Computer Architecture - ответы на тесты Интуит

Правильные ответы выделены зелёным цветом.
Все ответы: Introduces students to the organization and architecture of computer systems, beginning with the standard von Neumann model and then moving forward to more recent architectural concepts.
Who constructed Elbrus?
(1) S.Lebedev
(2) B.Babajan
(3) Y. Bazilevsky
(4) B. Rameev
How many conditions does a trigger have?
(1) 1
(2) 2
(3) 3
(4) 4
Why are triggers not useful for storage information?
(1) they are slow
(2) they are expensive
(3) they cant storage the information
(4) they break down often
Each machine instruction uses:
(1) cache
(2) triggers
(3) some electrical scheme
(4) condenser
All basic units of a computer are connected to the:
(1) CPU
(2) bus
(3) I/O devices
(4) CU
Choose static languages:
(1) Ada
(2) C++;
(3) C
(4) Algol68
Who constructed the first computer?
(1) Charles Babbage
(2) Bonch-Bruevich
(3) George Boole
(4) N.Brusnesov
Hemming code is:
(1) to every 16 bits add 5 additional bits of control
(2) to every 5 bits add 16 bits of control
(3) to every 10 bits add 5 bits of control
(4) to every 8 bits add 3 bits of control
What does "pipelining" mean?
(1) execution instructions one by one
(2) execution different instructions at the same time;
(3) jumping to some instruction not in strict sequence
(4) execution instructions by CPU
Opcode is:
(1) integer number 0..255
(2) real number from 0 to 255;
(3) integer number from 5 to 260
(4) real number from 0 to 551
How many segments does every process have?
(1) 1
(2) 2
(3) 3
(4) 4
In Boolean conjunction math output is 1 if:
(1) A=1, B=1
(2) A=0, B=0
(3) A=1,B=0
(4) A=0, B=1
What is on the top of the memory hierarchy?
(1) tape
(2) cd
(3) the main memory
(4) cache
If one process wants to read from the memory and another wants to write where then:
(1) one will work with memory, another will wait until the first done
(2) both processes will work with memory at the same time
(3) it is impossible
(4) a computer will break down
I/O channels can organize:
(1) input and output operations without using a CPU
(2) input and output operations using a CPU
(3) only input operations without using a CPU
(4) only output operations without using a CPU
For a logical formula a+b*c a machine program will be:
(1) +, *, L a, L b, L c
(2) *, +, L a, L b, L c
(3) L a, L b, L c, +,*
(4) L a, L b, L c, *. +
What is a high-order bit for negative numbers in computer words?
(1) 1
(2) 0
(3) 1 or 0
Who introduced the semaphore in programming?
(1) Charles Babbage
(2) Bonch-Bruevich
(3) George Boole
(4) E. Dijkstra
The scheme with cache can work with less or equal:
(1) 6 processes
(2) 10 processes
(3) 11 processes
(4) 15 processes
DMA means:
(1) working with memory though the bus without CPU
(2) working with memory though the bus using CPU
(3) working with I/O devices
(4) working with memory though the bus
For a formula a-b a reverse-minus machine program will be:
(1) L a, L b, rev -
(2) L b, L a, rev -
(3) rev -, L a, L b
(4) rev -, L b, L a
What is a twos-complement code for -5?
(1) 0 0000101
(2) 1 0000101
(3) 1 1111011
(4) 1 0000011
An initial time before the some operation is called:
(1) bandwidth
(2) interleaving
(3) dma
(4) latency
All computers in a multi-computer run:
(1) the same operation with the same data at the same time
(2) the different operations at the same time
(3) the same operation with different data at the same time
(4) the same operation with the same data in different time
An interruption is:
(1) synchronous signal
(2) asynchronous signal
(3) synchronous or synchronous signal
(4) special register
A displacement for a Branch-short is
(1) 16 bits
(2) 8 bits
(3) 4 bits
(4) 2 bits
In scientific notation all numbers are written like m*10p, then m is:
(1) mantissa
(2) any real number
(3) exponent
(4) numerical notation.
Every address in virtual memory consists of the following parts:
(1) number of bite
(2) number of page
(3) displacement
(4) latency
In MIMD computers use:
(1) common triggers
(2) common registers
(3) common channels
(4) common bridges
The most common used protocol is:
(1) UDP
(2) FTP
(3) TCP
(4) Ethernet
For a loop for i from A by B to C while D do E the step is:
(1) A
(2) i
(3) B
(4) D
If an exponent is 0 and mantissa is 0, the number is:
(1) some real number
(2) 0
(3) infinity
(4) not a number
Who was the first computer programmer?
(1) Charles Babbage
(2) Ada Augusta Lovelace
(3) George Boole
(4) E. Dijkstra
Which scheme executes different sub-steps of sequential instructions simultaneously?
(1) MIMD
(2) SIMD
(3) VLIW
(4) EPIC
Who projected a digital automatic calculator?
(1) S.Lebedev
(2) I.Bruk
(3) Y. Bazilevsky
(4) B. Rameev
For a loop for i from A by B to C while D do E and B>0 to repeat the loop:
(1) i ≥ c
(2) i ≤ c
(3) i > c
(4) i < c
What does "statical object" mean?
(1) It is possible to calculate everything about the object during compilation time
(2) It is impossible to calculate everything about the object during compilation time
(3) It is a number or word that doesn't change at all during a long period
(4) It is possible to calculate everything about the object during run time
Who wrote pages memo "Proposal about automatic calculator"?
(1) Charles Babbage
(2) Ada Augusta Lovelace
(3) Hovard Aiken
(4) E. Dijkstra
If some data were used from cache-table then:
(1) it will be erased from cache
(2) it will be given the highest priority
(3) it will be given the lowest priority
(4) it will be sent to the main memory
Gagarin's trajectory was calculated on:
(1) Strela
(2) M-20
(3) M-50
(4) BESM-1
If an array is [l:u] m A then a type of elements in this array is:
(1) l
(2) u
(3) m
(4) A
Element d in a passport of array is:
(1) the maximum number of elements in array
(2) the minimum number of elements in array
(3) a size of one element in array
(4) the address of element with index zero in array
Different punched tapes for program and data later was called :
(1) Harvard architecture
(2) Oxford architecture
(3) Hovard architecture
(4) Mark architecture
What is responsible for writing to the main memory?
(1) CPU
(2) trigger
(3) cache
(4) chip
Who constructed M-50:
(1) S.Lebedev
(2) I.Bruk
(3) Y. Bazilevsky
(4) S.Burcev
To calculate an address of an element A[i] in some array the following formula is needed:
(1) C0+i*d
(2) i*d-C0
(3) C0*i*d
(4) i*d
What does "pipelining" mean?
(1) execution instructions one by one
(2) execution different instructions at the same time
(3) jumping to some instruction not in strict sequence
(4) execution instructions by CPU
The first program controlled calculator with float point arithmetic called:
(1) John I
(2) Z-3
(3) Mars I
(4) Mark I
How often are memory exchange operations used according to statistics?(in percent)
(1) 10
(2) 20
(3) 40
(4) 90
The first antirocket system was called:
(1) System A
(2) System B
(3) System Z
(4) System X
If a system has a virtual memory often used pages will be:
(1) in a virtual memory
(2) in a physical memory
(3) on a floppy
(4) on a cd
What is the first high-level programming language?
(1) Assembler
(2) Fortran
(3) C+
(4) Algol 60
The first electronic computer was called:
(1) Mark I
(2) Z-3
(3) ENIAC
(4) UNIVAC
The main idea of RISK is:
(1) place several instructions in one chip
(2) place several instructions in a lot of chips
(3) using cache
(4) using a lot of processors
Which of computers used pipeline?
(1) Mark I
(2) M-20
(3) M-50
(4) BESM-6
What is used to indicate whether the corresponding page is in real memory or not?
(1) passport of the page
(2) displacement of the page
(3) some flag in a page-table
(4) a mathematical address of the page
Absolute address mode means:
(1) The effective address for instruction is the address parameter itself with no modifications.
(2) The effective address for instruction is the sum of address parameter and some displacement.
(3) The effective address for instruction is the address in the specified register.
(4) The effective address for instruction depends on index and the beginning of segment.
Who suggested the microprogramming principle?
(1) Charles Babbage
(2) Wilkes
(3) Hovard Aiken
(4) E. Dijkstra
According to RISK principals all machine instructions:
(1) must be different length
(2) must be the same length
(3) must be in cache
(4) must be compiled
The unique computer in the world with ternary number notation is:
(1) BESM-4
(2) Setun
(3) Strela
(4) BESM-6
When was Elbrus introduced?
(1) 1964
(2) 1974
(3) 1982
(4) 1984
How many outputs does a trigger have?
(1) 1
(2) 2
(3) 3
(4) 4
Static memory consists of:
(1) condencers
(2) triggers
(3) drums
(4) tapes
A hardware implementation of machine instruction is:
(1) not flexible
(2) cheap
(3) expensive
(4) quick
A program counter shows a current:
(1) machine instruction
(2) address
(3) word
(4) time
What was used for cooling in Elbrus?
(1) water
(2) air
(3) liquid hydrogen
(4) liquid oxygen
Who constructed the only one computer in the world with the foundation 3?
(1) Charles Babbage
(2) Bonch-Bruevich
(3) George Boole
(4) N.Brusnesov
Choose methods of compression data:
(1) RIP
(2) ZIP
(3) QIP
(4) TRIP
What does "fetching" mean?
(1) execution instructions one by one
(2) execution different instructions at the same time;
(3) jumping to some instruction not in strict sequence
(4) execution instructions by CPU
A set of microinstructions is in:
(1) the main memory
(2) CPU
(3) bus
(4) micro memory
What segments does every process have?
(1) addresses segment
(2) codes segment
(3) data segment
(4) memory segment
In Boolean disjunction math output is 0 if:
(1) A=1, B=1
(2) A=0, B=0
(3) A=1,B=0
(4) A=0, B=1
What is on the top of a cache-table?
(1) rarely used data
(2) often used data
(3) data from the Internet
(4) addresses of data
If two processes want to read the same data from memory and a computer has cache then:
(1) one will work with memory, another will wait until the first done
(2) both processes will work together without any waiting
(3) it depends on processes
(4) it depends on data
When did I/O channels appear?
(1) 1937
(2) 1938
(3) 1948
(4) 1958
For a formula a-f(x) a machine program will be:
(1) L a, L x, -, call f
(2) L a, L x, call f, -
(3) call f, L a, L x, -
(4) call f, -, L a, L x
What is a high-order bit for positive numbers in computer words?
(1) 1
(2) 0
(3) 1 or 0
Before the beginning of an operation … must be checked:
(1) trigger
(2) semaphore
(3) condenser
(4) cache
The first multi-computer is called:
(1) Mark
(2) Z-3
(3) IBM/360
(4) ILLIAK IV
Scheme "arbitration" guarantees that:
(1) several elements of equipment can read information though the bus
(2) only one element of equipment has access to the bus
(3) several elements of equipment can write information though the bus
(4) two elements of equipment can use the bus without any collision
For formula a/b a reverse-division machine program will be:
(1) L a, L b, rev /
(2) L b, L a, rev /
(3) rev /, L a, L b
(4) rev /, L b, L a
What is a twos-complement code for -1?
(1) 0 1000001
(2) 1 0000001
(3) 1 1111110>
(4) 1 1111111
… is dividing memory into several banks with different access mechanisms:
(1) bandwidth
(2) interleaving
(3) dma
(4) latency
In a multi-computer every computer has:
(1) local cache
(2) local control unit
(3) local processor and memory
(4) local memory
A device that is used to combine several sources of interrupt onto one or more CPU lines, while allowing priority levels to be assigned to its interrupt outputs, is called:
(1) CPU
(2) Interrupt Controller
(3) Interrupt Arbitrageur
(4) Collision Controller
A conditional branch checks the top of an integral stack and if it is true then:
(1) it goes to an address which depends on the displacement
(2) it stops
(3) it goes to the next machine instruction
(4) it goes to the previous machine instruction
How many bits are used in a double-precision format for binary floating-point number?
(1) 16
(2) 32
(3) 64
(4) 128
The virtual memory is divided into:
(1) pages
(2) banks
(3) bites
(4) bits
The scheme to achieve parallelism where computers share memory is:
(1) MIMD
(2) SIMD
(3) VLIW
(4) EPIC
How many levels does the TCP/IP model have?
(1) 7
(2) 5
(3) 3
(4) 2
For a loop for i from A by B to C while D do E the initial value is:
(1) A
(2) i
(3) B
(4) D
If an exponent consists only from 1 and mantissa is 0, the number is:
(1) some real number
(2) 0
(3) infinity
(4) not a number
Who translated the Babbage's lecture from Italian into English?
(1) Charles Babbage
(2) Ada Augusta Lovelace
(3) George Boole
(4) E. Dijkstra
Which scheme executes operations when programs are compiled?
(1) MIMD
(2) SIMD
(3) VLIW
(4) EPIC
Who constructed Strela?
(1) S.Lebedev
(2) I.Bruk
(3) Y. Bazilevsky
(4) S.Burcev
For a loop for i from A by B to C while D do E and B<0 to repeat the loop:
(1) i ≥ c
(2) i ≤ c
(3) i > c
(4) i < c
What does "dynamical object" mean?
(1) It is possible to calculate the size of object during compilation time
(2) It is impossible to calculate the size of object during compilation time
(3) It is a number or word that doesn't change at all during a long period
(4) It is possible to calculate the size of object during run time
Pages memo "Proposal about automatic calculator" were written in :
(1) 1837
(2) 1937
(3) 1957
(4) 1965
What is the most popular protocol in Internet?
(1) FTP
(2) EDGE
(3) TCP/IP
(4) Ethernet
The first Soviet semiconductor is:
(1) BESM-4
(2) M-20
(3) M-50
(4) BESM-1
The main machine instruction for arrays is:
(1) store
(2) slice
(3) load
(4) interleaving
Element l in a passport of array is:
(1) the maximum number of elements in array
(2) the minimum number of elements in array
(3) a size of one element in array
(4) the address of element with index zero in array
Where was the first computer installed?
(1) Oxford university
(2) Harvard university
(3) Princeton university
(4) Yale university
A memory consistency means:
(1) all memory elements are in the same state
(2) all memory elements are in different states
(3) dividing memory into some banks
(4) the process when cache are writing into the main memory
M-50 was constructed in:
(1) 1939
(2) 1959
(3) 1979
(4) 1995
In the formula math which is used for calculating an address for array's element d is:
(1) size of each element in array
(2) size of the array
(3) index of the element
(4) address of an element with index zero
What does "branching" mean?
(1) execution instructions one by one
(2) execution different instructions at the same time
(3) jumping to some instruction not in strict sequence
(4) execution instructions by CPU
The first university in the world that used a computer for an education is:
(1) Oxford university
(2) Harvard university
(3) Princeton university
(4) ETH university
How often are branch operations used according to statistics?(in percent)
(1) 10
(2) 20
(3) 40
(4) 90
The first antirocket system was constructed in :
(1) 1960
(2) 1969
(3) 1970
(4) 1982
A virtual memory divides a virtual address space into:
(1) banks
(2) arrays
(3) stacks
(4) pages
What is the first low-level programming language?
(1) Assembler
(2) Fortran
(3) C+
(4) Algol 60
What computer was the first serial production computer?
(1) Mark I
(2) Z-3
(3) ENIAC
(4) UNIVAC
If compare RISK and CISK:
(1) RISK faster
(2) CISK faster
(3) CISK has longer object code
(4) RISK has longer object code
Which of computers used interleaving?
(1) Mark I
(2) M-20
(3) M-50
(4) BESM-6
Each entry in the page-table holds a flag indicating …:
(1) whether the corresponding page is in the real memory or not
(2) whether the corresponding page is large or small
(3) whether the corresponding page is being used
(4) whether the virtual memory uses mathematical or physical addresses
Relative address mode means:
(1) The effective address for instruction is the address parameter itself with no modifications.
(2) The effective address for instruction is the sum of address parameter and some displacement.
(3) The effective address for instruction is the address in the specified register.
(4) The effective address for instruction depends on index and the beginning of segment.
Where were I/O channels used for the first time?
(1) IBM-709
(2) Stretch
(3) Atlas
(4) IBM/360
According to RISK principals all machine instructions must execute in … clock:
(1) 1
(2) 2
(3) 3
(4) 4
Who constructed Setun?
(1) S.Lebedev
(2) I.Bruk
(3) N.Brusencov
(4) Y. Bazilevsky
When did Elbrus become an open computer?
(1) 1962
(2) 1972
(3) 1974
(4) 1982
A register is a set of:
(1) triggers
(2) words
(3) bytes
(4) bits
Dynamic memory consists of:
(1) condencers
(2) triggers
(3) drums
(4) tapes
The microprogramming is:
(1) flexible
(2) free of charge
(3) not free of charge
(4) not flexible
Every machine instruction starts with:
(1) Encode
(2) Fcode
(3) Opcode
(4) Timecode
A static language means:
(1) compiler doesn't know types of data at every point of a program
(2) compiler knows types of data at every point of a program
(3) programmer can use a stack
(4) programmer can use a limited amount of programs
Who introduced the first trigger in 1918?
(1) Charles Babbage
(2) Bonch-Bruevich
(3) George Boole
(4) N.Brusnesov
If you add 1 additional bit to data you can:
(1) notice one mistake
(2) notice two mistakes
(3) notice and fix one mistake
(4) notice and fix two mistakes
What does "interleaving" mean?
(1) execution instructions one by one
(2) execution different instructions at the same time
(3) jumping to some instruction not in strict sequence
(4) dividing memory into several banks with different access mechanism
How many instructions are in micro instruction register?
(1) 1
(2) 2
(3) 8
(4) it depends on size of register
What register points to the next machine instruction?
(1) IC
(2) PC
(3) L
(4) R
How many basic operations does Boolean algebra consist of?
(1) 2
(2) 3
(3) 4
(4) 16
What is responsible for writing data to the main memory?
(1) CPU
(2) program
(3) cache
(4) cd-room
If data are frequently used it is placed into:
(1) main memory
(2) cache
(3) cd
(4) floppy
Each I/O channel is a:
(1) small processor
(2) register
(3) condenser
(4) trigger
Choose not commutative operations:
(1) addition
(2) subtraction
(3) division
(4) multiplication
Positive number 127 can be represented as:
(1) 0 1111111
(2) 1 0000000
(3) 0 0000000
(4) 1 1111111
Choose all operations with the main memory:
(1) write
(2) read
(3) semaphore reading
(4) trigger reading
The first multi-computer appeared in:
(1) 1967-1971
(2) 1955-1956
(3) 1980-1996
(4) 1971-1980
Multi - core architecture means:
(1) several buses
(2) several memories
(3) several CUs
(4) several CPUs
For a formula a-f(x) a reverse-minus machine program will be:
(1) L a, L x, call f, rev -
(2) L x, call f, L a, rev -
(3) rev -, L a, L x, call f
(4) rev -, L x, call f, L a
What is a twos-complement code fore -7?
(1) 11111001
(2) 10000111
(3) 01111001
(4) 00000111
Special equipment for reading long sequences of bits is?
(1) bandwidth
(2) interleaving
(3) dma
(4) latency
The scheme to achieve parallelism with multi-computer is called:
(1) MIMD
(2) SIMD
(3) VLIW
(4) EPIC
Combining multiple physical disks into a logical unit is called :
(1) multi-core architecture
(2) multi-computer architecture
(3) RAID
(4) SCSI
A conditional branch checks the top of an integral stack and if it is false then:
(1) it goes to an address which depends on the displacement
(2) it stops
(3) it goes to the next machine instruction
(4) it goes to the previous machine instruction
How many bits are used in a single-precision format for binary floating-point number?
(1) 16
(2) 32
(3) 64
(4) 128
What kind of addresses does the virtual memory use:
(1) physical
(2) mathematical
(3) indirect
(4) relative
The programming language for MIMD is:
(1) Assembler
(2) C++
(3) FORTRAN
(4) OCCAM
The first wide area network is:
(1) RAPRANET
(2) ALFANET
(3) KIBERNET
(4) ARPANET
For a loop for i from A by B to C while D do E the conditional value is:
(1) A
(2) i
(3) B
(4) D
If an exponent consists only from 1 and mantissa is not 0, the number is:
(1) some real number
(2) 0
(3) infinity
(4) not a number
Who introduced terms "loop", "readdressing" and "working сell"?
(1) Charles Babbage
(2) Ada Augusta Lovelace
(3) George Boole
(4) E. Dijkstra
Which computer uses VLIW?
(1) Mark
(2) Z-3
(3) ILLIAK IV
(4) ELBRUS
When was Strela introduced?
(1) 1933
(2) 1943
(3) 1953
(4) 1985
A loop for i from A by B to C while D do E and is infinite if:
(1) B=i
(2) B=A
(3) A=C
(4) B=0
If a record is struct (int a, real b) then it can be represented in a computer as:
(1) address - binary a - binary b
(2) address - binary a - address - binary b
(3) address - binary a - hold- address - binary b
(4) binary a - binary b
The first computer was named:
(1) John I
(2) Serena I
(3) Mars I
(4) Mark I
What equipment controls communications usually?
(1) trigger
(2) condenser
(3) chip
(4) cabel
The military computer is:
(1) BESM-4
(2) M-20
(3) M-50
(4) BESM-1
A data structure consisting of a collection of elements, each identified by at least one index is called:
(1) branch
(2) interleaving
(3) loop
(4) array
Element u in a passport of array is:
(1) the maximum number of elements in array
(2) the minimum number of elements in array
(3) a size of one element in array
(4) the address of element with index zero in array
How many years did the first computer work?
(1) 8
(2) 10
(3) 16
(4) 25
When does a collision appear?
(1) when CPU writes in the main memory
(2) when cache write and read at the same time
(3) when two processes are trying to read some information from cache
(4) when process is trying to work with some data but cache is still working with those data
Who constructed the first antirocket system:
(1) S.Lebedev
(2) I.Bruk
(3) Y. Bazilevsky
(4) S.Burcev
In the formula math which is used for calculating an address for array's element C0 is:
(1) size of each element in array
(2) size of the array
(3) index of the element
(4) address of an element with index zero
How long can pipelining be on average?
(1) 20 instructions
(2) 10 instructions
(3) 8 instructions
(4) 4 instructions
Who introduced the trigger in America?
(1) Ekkies and F.Jordan
(2) Ekkies
(3) Jordan
(4) A.Bonch-Bruevich
How often are compare operations used according to statistics?(in percent)
(1) 10
(2) 20
(3) 40
(4) 90
The final Lebedev's result is:
(1) Mark I
(2) M-20
(3) M-50
(4) BESM-6
To translate the virtual addresses seen by the application into physical addresses … are used:
(1) banks
(2) pages
(3) page-tables
(4) bank-tables
What passes does Assembler have?
(1) address calculation
(2) instructions calculations
(3) conversion from assembler language into machine instructions
(4) onversion from machine instructions into assembler language
What computer is the first in the world with stored program?
(1) Mark I
(2) EDSAC
(3) ENIAC
(4) UNIVAC
RISK faster than CISK in … times
(1) 2
(2) 3
(3) 4
(4) 5
Which of computers used virtual memory?
(1) Mark I
(2) M-20
(3) M-50
(4) BESM-6
If a flag which is held in each entry of the page-table is zero then:
(1) the corresponding page is in the real memory
(2) the corresponding page is not in the real memory
(3) the corresponding page is too large
(4) the corresponding page is too small
Indirect address mode means
(1) The effective address for instruction is the address parameter itself with no modifications.
(2) The effective address for instruction is the sum of address parameter and some displacement.
(3) The effective address for instruction is the address in the specified register.
(4) The effective address for instruction depends on index and the beginning of segment.
Where was virtual memory used for the first time?
(1) IBM-709
(2) Stretch
(3) Atlas
(4) IBM/360
According to RISK principals:
(1) RISK computer must have a lot of registers
(2) RISK computer must have a lot of triggers
(3) RISK computer must work only with high-level languages
(4) RISK computer must work only with low-level languages
Who constructed Ural?
(1) S.Lebedev
(2) I.Bruk
(3) B.Rameev
(4) N.Brusencov