF =

c) ROR AL,4

;

AX=

CF =

d) M U L DL

;

AX =

CF =
(8 marks)

QUESTION 2
a) The three basic types of operands are

,

and

.

b) The
register is a special register with individual bit positions assigned to show
the status of the CPU or the results of arithmetic operations.
c) The

instruction let a loop continue while ZF=1 and CX > 0.
(5 marks)

QUESTION 3
Write an assembly language program segment to add two even numbers, N1 and N2. The
average is computed and stored in a variable named AVG. (Assume variable AVG has been
declared as an 8-bit length)
(4 marks)

© Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL

11

CS/APR 2009/CSC159/ITC150

QUESTION 4
Trace the program segment below and show the contents of AX, BX, CX, Carry flag and
Zero flag after each instruction is executed.
MOV AL, 6Bh
MOV BL, 3Fh
MOV CL, 24 9
OR BL, OFH
SUB AL, BL
JB LABEL1
MOV AL, 1
JMP EXIT
LABEL1:
CMP AL, CL
JE EXIT
INC CL
JMP LABEL1
EXIT:
INT 21H
(8 marks)

END OF QUESTION PAPER

© Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL