The advantage of I/O mapped devices to
memory mapped is ___________
a) The former offers faster transfer of datab) The devices connected using I/O mapping
have a bigger buffer space
c) The devices have to deal with fewer
address lines
d) No advantage as such

1 Answer

Answer :

The devices have to deal with fewer
address lines

Related questions

Description : In memory-mapped I/O ____________ a) The I/O devices and the memory share the same address space b) The I/O devices have a separate address space c) The memory and I/O devices have an associated address space d) A part of the memory is specifically set aside for the I/O operation

Last Answer : The I/O devices and the memory share the same address space

Description : The advantage of memory mapped I/O over I/O mapped I/O is, a) Faster b) Many instructions supporting memory mapped I/O c) Require a bigger address decoder d) All the above

Last Answer : d) All the above

Description : The method of accessing the I/O devices by repeatedly checking the status flags is ___________ a) Program-controlled I/O b) Memory-mapped I/O c) I/O mapped CSE-R17.BLOGSPOT.COM d) None of the mentioned

Last Answer : Program-controlled I/O

Description : The method which offers higher speeds of I/O transfers is ___________ a) Interrupts b) Memory mapping c) Program-controlled I/O d) DMA

Last Answer : DMA

Description : To overcome the lag in the operating speeds of the I/O device and the processor we use ___________ a) BUffer spaces b) Status flags c) Interrupt signals d) Exceptions

Last Answer : Status flags

Description : In intel’s IA-32 architecture there is a separate 16 bit address space for the I/O devices. a) False b) True

Last Answer : True

Description : The system is notified of a read or write operation by ___________ a) Appending an extra bit of the address b) Enabling the read or write bits of the devices c) Raising an appropriate interrupt signal d) Sending a special signal along the BUS

Last Answer : Sending a special signal along the BUS

Description : The method of accessing the I/O devices by repeatedly checking the status flags is_________ A. Memory-mapped I/O B. Program-controlled I/O C. I/O mapped D. None of the Above

Last Answer : B. Program-controlled I/O

Description : The usual BUS structure used to connect the I/O devices is ___________ a) Star BUS structure b) Multiple BUS structure c) Single BUS structure d) Node to Node BUS structure

Last Answer : Single BUS structure

Description : Point out the wrong statement. a) Load balancing virtualizes systems and resources by mapping a logical address to a physical address b) Multiple instances of various Google applications are running on different hosts c) Google uses hardware virtualization d) All of the mentioned

Last Answer : Google uses hardware virtualization

Description : Point out the wrong statement. a) Load balancing virtualizes systems and resources by mapping a logical address to a physical address b) Multiple instances of various Google applications are running on different hosts c) Google uses hardware virtualization d) All of the mentioned

Last Answer : Google uses hardware virtualization

Description : A type of core store that has a lower access time than the devices used for working store in the same processor is known as a. Core memory b. Buffer c. Fast core d. Address register

Last Answer : Address register

Description : A type of core store that has a lower access time than the devices used for working store in the same processor is known as a. Core memory b. Buffer c. Fast core d. Address register

Last Answer : d. Address register

Description : A type of core store that has a lower access time than the devices used for working store in the same processor is known as a. Core memory b. Buffer c. Fast core d. Address register

Last Answer : d. Address register

Description : In IPv6,a ___________ address is anaddress of 96 bits of zero followed by32 bits of IPv4 address. A) link local B) site local C) mapped D) none of the above

Last Answer : none of the above

Description : The transfer of data from a CPU to peripheral devices of computer is achieved through ________ A. Modem B. Interface C. Buffer D. I/O Ports

Last Answer : D. I/O Ports

Description : Interface electronic circuit is used to interconnect I/O devices to a computer’s CPU or a. ALU b. Memory c. Buffer d. Register

Last Answer : Memory

Description : Interface electronic circuit is used to interconnect I/O devices to a computer’s CPU or a. ALU b. Memory c. Buffer d. Register

Last Answer : b. Memory

Description : Interface electronic circuit is used to interconnect I/O devices to a computer’s CPU or a. ALU b. Memory c. Buffer d. Register

Last Answer : b. Memory

Description : Fluconazole offers the following advantage(s) over ketoconazole: A. It is longer acting B. Its absorption from stomach is not dependent on gastric acidity C. It produces fewer side effects D. All of the above

Last Answer : D. All of the above

Description : .In an 8085 based system, the maximum number of input output devices can be connectedusing I/0 mapped I/O method isa) 64 b) 512 c) 256 d) 65536

Last Answer : b) 512

Description : Memory —mapped ___is used this is just another memory address. a. Input b. Output c. Both d. None

Last Answer : c. Both

Description : Which of the following impose additional overhead on clients and offer faster transfer? a) Block storage b) File Storage c) File Server d) All of the mentioned

Last Answer : Block storage

Description : Which of the following impose additional overhead on clients and offer faster transfer? a) Block storage b) File Storage c) File Server d) All of the mentioned

Last Answer : Block storage

Description : In 8085 microprocessor with memory mapped I/O which of the following is true?  (1) I/O devices have 16 bit addresses (2) I/O devices are accessed during IN and OUT instructions (3) There can be a maximum of 256 input and 256 output devices (4) Logic operations can not be performed

Last Answer : I/O devices have 16 bit addresses.

Description : What is true about PaaS? A. PaaS tool is a fully integrated development environment. B. PaaS systems support standards such as HTML, JavaScript, or other rich media technologies. C. PaaS offers the runtime environment for applications. D. All of the above

Last Answer : All of the above

Description : In distributed system, each processor has its own ___________ a) local memory b) clock c) both local memory and clock d) none of the mentioned

Last Answer : both local memory and clock

Description : Point out the correct statement: 1) Different types of cloud computing service models provide different levels of security services 2) Adapting your on-premises systems to a cloud model requires that you determine what ... are correct B. only 1 is correct C. 2 and 3 are correct D. none are correct

Last Answer : 1,2,3 are correct

Description : Point out the correct statement: 1) Different types of cloud computing service models provide different levels of security services 2) Adapting your on-premises systems to a cloud model requires that you determine what ... are correct B. only 1 is correct C. 2 and 3 are correct D. none are correct

Last Answer : 1,2,3 are correct

Description : Which of the following cloud does not require mapping? a) Public b) Private c) Hybrid d) None of the mentioned

Last Answer : Public

Description : Point out the correct statement. a) The cloud service model you choose does not determine the variety of security features, compliance auditing, and other requirements b) To determine the particular ... you normally use for your applications only CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : To determine the particular security mechanisms you need, you must perform a mapping of the particular cloud service model to the particular application you are deploying

Description : Point out the correct statement. a) Different types of cloud computing service models provide different levels of security services b) Adapting your on-premises systems to a cloud model requires that ... be transferred and stored in an encrypted format for security purpose d) All of the mentioned

Last Answer : Data should be transferred and stored in an encrypted format for security purpose d) All of the mentioned

Description : Point out the correct statement. a) To determine whether your application will port successfully, you should perform a functionality mapping exercise b) Cloud computing supports some application features better ... directs traffic to the cloud during times of high traffic d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) To determine whether your application will port successfully, you should perform a functionality mapping exercise b) Cloud computing supports some application features better ... directs traffic to the cloud during times of high traffic d) All of the mentioned

Last Answer : All of the mentioned

Description : Nickel-cadmium batteries are superior to lead-acid batteries at high discharge rates because they _______________. A. deliver a large amount of power and can be recharged in a shorter time B. need ... less mounting space C. have higher output voltages and require no maintenance D. all of the above

Last Answer : Answer: A

Description : A cloud provider offers an environment for building applications that will run from the customer's environment. Which cloud computing delivery model are they using? A. Platform as a Service B. Software as a Service C. Development as a Service D. Infrastructure as a Service

Last Answer : Platform as a Service

Description : The virtual address generated by a CPU is 32 bits. The Translation Lookaside Buffer (TLB) can hold total 64 page table entries and a 4-way set associative (i.e. with 4- cache lines in the set). The page size is 4 KB. The minimum size of TLB tag is (A) 12 bits (B) 15 bits (C) 16 bits (D) 20 bits

Last Answer : (C) 16 bits Explanation: VirtualAddress = 32 bits PageSize = 4KB = 12 bits therefore : VPNTag = 20 bits, OffsetTag = 12 bits TLBEntryLength = VPNTag = 20 bits TotalTLBEntries = 64, 4-way implies ... therefore : TLBIndex = 4 bits TLBTag = TLBEntryLength - TLBIndex = 20 - 4 = 16 bits

Description : _________ is a data area shared by hardware devices or program processes that operate at different speeds or with different sets of priorities. A. Flash memory B. Virtual memory C. Buffer D. None of the Above

Last Answer : C. Buffer

Description : What advantage is there for an enterprise to adopt a virtual private cloud model? A. Reduce costs by adopting a flexible pricing model for the entire operation. B. Reduce infrastructure ... such as security and performance since the entire infrastructure will be managed within the IT department.

Last Answer : Manage sensitive data in a compliant and secure manner and benefit from flexible pricing models for select services or infrastructure.

Description : Which one of the following is ‘computing that allows continuous access to remote resources even with the physical mobility of small computing devices such as laptops’? a) Soft computing b) Mobile computing c) Remote computing d) Ubiquitous computing

Last Answer : Mobile computing

Description : What are two common concerns in a cloud environment? (Choose two.) A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access ... same physical ethernet, they should not be able to read or modify each other's network traffic.

Last Answer : Illegal access to private data stored by applications in the cloud.If two guest instances are running on the same host or on different hosts connected to the same physical ethernet, they should not be able to read or modify each other's network traffic

Description : A storage area used to store data to a compensate for the difference in speed at which the different units can handle data is A) Memory B) Buffer C) Accumulator D) Address

Last Answer : Answer : B

Description : A storage area used to store data to a compensate for the difference in speed at which the different units can handle data is a. Memory b. Buffer c. Accumulator d. Address

Last Answer : Buffer

Description : A storage area used to store data to a compensate for the difference in speed at which the different units can handle data is a. Memory b. Buffer c. Accumulator d. Address

Last Answer : b. Buffer

Description : Which one of the following statements is false regarding the Distributed Cache? a) The Hadoop framework will ensure that any files in the Distributed Cache are distributed to all map and reduce tasks. b) ... Cache on to the slave node before any tasks for the job are executed on that node.

Last Answer : MapReduce tries to place the data and the compute as close as possible

Description : _________ allows different operating systems to run in their own memory space. a) VGM b) VMc c) VMM d) All of the mentioned

Last Answer : VMM

Description : _________ is the transfer of computer data from a temporary storage area to the computer’s permanent memory. A. Flash B. Virtual C. Buffer Flush D. None of the Above

Last Answer : C. Buffer Flush

Description : 8096 write-protected mode, no code can write to memory address between __. a) 2020 to 3FFFH b) 8000 to FFFFH c) 2000 to 3FFFH d) 2020 to 202FH 17. If the __ pin is ___ , then we have the option ... b) EA, low, internal, external c) EA, high, external, internal d) EA, low, external, internal

Last Answer : c) EA, high, external, internal

Description : The sender is a router thathas receiveda datagram destinedfor a host on thesame network. The logical address that mustbe mapped to a physical address is ______. A) thedestination IP address in the datagram ... IP address of therouter found inthe routing table C) either a or b D) noneof the above

Last Answer : thedestination IP address in the datagram header