In computer science, data hazard occurs when (1) pipeline changes the order of read/write access to operands (2) performance loss (3) machine size is limited (4) some functional unit is not fully pipelined 

1 Answer

Answer :

pipeline changes the order of read/write access to operands

Related questions

Description : A 32-bit address bus allows access to a memory of capacity(a) 64 Mb (b) 16 Mb (c) 1Gb (d) 4 Gb 2.Which processor structure is pipelined? a) all x80 processors b) all x85 processors c) all x86 processors

Last Answer : c) all x86 processors

Description : Science bases its estimation of the size of a product on a) Files (Fi), Flows (Fl) and Processes (Pr) b) Lines of Code (kLOC) c) Function Points (FP) d) operands and operators e) Feature Points (FeP).

Last Answer : d) operands and operators

Description : An example of the risk involved in development is a) Key personnel may resign before the product is complete b) The manufacturer of critical components (e.g. the hardware  associated with a ... a fully functional lower-cost  equivalent package e) All of these are risks involved in development.

Last Answer : e) All of these are risks involved in development.

Description : A stake machine pushes operands on a stack and evaluates binary operators by a pcs (i.e pop/compute/store) where the top two operands are popped computation is performed and the result is pushed onto stack. ... 1 pcs instructions (c) 4 push and 1 pcs instructions (d) 5 push and 2 pcs instructions 

Last Answer : A stake machine pushes operands on a stack and evaluates binary operators by a pcs (i.e pop/compute/store) where the top two operands are popped computation is performed and the result is pushed onto stack. ... 1 pcs instructions (c) 4 push and 1 pcs instructions (d) 5 push and 2 pcs instructions 

Description : Which processor structure is pipelined? a) all x80 processors b) all x85 processors c) all x86 processors

Last Answer : c) all x86 processors

Description : What are the steps required for a pipelined processor to process the instruction?

Last Answer : • F Fetch: read the instruction from the memory • D Decode: decode the instruction and fetch the source operand(s). • E Execute: perform the operation specified by the instruction. • W Write: store the result in the destination location

Description : Given a source code with 10 operators includes 6 unique operators, and 6 operand including 2 unique operands. The program volume is ? 48 120 720 insufficient data

Last Answer : 48

Description : What is the store by register: a. data b. operands c. memory d. None of these

Last Answer : a. data

Description : Which of the following is a full -service merchant wholesaler? A)Cash -and -carry wholesaler B)Limited -line wholesaler C)Drop shipper D)Mail -order wholesaler E)Functional middleman

Last Answer : B)Limited -line wholesaler

Description : __________ testing assumes that the path of logic in a unit or program is known. A. Black Box testing B. Performance Testing C. White Box testing D. Functional testing

Last Answer : C. White Box testing

Description : Which of the following is non-functional testing? a) Black box testing b) Performance testing c) Unit testing d) None of the mentioned

Last Answer : Ans : b 

Description : These machines can use stored data for a limited time period only. a) Reactive Machine b) Self-Awareness c) Limited machine d) Theory of mind

Last Answer : c) Limited machine

Description : These machines can use stored data for a limited time period only. a) Reactive Machine b) Self-Awareness c) Limited machine d) Theory of mind

Last Answer : c) Limited machine

Description : A byte addressable computer has a memory capacity of 2 m Kbytes and can perform 2 n operations. An instruction involving 3 operands and one operator needs a maximum of (A) 3m bits (B) m + n bits (C) 3m + n bits (D) 3m + n + 30 bits

Last Answer : (D) 3m + n + 30 bits

Description : What is the importance of developing Chabahar Port by India? (1) India's trade with African countries will enormously increase. (2) India's relations with oil-producing Arab countries will be ... (4) Pakistan will facilitate and protect the installation of a gas pipeline between Iraq and India.

Last Answer : (3) India will not depend on Pakistan for access to Afghanistan and Central Asia. Explanation: In May 2016, India and Iran signed the "historic" Chabahar port agreement, which has the potential of becoming India's gateway to Afghanistan, Central Asia and Europe. So, C is the most fitting answer.

Description : Ageism refers to a) Bias against older people based solely on chronological age Individuals demonstrating ageism base their beliefs and attitudes about older people based upon chronological age without consideration ... refers to the age-related loss of memory in the absence of a pathologic process.

Last Answer : a) Bias against older people based solely on chronological age Individuals demonstrating ageism base their beliefs and attitudes about older people based upon chronological age without consideration of functional capacity.

Description : Disc compensators are provided in large diameter fuel gas carrying pipelines to (A) Keep the pipe in proper orientation (B) Make the pipe joint leak-proof (C) Account for contraction/expansion ... due to temperature changes of the surroundings (D) Account for the pressure variation side the pipeline

Last Answer : (C) Account for contraction/expansion of pipe due to temperature changes of the surroundings

Description : Today's computer giant IBM was earlier known by a different name which was changed in 1924. What was that name: a) Tabulator Machine Corp. b) Computer Tabulating Recording Corp. c) International Computer Limited d) None of The Above

Last Answer : b) Computer Tabulating Recording Corp.

Description : Boundary layer separation occurs when the (A) Pressure reaches a minimum (B) Cross-section of the channel is reduced (C) Valve is closed in a pipeline (D) Velocity of sound is reached

Last Answer : (B) Cross-section of the channel is reduced

Description : You got a brand-new, fully-functional replicator with a built-in fusion generator, outfitted with a library of everyday items and a modelling system to let you make your own stuff. What do you make first?

Last Answer : TPS reports. If I make enough in advance, then I can have all of my Fridays off.

Description : What is a good linux distribution whose 64 bit version is fully functional?

Last Answer : answer:I use Gentoo and it's 64-bit. Mostly. I use a 32-bit version of Firefox for Flash, although I'm not sure I need to; I seem to remember a 64-bit version of Flash being available. ... compile on a 64-bit processor with little or no changes (unless they changes are wrapped up in the source).

Description : Sun also has the Hadoop Live CD ________ project, which allows running a fully functional Hadoop cluster using a live CD. a) OpenOffice.org b) OpenSolaris c) GNU d) Linux

Last Answer : OpenSolaris

Description : What is Fully Functional dependency?

Last Answer : It is based on concept of full functional dependency. A functional dependency X Y is full functional dependency if removal of any attribute A from X means that the dependency does not hold any more.

Description : Radiation is a health hazard because it occurs

Last Answer : Radiation is a health hazard because it occurs A. Pneumonia B. Leukaemia C. Hemophilia D. Anaemia

Description : Read the assertion and reason carefully to mark the correct option in question. 1. Assertion: Cell is the fundamental structural and functional unit o

Last Answer : Read the assertion and reason carefully to mark the correct option in question. 1. Assertion: Cell is ... . D. If both Assertion & Reason are false.

Description : The instruction set can have variable-length instruction format primarily due to: a. Varying number of operands b. Varying length of opcodes in some CPU ce. Both d. None

Last Answer : ce. Both

Description : Which of the following is the storage area whit in the computer itself which Holds data only Temporarily as the computer processes instructions? 1) The Hard Disk 2) Main Memory 3) The Control unit 4) Read Only Memory

Last Answer : 4) Read Only Memory

Description : When a top-level function is entered, the LISP processor do(es)? a) It reads the function entered b) It evaluates the function and the function’s operands c) It prints the results returned by the function d) All of the mentioned

Last Answer : d) All of the mentioned

Description : specify where to get the source and destination operands for the operation specified by the a. Operand fields and opcode b. Opcode and operand c. Source and destination d. Cpu and memory

Last Answer : a. Operand fields and opcode

Description : The source/destination of operands can be the_ or one of the general-purpose register: a. Memory b. One c. both d. None of these

Last Answer : a. Memory

Description : Execution of instruction specified by instruction to perform: a. Operation b. Operands c. Both a &b d. None of these

Last Answer : a. Operation

Description : Ingiven lines of code MOV AX,BL have different type of operands according to assembler for 8086 architecture these identifiers must be of. a. Different type only in byte b. Same type either in word or byte c. Botha &b d. None of these

Last Answer : b. Same type either in word or byte

Description : In Microprocessor one of the operands holds a special register called: a. Calculator b. Dedicated c. Accumulator d. None of these

Last Answer : c. Accumulator

Description : The compiler converts all operands upto the type of the largest operand is called (A) Type Promotion (B) Type Evaluation (C) Type Conversion (D) Type Declaration

Last Answer : (A) Type Promotion 

Description : ______ is RAM that combines the fast read and write access of Dynamic RAM A. VRAM B. WRAM C. MRAM D. FRAM

Last Answer : D. FRAM Ferroelectric RAM

Description : Separate Read/Write heads are required in which of these memory access schemes. 1) Random Access 2) Sequential Access 3) Direct Access 4) None of these

Last Answer : 4) None of these

Description : Separate Read/Write heads are required in which of these memory access schemes. 1 Random Access 2 Sequential Access 3 Direct Access 4 None of these

Last Answer : 4 None of these

Description : A first order reaction A → B occurs in an isothermal porous catalyst pellet of spherical shape. If the concentration of A at the centre of the pellet is much less than at the external surface, the ... A) Diffusion within the pellet (B) Reaction (C) External mass transfer (D) None of the above

Last Answer : (A) Diffusion within the pellet

Description : X Limited forfeited Ram's 20 shares of Rs. 10 each on which Rs. 7 is called up. Ram had paid application and allotment money of Rs. 5 per share. Of these forfeited shares 15 shares were reissued to Hari as fully paid up ... to Capital Reserve account ? (A) Rs. 15 (B) Rs. 20 (C) Rs. 75 (D) Rs. 100

Last Answer : Answer: Rs. 15

Description : Refrigerator & Washing Machine using "2 to 3 prong" adapter: Fire hazard?

Last Answer : Usually those adapters have a holed, metal tab with a sticking off the bottom. The faceplate screw goes through the hole and grounds the via the screw’s connection to the box in the wall. At least, I’d check to make sure the screw is running through the tab.

Description : A Venturimeter cannot be used for the direct measurement of (A) Datum difference in the stretch of pipe-flow (B) Pressure difference in the flow through pipeline (C) Friction loss in pipe flow (D) All (A), (B) and (C)

Last Answer : (D) All (A), (B) and (C)

Description : The energy loss over a length of pipeline according to Darcy-Weisbach equation for pipe flow is ___________ the mean velocity of flow. (A) Directly proportional to (B) Directly proportional to square of (C) Inversely proportional to (D) Inversely proportional to square of

Last Answer : (B) Directly proportional to square of

Description : An interface that provides I/O transfer of data directly to and form the memory unit and peripheral is termed as________ A. DDA B. Serial interface C. Direct Memory Access (DMA) D. None of the Above

Last Answer : C. Direct Memory Access (DMA)

Description : Which of the following is/are hard disk performance parameter? A. Seek time B. Latency period C. Access time D. All of the above

Last Answer : D. All of the above

Description : A hazard: A) is a potentially damaging physical event, phenomenon, or human activity B) may cause the loss of life or injury, property damage, C) may generate social and economic disruption or environmental degradation. D) all of the above

Last Answer : D) all of the above

Description : An extreme natural phenomenon capable of causing disaster leading to loss of lives or damage to property is known as- (a) Natural hazard (b) Hazard calculation (c) Desertification (d) None of the above

Last Answer : (a) Natural hazard

Description : Google cloud SQL Features a) Lets your application read files from and write files to buckets in Google cloud storage b) A Fully -managed web service that allows you to create , ... large applications into logical components that can be share stateful services and communicate in secure fashion.

Last Answer : A Fully –managed web service that allows you to create , configure , and use relational databases that live in Google’s cloud

Description : B order contain a) Proposed changes in the sorting list b) Performance of SA duties in mail offices c) Disposal of camp articles d) None of the above

Last Answer : b) Performance of SA duties in mail offices

Description : A order contain a) Proposed changes in the sorting list b) Performance of SA duties in mail offices c) Disposal of camp articles d) None of the above

Last Answer : a) Proposed changes in the sorting list

Description : The instructions for starting the computer are house on A) Random access memory B) CD-Rom C) Read only memory chip D) All of above

Last Answer : Answer : C