UNlVERSlTl TEKNOLOGI MARA FINAL EXAMINATION : COMPUTER ORGANIZATION
CONFIDENTIAL
-
-
-
-
-
-
UNlVERSlTl TEKNOLOGI MARA
FINAL EXAMINATION
: COMPUTER ORGANIZATION
COURSE CODE
: CSC?591ITCl50
: 2 APRlL2005
-
: 3 HOURS (9.00 A.M. 12.00 P.M.)
:
-
NOVEMBER 2004 APRIL 2005
INSTRUCTIONS TO CANDIDATES
This question paper consists of thret
.,,
Answer ALL questions from all three (3)
i)
Answer PART A
ii)
on a new
page.
is given by the
Do not bring any
invigilator.
i)
ii)
iii)
the Question Paper
an Answer Booklet - provided by the Faculty
an Objective Answer Sheet - provided by the Faculty
DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO
This examination paper consists of 7 I printed pages
O Hak Cipta Universiti Teknologi MARA
COPYRIGHT 43 UiTM
CONFfDENfiAL
CSIMAR 20051CSCi 5911TC150
PART A (25 MARKS)
Floating point representation is used to store:
P
Bio~eanvalues.
6; whole numbers.
'
C, real numbers.
D. Integers.
Binary numbers can be used to represent:
A.
B.
C.
D.
integers only.
fractions only.
both fractions and integers.
none of them.
Virtually all computer designs are based on the von Neumann architecture. A high
level view of this architecture has the following three components:
A. Buses, memory, input/output controllers.
B. Hard disks, floppy disks, and the CPU.
C. memory, the CPU, and printers.
D. memory, input/output modules, and the CPU.
One DISADVANTAGE of the ENlAC was:
A. it had limited storage capability.
8.- its size& small.
C. it was for commercial use.
O. it was user friendly.
The following is TRUE about the Von Neumann machine EXCEPT:
A.
B.
C.
D.
It contained major features essential to modern computer architecture.
It relied on the transistor for operation.
It was built in the first generation.
The Von Neurnann's architecture was firmly established.
O Hak Cipta Universiti Teknologi MARA
COPYRIGHT 43 UiTM
CONFIDENTIAL
CONFIDENTIAL
One example of a serial bus device is
A. Printer
B. Scanner
C. Digital camera
D. Mouse
Which of the following statements BEST describes the physical addresses used in
virtual storage?
A. They are the actual memory location.
5. They represent location in the program but they do not have any reality outside
the program itself.
C. They are used in Readwrite operation.
D. They are stored in memory data register (MDR).
What characteristic of RAM memory makes it MOT suitable for permanent storager!
A. It is volatile
B. Too slow
C. Unreliable
D. Too bulky
RAM is called DRAM(Dynamic RAM) when:
A. it is always moving around data.
6. it requires periodic refreshing.
C. it can do several things simultaneously.
D. none of the above.
10.
How many memory cells will be accessed to read a 32 bit instruction from memory to
the CPU?
Q Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
COPYRIGHT 43 UiTM
CONFIDENTIAL
A computer's memory is composed of 256 bits. How many bytes does this memory
contain?
11.
A. 8 bytes
bytes
C: I 6 bytes
D;. 4 bytes
.g %1
A
Interrupts can be generated in response to:
A.
8.
C.
D.
detect program errors such as arithmetic overflow or division by zero.
detect hardware faults.
tnputlOutput activities and internal timers.
All of the above.
Which of the following programming languages closely resembles the machine
language?
A. Assembly Language
6. BASIC
C. fortran
D. C-i-+
Any computer must at least consist of:
A. Data bus.
6. Address Bus.
Cj ContrcrC,Bus.
D. All of the above.
Memory interleaving is a method for increasing the effective rate of memory access
by:
A. Dividing memory into parts.
B. Utilizing the cache memory.
C. Increase the path memory access.
D. Increase the CPU speed.
O Hak Cipta tlniversiti Teknologi MARA
COPYRIGHT 43 UiTM
CONFIDENTIAL
CONFIDENTIAL
16.
CSIMAR 20051CSCf 5911TC150
What is a point-to-point bus?
A. A bus that connects several points together.
B. A bus that carry signals from a specific source to a specific destination.
C. A bus that is also known as broadcast bus.
D. A bus that is popular with the name Ethernet.
17.
Which of the registers below monitors the results of operations performed by the
ALU?
A. Stack pointer register
B. Instruction register.
C. Status register.
D. Program counter register.
18.
Which of the followings is NOT the register involved in memory readlwrite operation?
A. Address register
8. Control register
C. MAR
D. MDR
19.
The process that automatically creates a link between the logical address to physical
address during program execution is known as
A.
€3.
C.
D.
20.
linking
mapping
addressing mode
caching
General purpose data register can be used to store:
i.
ii.
iii.
iv.
data temporarily.
the address of source operand.
the address of result operation.
the address of the next instruction.
A. i and ii
6. i, ii and iii
C. ii, iii and iv
D. All of the above
63 Hak Cipta Universiti Teknologi M A W
COPYRIGHT 43 UiTM
CONFIDENTIAL
21.
Which of the followings is NOT TRUE about accumulator?
A. Accumulator is a register with a special function.
B1 It-holds the destination address of a result.
C. Itjs used to transfer data between memory locations.
~ ? - Rolds
lt
the data that is used for arithmetic operations.
22.
What is the content of AH register after the execution of the following instructions?
MOV DH, 08h
MOV AX, 0022h
DIV DH
23.
Which of the following assembly statements is INCQRRECT?
A. STC AL
B. MULBL
C. XOR BX, OFACEh
D. NOT CX
24.
Which of the following instructions uses the register indirect addressing mode?
A.'
B.
C.
D.
25.
MOV M, BL
MOVNUM,AX
MOV AX, OFFh
MOV SI, [Dl]
Which of the fotlowing instructions does NOT affect the destination operand?
A. TEST
B. MOV
C. XQR
D. SHL
O Hak Cipta Universiti Teknologi MARA
COPYRIGHT 43 UiTM
CONFIDENTIAL
PART I3 (50 MARKS)
QUESTION 1
Briefly describe RlSC architecture. Give THREE main features in a RlSC design.
(5 marks)
QUESTION 2
Compare between computer memory and register according to these characteristics:
a. Capacity
b, Organization
c. Access time
(4 marks)
QUESTION 3
a. Convert the fojlowing number to IEEE single-precision format. Give the results in
hexadecimal. The number is - 271256,
(5 marks)
6. Convert 2C2E0000T61EEE single precision floating point number to decimal.
(5 marks)
QUESTION 4
Perform each of the following arithmetic operations. For each, determine whether overflow,
sign or(and) carry occurs. Give your final answer in hexadecimal.
-t9.marks)
CONFIDENTIAL
O Hak Cipta Universiti Teknologi M A W
COPYRIGHT 43 UiTM
CONFIDENTIAL
QUESTION 5
Suppose that the following instructions are found at the given locations in memory:
LOAD 50
ADD 51
724
006
State the contents of the following registers at the memory location 20:
!
i.
ii.
iii.
iv.
v.
instrudion register (IR)
program counter (PC)
memory address register (MAR)
memory data register (MDR)
accumulator
(5 marks)
QUESTION 6
a.
Differentiate between maskable interrupt and nonmaskable interrupt.
(3 marks)
b.
Explain briefly the steps involved in handling the interrupt.
(6 marks)
O Hak Cipta Universiti Teknologi MARA
COPYRIGHT 43 UiTM
CONFIDENTIAL
CONf IDENTIAL
QUESTION 7
Given the following information before an interrupt:
AX
BX
CX
DX
: 45Ef
: DC67
: FF56
: ABEF
PC :I046
SP : FFFA
a. What is the current value of the Program Counter Register %nd Stack Pointer
Register?
(2 marks)
b. Build a stack following the sequence of PC, AX, BX, CX, and DX after the interrupt
occurrgd.
(4 marks)
c. State the value of Program Counter Register and Stack Pointer Register when the
interrupt process completed.
(2 marks)
CONFIDENTIAL
O Hak Cipta Universiti Teknologi MARA
COPYRIGHT 43 UiTM
CONFIDENTIAL
PART C (25 MARKS)
Trace the following program segment and show the contents of the registers and flags
involved-afterthe execution of the instructions below:
(44 marks)
O Hak Cipta Universiti Teknolagi M A W
COPYRIGHT 43 UiTM
CONFIDENTIAL
CONFIDENTIAL
QUESTION 2
Name two basic parts of assembly language statements.
(2 marks)
identify the types of addressing mode used in each of the following instructions:
i. MQVAL, 20
ii. ADD BX, wordcount
iii. MOV CX, DX
iv.. ADD DL, [BX]
(4 marks)
Write an assembly language instruction to evaluate:
VAR = (100 -1- 150) / 20.
( 5 marks)
END OF QUESTION PAPER
O Hak Cipta Universiti Teknologi M A W
COPYRIGHT 43 UiTM
-
-
-
-
-
-
UNlVERSlTl TEKNOLOGI MARA
FINAL EXAMINATION
: COMPUTER ORGANIZATION
COURSE CODE
: CSC?591ITCl50
: 2 APRlL2005
-
: 3 HOURS (9.00 A.M. 12.00 P.M.)
:
-
NOVEMBER 2004 APRIL 2005
INSTRUCTIONS TO CANDIDATES
This question paper consists of thret
.,,
Answer ALL questions from all three (3)
i)
Answer PART A
ii)
on a new
page.
is given by the
Do not bring any
invigilator.
i)
ii)
iii)
the Question Paper
an Answer Booklet - provided by the Faculty
an Objective Answer Sheet - provided by the Faculty
DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO
This examination paper consists of 7 I printed pages
O Hak Cipta Universiti Teknologi MARA
COPYRIGHT 43 UiTM
CONFfDENfiAL
CSIMAR 20051CSCi 5911TC150
PART A (25 MARKS)
Floating point representation is used to store:
P
Bio~eanvalues.
6; whole numbers.
'
C, real numbers.
D. Integers.
Binary numbers can be used to represent:
A.
B.
C.
D.
integers only.
fractions only.
both fractions and integers.
none of them.
Virtually all computer designs are based on the von Neumann architecture. A high
level view of this architecture has the following three components:
A. Buses, memory, input/output controllers.
B. Hard disks, floppy disks, and the CPU.
C. memory, the CPU, and printers.
D. memory, input/output modules, and the CPU.
One DISADVANTAGE of the ENlAC was:
A. it had limited storage capability.
8.- its size& small.
C. it was for commercial use.
O. it was user friendly.
The following is TRUE about the Von Neumann machine EXCEPT:
A.
B.
C.
D.
It contained major features essential to modern computer architecture.
It relied on the transistor for operation.
It was built in the first generation.
The Von Neurnann's architecture was firmly established.
O Hak Cipta Universiti Teknologi MARA
COPYRIGHT 43 UiTM
CONFIDENTIAL
CONFIDENTIAL
One example of a serial bus device is
A. Printer
B. Scanner
C. Digital camera
D. Mouse
Which of the following statements BEST describes the physical addresses used in
virtual storage?
A. They are the actual memory location.
5. They represent location in the program but they do not have any reality outside
the program itself.
C. They are used in Readwrite operation.
D. They are stored in memory data register (MDR).
What characteristic of RAM memory makes it MOT suitable for permanent storager!
A. It is volatile
B. Too slow
C. Unreliable
D. Too bulky
RAM is called DRAM(Dynamic RAM) when:
A. it is always moving around data.
6. it requires periodic refreshing.
C. it can do several things simultaneously.
D. none of the above.
10.
How many memory cells will be accessed to read a 32 bit instruction from memory to
the CPU?
Q Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
COPYRIGHT 43 UiTM
CONFIDENTIAL
A computer's memory is composed of 256 bits. How many bytes does this memory
contain?
11.
A. 8 bytes
bytes
C: I 6 bytes
D;. 4 bytes
.g %1
A
Interrupts can be generated in response to:
A.
8.
C.
D.
detect program errors such as arithmetic overflow or division by zero.
detect hardware faults.
tnputlOutput activities and internal timers.
All of the above.
Which of the following programming languages closely resembles the machine
language?
A. Assembly Language
6. BASIC
C. fortran
D. C-i-+
Any computer must at least consist of:
A. Data bus.
6. Address Bus.
Cj ContrcrC,Bus.
D. All of the above.
Memory interleaving is a method for increasing the effective rate of memory access
by:
A. Dividing memory into parts.
B. Utilizing the cache memory.
C. Increase the path memory access.
D. Increase the CPU speed.
O Hak Cipta tlniversiti Teknologi MARA
COPYRIGHT 43 UiTM
CONFIDENTIAL
CONFIDENTIAL
16.
CSIMAR 20051CSCf 5911TC150
What is a point-to-point bus?
A. A bus that connects several points together.
B. A bus that carry signals from a specific source to a specific destination.
C. A bus that is also known as broadcast bus.
D. A bus that is popular with the name Ethernet.
17.
Which of the registers below monitors the results of operations performed by the
ALU?
A. Stack pointer register
B. Instruction register.
C. Status register.
D. Program counter register.
18.
Which of the followings is NOT the register involved in memory readlwrite operation?
A. Address register
8. Control register
C. MAR
D. MDR
19.
The process that automatically creates a link between the logical address to physical
address during program execution is known as
A.
€3.
C.
D.
20.
linking
mapping
addressing mode
caching
General purpose data register can be used to store:
i.
ii.
iii.
iv.
data temporarily.
the address of source operand.
the address of result operation.
the address of the next instruction.
A. i and ii
6. i, ii and iii
C. ii, iii and iv
D. All of the above
63 Hak Cipta Universiti Teknologi M A W
COPYRIGHT 43 UiTM
CONFIDENTIAL
21.
Which of the followings is NOT TRUE about accumulator?
A. Accumulator is a register with a special function.
B1 It-holds the destination address of a result.
C. Itjs used to transfer data between memory locations.
~ ? - Rolds
lt
the data that is used for arithmetic operations.
22.
What is the content of AH register after the execution of the following instructions?
MOV DH, 08h
MOV AX, 0022h
DIV DH
23.
Which of the following assembly statements is INCQRRECT?
A. STC AL
B. MULBL
C. XOR BX, OFACEh
D. NOT CX
24.
Which of the following instructions uses the register indirect addressing mode?
A.'
B.
C.
D.
25.
MOV M, BL
MOVNUM,AX
MOV AX, OFFh
MOV SI, [Dl]
Which of the fotlowing instructions does NOT affect the destination operand?
A. TEST
B. MOV
C. XQR
D. SHL
O Hak Cipta Universiti Teknologi MARA
COPYRIGHT 43 UiTM
CONFIDENTIAL
PART I3 (50 MARKS)
QUESTION 1
Briefly describe RlSC architecture. Give THREE main features in a RlSC design.
(5 marks)
QUESTION 2
Compare between computer memory and register according to these characteristics:
a. Capacity
b, Organization
c. Access time
(4 marks)
QUESTION 3
a. Convert the fojlowing number to IEEE single-precision format. Give the results in
hexadecimal. The number is - 271256,
(5 marks)
6. Convert 2C2E0000T61EEE single precision floating point number to decimal.
(5 marks)
QUESTION 4
Perform each of the following arithmetic operations. For each, determine whether overflow,
sign or(and) carry occurs. Give your final answer in hexadecimal.
-t9.marks)
CONFIDENTIAL
O Hak Cipta Universiti Teknologi M A W
COPYRIGHT 43 UiTM
CONFIDENTIAL
QUESTION 5
Suppose that the following instructions are found at the given locations in memory:
LOAD 50
ADD 51
724
006
State the contents of the following registers at the memory location 20:
!
i.
ii.
iii.
iv.
v.
instrudion register (IR)
program counter (PC)
memory address register (MAR)
memory data register (MDR)
accumulator
(5 marks)
QUESTION 6
a.
Differentiate between maskable interrupt and nonmaskable interrupt.
(3 marks)
b.
Explain briefly the steps involved in handling the interrupt.
(6 marks)
O Hak Cipta Universiti Teknologi MARA
COPYRIGHT 43 UiTM
CONFIDENTIAL
CONf IDENTIAL
QUESTION 7
Given the following information before an interrupt:
AX
BX
CX
DX
: 45Ef
: DC67
: FF56
: ABEF
PC :I046
SP : FFFA
a. What is the current value of the Program Counter Register %nd Stack Pointer
Register?
(2 marks)
b. Build a stack following the sequence of PC, AX, BX, CX, and DX after the interrupt
occurrgd.
(4 marks)
c. State the value of Program Counter Register and Stack Pointer Register when the
interrupt process completed.
(2 marks)
CONFIDENTIAL
O Hak Cipta Universiti Teknologi MARA
COPYRIGHT 43 UiTM
CONFIDENTIAL
PART C (25 MARKS)
Trace the following program segment and show the contents of the registers and flags
involved-afterthe execution of the instructions below:
(44 marks)
O Hak Cipta Universiti Teknolagi M A W
COPYRIGHT 43 UiTM
CONFIDENTIAL
CONFIDENTIAL
QUESTION 2
Name two basic parts of assembly language statements.
(2 marks)
identify the types of addressing mode used in each of the following instructions:
i. MQVAL, 20
ii. ADD BX, wordcount
iii. MOV CX, DX
iv.. ADD DL, [BX]
(4 marks)
Write an assembly language instruction to evaluate:
VAR = (100 -1- 150) / 20.
( 5 marks)
END OF QUESTION PAPER
O Hak Cipta Universiti Teknologi M A W
COPYRIGHT 43 UiTM