For CISC architecture___ controllers are better:

a. Microprogrammed
b. Hardwired
c. Betterwired
d. None of these

1 Answer

Answer :

a. Microprogrammed

Related questions

Description : Which control unit is implemented as combinational circuit in the hardware. a. Microprogrammed control unit b. Hardwired control unit c Blockprogrammed control unit d. Macroprogrammed control unit

Last Answer : b. Hardwired control unit

Description : In length instruction some programs wants a complex instruction set containing more instruction, more addressing modes and greater address rang, as in case of a. RISC b. CISC c. Both d. None

Last Answer : b. CISC

Description : In length instruction other programs on the other hand, want a small and fixed-size instruction set that contains only a limited number of opcodes, as in case of a. RISC b CISC c. Both d. None

Last Answer : a. RISC

Description : Which is a type of microprocessor that is designed with limited number of instructions: a. CISC b. RISC ce. Both d. None

Last Answer : ce. Both

Description : Which is a method of decomposing a sequential process into sub operations: a. Pipeline b. CISC c. RISC d. Database

Last Answer : a. Pipeline

Description : I must admit to loving the "scent of a woman" as Al Pacino might say. The scent of vanilla will always turn my head. Are any other guys out there seemingly hardwired for vanilla-based fragrances? If so, why?

Last Answer : Women smell like vanilla? This is news to me.

Description : Which is the simplest method of implementing hardwired control unit? a) State Table Method b) Delay Element Method c) Sequence Counter Method d) Using Circuits

Last Answer : Answer: a Explanation: There are 3 ways of implementing hardwired control unit: A state table is the simplest method in which a number of circuits are designed based on the cells in the table. ... a delay element. A sequence counter method used k-modulo counter as a replacement for k delay elements

Description : If the control signals are generated by combinational logic, then they are generated by a type of _______________ controlled unit. a) Micro programmed b) Software c) Logic d) Hardwired

Last Answer : Answer: d Explanation: The main task of a control unit is to generate control signals. There are two main types of control units: A hardwired control unit generates control ... combinational logic circuits and the Micro programmed control unit generates control signals by using some softwares

Description : The CU is designed by using which techniques: a. HARDWIRED CONTROLS b. MICROPROGRAMING c. NANOPROGRAMING d. ALL OF THESE

Last Answer : d. ALL OF THESE

Last Answer : Complete instruction-set computing of CISC

Description : What is the difference between CISC and RISC?

Last Answer : RISC : Reduced Instruction Set Computer. A RISC system has a reduced number of instructions (making it easier to implement efficient optimizing compilers) and more importantly it is load store architecture where ... data in two memory locations. e.g. Intel Pentium (x86), DEC MicroVAX, Motorola 680x0

Description : Identify the correct statement A) IBM PCs used RISC CPU designs B) Macintosh used CISC CPU design C) IBM used CISC CPU design D) None of above is true

Last Answer : Answer : C

Description : CISC stands for _________ A. Compound Instruction Set Computer B. Complex Information Set Computer C. Compound Information Set Computer D. Complex Instruction Set Computer

Last Answer : D. Complex Instruction Set Computer

Description : Most Keyboards use an arrangement of keys given the name: a) Dvork b) ✐ WERTY c) CISC d) None of The Above

Last Answer : WERTY

Description : CISC stands for: a. Complex instruction set computer b. Camper instruct set of computer c. Compared instruction set computer d. None of these

Last Answer : a. Complex instruction set computer

Description : Which are the architectural paradigms in microprocessor: a. RISC b. CISC c. PISC d. A and B

Last Answer : d. A and B

Description : Which is not the main feature of DEC Alpha: a. 64 Bit RISC processor b. Designed to replace 32 VAX(CISC) c. Seven stage split integer/floating point pipeline d. Variable Instruction length

Last Answer : d. Variable Instruction length

Description : CISC stands for: a. Complex Instruction System Computer b. Complex Instruction Set Car c. Complex Instruction Set Computer d. None of these

Last Answer : c. Complex Instruction Set Computer

Description : Which is the architecture of microprocessor: a. CISC b. RISC c. All of these d. None of these

Last Answer : c. All of these

Description : What is the processor used by ARM7? A. 8-bit CISC B. 8-bit RISC C. 32-bit CISC D. 32-bit RISC

Last Answer : D. 32-bit RISC 

Description : Which of the following is true about CISC processors? A. The instruction set is non-orthogonal B. The number of general purpose registers is limited C. Instructions are like macros in c language D. Variable length instructions E. All of these F. None of these

Last Answer : E. All of these 

Description : emaphore provides mutual exclusion for accesses to the buffer pool and is initialized to the value: a. Mutex b. Mutual Cc. Memory d. __ Allof these

Last Answer : Mutex

Description : Which section is basically a sequence of instruction with a clear indication of beginning and end for updating shared variables. a. Racing section b. Critical section c. d. Both None of thes

Last Answer : . Critical sectio

Description : In which section only one process is allowed to access the shared variable and all other have to wait. a. Critical section b. Racing section Cc. Entry section d. Remainder section

Last Answer : . Critical section

Description : hich section is the remaining part of a process’s code: a. Racing section b. Critical section Cc. Entry section d. Reminder secti

Last Answer : b. Entry section

Description : Which are the characteristics of deadlocks. a. Mutual exclusion b. Hold and wait Cc. No pre-emption d. = Circular wait e. Allof these

Last Answer : e. Allof these

Description : How many events concerning RAG can occur in a system: a. 1 b 2 c. 3 d 4

Last Answer : c. 3

Description : Which are the events concerning RAG can occur in a system: a. Request for a resource b. Allocation of a resource c. Release of resource d. Allof these

Last Answer : d. Allof these

Description : How many methods for handling deadlocks: a. 1 b 2 c. 3 d 4

Last Answer : c. 3

Description : Which are the method for handling deadlocks. a. Deadlock prevention b. Deadlock avoidance c. Deadlock detection d. Allof these

Last Answer : d. Allof these

Description : How many condition that should be met in order to produce a deadlock. a. 2 b 4 Cc. 6 d 8

Last Answer : b 4

Description : Which are the condition that should be met in order to produce a deadlock. a. Mutual exclusion b. Hold and Wait Cc. No preemption d. Circular wait e. Allofthese

Last Answer : e. Allofthese

Description : In protocol each process can make a request onlyinan a. Increasing order b. Decreasing order c. Botha &b d. None of these

Last Answer : a. Increasing order

Description : Which state refers to a state that is not safe not necessarily a deadlocked state. a. Safe state b. Unsafe state c. Botha &b d. None of these

Last Answer : b. Unsafe state

Description : a direct arrow is drawn from the process to the resource rectangle to represent each pending resource request: a. TS b. SP Cc. CCR d. RAG

Last Answer : d. RAG

Description : The attributes of a file are. a. Name b. Identifier c. Types d. Location e. Size f. Protection g. Time, date and user identification h. Allof these

Last Answer : h. Allof these

Description : The various file operation are: a. Crating a file b. Writing a file c. Reading a file d. Repositioning within a file e. Deleting a file truncating a file f. All of these

Last Answer : f. All of these

Description : Which operations are to be performed on a directory are: a. Search for a file b. Create a file c. Delete a file d. List a directory e. Rename a file f. Traverse the file system g. Allof these

Last Answer : g. Allof these

Description : Which memory is assembled between main memory and CPU: a. Primary memory b. Cache memory Cc. Botha & b d. None of these

Last Answer : b. Cache memory

Description : Which is one of the important I/O devices and is most commonly used as permanent storage device in any processor: a. Soft disk b. Hard disk c. Botha &b d. None of these

Last Answer : b. Hard disk

Description : can read any printed character by comparing the pattern that is stored in the computer: a. SP b. CCR Cc. RAG d. OCR

Last Answer : d. OCR

Description : Which system is a typical example of the readers and writers problem: a. Airline reservation system b. Airport reservation system c. Both d. None of these

Last Answer : a. Airline reservation system

Description : Which lock can arise when two processes wait for phone calls from one another. a. Spine lock b. Dead lock c. Both d. None of these

Last Answer : b. Dead lock

Description : Which lock is more serious than indefinite postponement or starvation because it affect more than one job: a. Deadlock b. Spinelock c. Both d. None of these

Last Answer : a. Deadlock

Description : Anumber system that uses only two digits, O and 1 is calledthe_ a. Octal number system b. Binary number system c. Decimal number system d. Hexadecimal number system

Last Answer : b. Binary number system

Description : In which computers, the binary number are represented by a set of binary storage device such as flip flop: a. Microcomputer b. Personal computer c. Digital computer

Last Answer : c. Digital computer

Description : Abinary number canbeconvertedinto a. Binary number b. Octal number co. Decimal number d. Hexadecimal number

Last Answer : co. Decimal number

Description : Which system is used to refer amount of things. a. Number system b. Number words c. Number symbols d. — Allof these

Last Answer : a. Number system

Description : _are made with some part of body, usually the hands. a. Number words b. Number symbols c. Number gestures d. __ Allof these

Last Answer : c. Number gestures

Description : ____are marked or written down: a. Number system b. Number words © Number symbols d. Number gestures

Last Answer : © Number symbols