CS6303 - CA - Question Bank
CS6303 - CA - Question Bank
DEPARTMENT OF CSE
PART-A
The small and fast RAM units are called as caches.when the execution of an instruction
calls for data located in the main memory,the data are fetched and a copy isplaced in the
cache.Later if the same data is required it is read directly from the cache.
The control unit acts as the nerve center,that coordinates all the computer operations. It
issues timing signals that governs the data transfer.
5. What are the registers generally contained in the processor? (Nov/Dec 2012)
6. Distinguish between auto increment and auto decrement addressing mode. (Apr/May 2010)
It is generally used to increment or decrement the array pointer. For example while
executing a loop the processor may require to increment or decrement the pointer to the adjacent
address at each iteration. So it can be used to increment or decrement file pointers, or it can be used
to implemet stack in which the top can be incremented (TOP++) or decremented(TOP--).
RISC
• Simple instructions, few in number
• Fixed length instructions
• Complexity in compiler
• Only LOAD/STORE instructions access memory
• Few addressing modes
CISC
• Many complex instructions
• Variable length instructions
• Complexity in microcode
• Many instructions can access memory
• Many addressing modes
1.Fetch
2.Decode
3.Execute
4.Store
An interrupt is a request from an I/O device for service by the processor. The processor
provides the requested service by executing the interrupt service routine.
The buffer register is used to avoid speed mismatch between the I/O device and the
processor.
A system that contains only one bus(i.e only one transfer at a time) is called as a single bus
structure. A system is called as multiple bus structure if it contains multiple buses.
o Entering and editing application programs and storing them as files in secondary
storage devices. Ex: Assembler, Linker, Compiler etc
A system software program called a compiler translates the high-level language program
into a suitable machine language program containing instructions such as the Add and Load
instructions.
It is used for entering and editing application programs. The user of this program
interactively executes command that allow statements of a source program entered at a keyboard to
be accumulated in a file.
OS is a large program, or actually a collection of routines, that is used to control the sharing
of and interaction among various computer units as they execute application programs. The OS
routines perform the tasks required to assign computer resources to individual application
programs.
Opcode is the portion of a machine language instruction that specifies the operation to be
performed. Their specification and format are laid out in the instruction set architecture of the
processor.
The operating system manages the concurrent execution of several application programs to
make the best possible uses of computer resources. This pattern of concurrent execution is called
multiprogramming or multitasking.
The total time to execute the total program is called elapsed time.it is affected by the speed
of the processor, the disk and the printer.
The periods during which the processor is active is called processor time of a programIt depends on
the hardware involved in the execution of individual machine instructions.
T=N*S/R
Where,
T=processor time
N=no of instructions
S=no of steps
R=clock rate
The assignment of successive addresses to successive byte locations in the memory is called
byte addressable memory.
26. What is big endian and little endian format? (Nov/Dec 2014)
The name big endian is used when lower byte addresses are used for the more significant of
the word. The name little endian is used for the less significant bytes of the word.
Branch instruction is a type of instruction which loads a new value into the program counter.
As a result of branch instructions , the processor fetches and executes the instruction at a
new address called branch target, instead of the instruction at the location that follows the branch
instruction in sequential address order.
The processor keeps track of information about the results of various operations for use by
subsequent conditional branch instructions. This is accomplished by recording the required
information in individual bits, often called condition code flags.
The different ways in which the location of an operand is specified in an instruction are
referred to as addressing modes.
31. What is Relative addressing mode? When it is used?(May/ June 2012) (Nov/Dec 2014)
Relative addressing mode is used by branch instructions (e.g. BEQ, BNE, etc.) which
contain a signed 8 bit relative offset (e.g. -128 to +127) which is added to program counter if the
condition is true. As the program counter itself is incremented during instruction execution by two
the effective address range for the target instruction must be with -126 to +129 bytes of the branch.
The register or memory location that contains the address of an operand is called a pointer.
In index mode the effective address of the operand is generated by adding a constant value
to the contents of a register. The register used may be either a special register or may be any one of
a set of general purpose registers in the processor. This register is referred to as an index register.
A complete set of symbolic names and rules for the use of machines constitute a
programming language, generally referred to as an assembly language.
Assembler directives are not instructions that will be executed .It simply informs the
assembler that the name SUM should be replaced by the value 200 wherever it appears in the
program; such statements are called as assembler directives.
Loader is a system software which contains a set of utility programs. It will load the object
program to the memory.
The buffer registers DATAIN and DATAOUT and the status flags SIN and SOUT are part
of circuitry commonly known as a device interface.
39. What are the basic functional units of a computer?
Input, memory, arithmetic and logic unit, output and control units are the basic functional
units of a computer
Response time is the time between the start and the completion of the event. Also referred
to as execution time or latency. Throughput is the total amount of work done in a given amount of
time
41. Suppose that we are considering an enhancement to the processor of a server system
used for web serving. The new CPU is 10 times faster on computation in the web serving
application than the original processor. Assuming that the original CPU is busy with
computation 40% of the time and is waiting for I/O 60% of the time. What is the overall
speedup gained by incorporating the enhancement?
Fractionenhanced = 0.4
Speedupenhanced = 10
Speedupoverall = 1/(0.6+0.4/10) =1/0.64 = 1.56
Temporal locality, states that recently accessed items are likely to be accessed in the near
future. Spatial locality, says that items whose addresses are near one another tend to be referenced
close together in time.
Amdahl‟s law states that in parallelization, if P is the proportion of a system or program that
can be made parallel, and 1-P is the proportion that remains serial, then the maximum
speedup that can be achieved using N number of processors is 1/((1-P)+(P/N).
Speedup is limited by the total time needed for the sequential (serial) part of the program.
For 10 hours of computing, if we can parallelize 9 hours of computing and 1 hour cannot be
parallelized, then our maximum speedup is limited to 10x.
45. List the Eight Great Ideas in Computer Architecture? (April/May 2015)
PART B
9. What are the special registers in a typical computer? Explain their purposes in detail.
(Apr/May 2010)
10. Explain about RISC & CISC?(May/June 2012)
11. With examples explain the data transfer, logic and Program control
instructions? (Apr/May 2011)
12. Explain the Components of a Computer System? (Nov/Dec 2014) (Nov/Dec 2015)
13. State the CPU Performance Equation and discuss the factors that affect
Performance? (Nov/Dec 2014)
UNIT II
ARITHMETIC OPERATIONS
PART-A
1. Write the overflow conditions for addition and subtraction. (April/May 2015)
Overflow will occur
Case 1. When Adding Operands with Same Signs
Case 2. When Subtracting operands with Different Signs
8. Give the representation of double precision floating point number (Nov/Dec 2015)
31 30 20 19 0
S Exponent Fraction
1-bit 11-bits 20-bits
63 32
Fraction (continued here)
32-bits
Rounding is a method to make the intermediate floating point result fit into the floating
point format; the goal is to find the nearest number that can be represented in the format.
Every processor has its own graphic display. Many graphic systems originally used 8 bit to
represent each of the three primary colors (RGB) plus 8 bit for a location of a pixel. In addition to
graphic display, speakers and microphones for teleconferencing and video games suggested support
of sound as well. Audio samples need more than 8 bits of precision, but 16 bits are sufficient.
The goal of the extra rounding bits is to allow the computer to get the same results as if the
intermediate results were calculated to infinite precision and then rounded. To support this goal and
round to the nearest even, a bit is used in rounding in addition to guard and round that is set
whenever there are nonzero bits to the right of the round bit. This sticky bit allows the computer to
see the difference between 0.50….0010 and 0.50….0110 when rounding.
Carry look-ahead adder uses two functions: carry generate and carry propagate
Pi = Ai Bi
Gi = Ai Bi
Here Gi is called carry generate and it produces a carry when both Ai and Bi are one,
regardless of the input carry. Pi is called carry propagate because it is the term associated with the
propagation of the carry from Ci to Ci+1. Now Ci+1 can be expressed as a sum of products function
of the P and G outputs of all the preceding stages.
Recoded Multiplier = +1 0 -1 0 +1 -1
Multiplicand = 010011
Multiplier = 001100
Recoded Multiplier = 0 +1 0 -1 0 0
Booth‟s Multiplication:
0 1 0 0 1 1
0 +1 0 -1 0 0
---------------------------------------------------
00000000000 0
00000000000
1 1 1 1 1 0 1 1 0 1 ----- 2‟s compliment of the multiplicand
00000000 0
0 0 0 1 0 0 1 1
0 0 0 0 0 0 0 0
---------------------------------------------------
00001110010 0
---------------------------------------------------
20. State the Bit Pair Recoding Table?
22. Multiply the given signed 2’s compliment numbers using bit-pair recoding technique.
Data hazards arise when an instruction depends on the results of a previous instruction in a way that
is expressed by the overlapping of instructions in the pipeline.
Overflow can occur when the signs of two operands are the same. Overflow occurs when the carry
bits Cn and Cn-1 are different.
29. What is the delay encountered for Cn-1, Sn-1 and Cn in the FA for a single stage
Cn-1 – 2(n-1)
Sn-1 – 2(n-1)+1
Cn – 2n
30. What is the delay encountered for all the sum bits in n-bit binary addition/subtraction
logic unit?
The gate delays with and without overflow logic are 2n+2 and 2n respectively
31. Write down the basic generate and propagate functions for stage i
32. Write down the general expression for Ci+1 using first level generate and propagate
function
Ci+1 = Gi+PiGi-1+PiPi-1Gi-2+…+PiPi-1…P1G0+PiPi-1…P0G0
The Transformation 011… 110= +100…0 – 10 is called skipping over one‟s. In his case
multiplier has its ones grouped into a few contiguous blocks.
In the worst case each bit of the multiplier selects the summands. This results in more
number of summands.
37. What are the two techniques for speeding up the multiplication operation?
38. How bit pair recoding of multiplier speeds up the multiplication process?
It guarantees that the maximum number of summands that must be added is n/2 for nbit
operands.
It reduces the time needed to add the summands. Instead of letting the carries ripple along
the rows, they can be saved and introduced into the next row, at the correct waited position.
40. Write down the levels of CSA steps needed to reduce k summands to two
vectors in CSA
41. Write down the steps for restoring division and non-restoring division
Non Restoring:
Step1: Do the following n times
1. If the sign of A is 0, shift A and Q left one bit position and subtract M from A
otherwise shift A and Q left and add M to A.
2. Now if the sign of A is 0, set Q0 to 1; otherwise set Q0 to 0
Step 2: If the sign of A is 1, add M to A
Restoring:
Shift A and Q left one binary position
Subtract M from A
If the sign of A is one , set Q0 to 0, add M back to A otherwise set Q0 to 1
Non restoring division avoids the need for restoring the contents of register after an
successful subtraction.
43. What is the need for adding binary 8 value to the true exponential in floating
point numbers? (May/June 2013)
This solves the problem of negative exponent. Due to this the magnitude of the numbers can
be compared. The excess-x representation for exponents enables efficient comparison of the relative
sizes of the two floating point numbers.
44. Briefly explain the floating point representation with an example?(Nov/Dec 2012)
The floating point representation has 3 fields
1.sign bit
2.significiant bits
3.exponent
1. Single-precision format
2. Double-precision format
The exceptions encounter for FP operation are overflow, underflow,/0,inexact and invalid
values.
Guard bits are extra bits which are produced during the intermediate steps to yield
maximum accuracy in the final results.
1. Chopping
2 .Von Neumann rounding
3. Rounding procedure
50. What is register indirect addressing mode? When it is used? (Nov / Dec 2013)
The effective address for a Register indirect instruction is the address in the specified
register. For example, (A7) to access the content of address register A7.
The effect is to transfer control to the instruction whose address is in the specified register.
PART – B
UNIT III
PIPELINING
PART-A
Combinational Elements:
The elements that operate on data values are all combinational, which means that their
outputs depend only on the current inputs. Given the same input, a combinational element
always produces the same output. ALU is an example for a combinational element, since, given
a set of inputs, it always produces the same output because it has no internal storage.
State Elements:
An element contains state if it has some internal storage. We call these elements state
elements because, if we pulled the power plug on the computer, we could restart it by loading
the state elements with the values they contained before we pulled the plug. Furthermore, if we
saved and restored the state elements, it would be as if the computer had never lost power. Thus,
these state elements completely characterize the computer. The instruction and data memories,
as well as the registers, are all examples for state elements.
For a variety of reasons, one of the pipeline stages may not be able to complete the
processing task for a given instruction in the time allotted. Any condition that causes the pipeline to
stall (delay) is called a hazard.
Types of Hazards
There are three types of hazards. They are
Structural Hazards
Data Hazards
Control Hazards (or) Instruction Hazards
20. What is meant by branch prediction? List its types? (Nov/Dec 2015)
Branch prediction is a technique for predicting branch penalty associated with conditional
branches is to attempt to predict whether or not a particular branch will be taken or not. There are
two forms of branch prediction techniques. They are
Static Branch Prediction
Dynamic Branch Prediction
PART B
PARALLELISM
PART-A
8. Define – VLIW
VLIW is a style of instruction set architecture that launches many operations that are
defined to be independent in a single wide instruction, typically with many separate opcode fields.
Example
Consider how the unrolled code would look using only $t0. There would be repeated
instances of lw $t0, 0($s1), addu $t0, $t0, $s2 followed by sw $t0, 4($s1), but these sequences,
despite using $t0, are actually completely independent – no data values flows between one pair of
these instructions and the next pair. This is what is called an antidependences or name dependence,
which is an ordering forced purely by the reuse of a name, rather than a real data dependence which
is also called a true dependence.
Disadvantages of SIMD
SIMD is at its weakest in case or switch statements, where each execution unit must
perform a different operation on its data, depending on what data it has.
Execution units with the wrong data are disabled, so that units with proper data may
continue. Such situation essentially run at 1/nth performance, where „n‟ is the number of
cases.
PART-B
1. Explain the different techniques used for implementing Instruction level parallelism?
(Nov/Dec 2014)
2. Explain in detail about the concept of Speculation?
3. Explain the various techniques used for improving performance in static multiple
issue processors?
4. Explain briefly about Dynamic Multiple Issue Processor with neat diagram?
5. Explain the difficulties faced by parallel processing programs?
6. Explain shared memory multiprocessor?
7. Explain in detail Flynn’s classification of parallel hardware? (Nov/Dec 2015)
8. Explain cluster and other Message passing Multiprocessor?
9. Explain in detail the different forms of hardware Multithreading? (Nov/Dec 2014)
(Nov/Dec 2015)
10. Explain SISD and MIMD
11. Explain SIMD and MISD
12. Explain Multicore processors (Nov/Dec 2014)
13. Explain the different types of multithreading?
14. Discuss SISD, MIMD, SIMD, SPMD, and vector systems? (April/May 2015)
15. What is hardware multithreading? Compare and contrast fine grained
multithreading and coarse grained multithreading? (April/May 2015)
UNIT - V
PART-A
1. What is the maximum size of the memory that can be used in a 16-bit computer and 32 bit
computer?
The maximum size of the memory that can be used in a 16-bit computer is 216=64K memory
locations.
The maximum size of the memory that can be used in a 32-bit computer is
232 =4G memory locations.
The time required to access one word is called the memory access time. Or It is the time that
elapses between the initiation of an operation and the completion of that operation.
It is the minimum time delay required between the initiations of two successive
memory operations. Eg. The time between two successive read operations.
A memory unit is called as RAM if any location can be accessed for a read or
write operation in some fixed amount of time that is independent of the location‟s
address.
5. What is MMU?
A memory cell is capable of storing one bit of information. It is usually organized in the
form of an array.
7. What is a word line?
In a memory cell, all the cells of a row are connected to a common line called as word line.
Memories that consists of circuits capable of retaining their state as long as power
is applied is called Static memories.
Because their contents are lost when power is interrupted. So SRAMs are said to be volatile.
· Low cost.
· High density.
· Refresh circuitry is needed.
It is a circuit which ensures that the contents of a DRAM are maintained when each row of
cells are accessed periodically.
It is used to refer to the amount of time it takes to transfer a word of data to or from the
memory.
Synchronous DRAMs are those whose operation is directly synchronized with a clock
signal.
When transferring blocks of data, it is of interest to know how much time is needed to
transfer an entire block. since blocks can be variable in size it is useful to define a performance
measure in terms of number of bits or bytes that can be transferred in one second. This measure is
often referred to as the memory bandwidth.
Double data rates SDRAMs are those which can transfer data on both edges of the clock and
their bandwidth is essentially doubled for long burst transfers.
Mother Board is a main system printed circuit board which contains the processor.It will
occupy an unacceptably large amount of space on the board.
SIMMs are Single In-line Memory Modules. DIMMs are Dual In-line Memory Modules.
Such modules are an assembly of several memory chips on a separate small board that plugs
vertically into a single socket on the motherboard.
A memory controller is a circuit which is interposed between the processor and the dynamic
memory. It is used for performing multiplexing of address bits.It provides RAS-CAS timing. It also
sends R/W and CS signals to the memory. When used with DRAM chips , which do not have self
refreshing capability , the memory controller has to provide all the information needed to control
the refreshing process.
22. Differentiate static RAM and dynamic RAM? (Nov / Dec 2013)
The key feature of Ram bus technology is a fast signaling method used to transfer
information between chips. Instead of using signals that have voltage levels of either 0 or V supply
to represent the logic values, the signals consist of much smaller voltage swings around a reference
voltage, vref. Small voltage swings make it possible to have short transition times, which allows for
a high speed of transmission.
RDRAMs are Ram bus DRAMs. Ram bus requires specially designed memory chips. These
chips use cell arrays based on the standard DRAM technology. Multiple banks of cell arrays are
used to access more than one word at atime. Circuitry needed to interface to the Ram bus channel is
included on the chip. Such chips are known as RDRAMs.
RDRAM chips can be assembled in to larger modules called RIMMs. It can hold upto 16
RDRAMs.
29. Why EPROM chips are mounted in packages that have transparent window?
Since the erasure requires dissipating the charges trapped in the transistors of memory cells.
This can be done by exposing the chip to UV light .
The chip must be physically removed from the circuit for reprogramming and its entire
contents are erased by the ultraviolet light.
31. What are the advantages and disadvantages of using EEPROM? (Apr/May 2011)
The advantages are that EEPROMs do not have to be removed for erasure.Also it is possible
to erase the cell contents selectively. The only disadvantage is that different voltages are needed for
erasing, writing and reading the stored data.
It is a small, fast memory that is inserted between the larger, slower main memory and the
processor. It reduces the memory access time.
Analysis of programs shows that many instructions in localized areas of the program are
executed repeatedly during some time period., and the remainder of the program is accessed
relatively infrequently. This is referred to as locality of reference. This property leads to the
effectiveness of cache mechanism.
36. What are the two aspects of locality of reference?. Define them.
Two aspects of locality of reference are temporal aspect and spatial aspect. Temporal aspect
is that a recently executed instruction is likely to be executed again verysoon. The spatial aspect is
that instructions in close proximity to a recently executed instruction are also to be executed soon.
For a write operation using write through protocol during write hit: the cache location and
the main memory location are updated simultaneously. For a write miss: For a write miss, the
information is written directly to the main memory.
For a write operation using this protocol during write hit: the technique is to update only the
cache location and to mark it as updated with an associated flag bit, often called the dirty or
modified bit. The main memory location of the word is updated later, when the block containing
this marked word is to be removed from the cache to make room for a new block. For a write miss:
the block containing the addressed word is first brought into the cache, and then the desired word in
the cache is overwritten with the new information.
45. Define hit rate? ( NOV/DEC 2006) (Nov / Dec 2013) (Nov/Dec 2015)
The number of hits stated as a fraction of all attempted access.
46. What are the two ways of constructing a larger module to mount flash chips on a
small card?
· Flash cards
· Flash drivers
The sum of seek time and rotational delay is called as access time for disks. Seek time is the
time required to move the read/write head to the proper track. Rotational delay or latency is the
amount of time that elapses after the head is positioned over the correct track until the starting
position of the addressed sector passes under the read/write head.
51. What is the formula for calculating the average access time experienced by the processor?
tave=hc +(1-h)M
Where
h =Hit rate
M=miss penalty
C=Time to access information in the cache.
52. What is the formula for calculating the average access time experienced by the processor
in a system with two levels of caches?
tave =h1c1(1-h1)h2c2+(1-h1)(1-h2)M
where
h1=hit rate in L1 cache
h2=hit rate in L2 cache
C1=Time to access information in the L1 cache.
C2=Time to access information in the L2 cache.
61. What is virtual memory and what are the benefits of virtual memory? (APRIL/MAY
2010)
Techniques that automatically move program and datablocks into the physical main memory
when they are required for execution are called as virtual memory.
The virtual memory concept also frees the programmer. The programmer no longer needs to
worry about the size constraints of the physical memory on every computer his or her program is
going to be used.
When the power is turned on the OS has to be loaded into the main memory which takes
place as part of a process called booting. To initiate booting a tiny part of main memory is
implemented as a nonvolatile ROM.
78. What are the two important mechanisms for implementing I/O operations?
There are two commonly used mechanisms for implementing I/O operations .They are
interrupts and direct memory access.
87. What is known as an interrupt vector / Vectored Interrupt? (Nov / Dec 2013)
The location pointed to by the interrupting device is used to store the starting address of the
interrupt-service routine .The processor reads this address, called the interrupt vector.
98. What is known as Direct Memory Access? (NOV/DEC 2006) (Nov/Dec 2012) (Nov/Dec
2014)
A special control unit may be provided to allow transfer of a block of data directly between an
external device and the main memory, without continuous intervention by the processor. This
approach is called direct memory access, or DMA.
104. Name and give the purpose of widely used bus standard. (Apr/May 2010)
The GPIB or General Purpose Interface Bus or IEEE 488 bus is still one of the more popular
and versatile interface standards available today. GPIB is widely used for enabling electronics test
equipment to be controlled remotely, although it us also used in a many other applications including
data acquisition. Today most bench electronics test equipment has either a GPIB option or are fitted
with it as standard.
125. What is the purpose of Dirty/Modified bit in Cache Memory? (Nov/Dec 2014)
For a write operation using this protocol during write hit: the technique is to update only the
cache location and to mark it as updated with an associated flag bit, often called the dirty or
modified bit. The main memory location of the word is updated later, when the block containing
this marked word is to be removed from the cache to make room for a new block. For a write miss:
the block containing the addressed word is first brought into the cache, and then the desired word in
the cache is overwritten with the new information.
PART-B
17. Explain how I/O devices can be interfaced with a block diagram. (NOV/DEC 2007)
(May/June 2013)
18. Explain DMA and the different types of bus arbitration mechanisms. (May/June 2012)
(Nov/Dec 2012) (Nov/Dec 2014) (Nov/Dec 2015)
19. Explain synchronous and asynchronous bus.
20. Write notes on the following((May/June 2012)
i. PCI (Nov/Dec 2012) (May/June 2013)
ii. SCSI
iii. USB
21. Design parallel priority interrupt hardware for a system with eight interrupt source.
(MAY/JUNE 2007)
22. Explain how DMA transfer is accomplished with a neat diagram. ( NOV/DEC 2006)
23. Draw the typical block diagram of a DMA controller and explain how it is used for direct
data transfer between memory and peripherals. (APRIL/MAY 2008) & (MAY/JUNE
2007)
24. Explain how data may be transferred from a hard disk to memory using DMA including
arbitration for the bus,. Assume a synchronous bus, and draw a timing diagram showing
the data transfer. (MAY/JUNE 2006)
25. Explain the use of vectored interrupts in processors. Why is priority handling desired in
interrupt controllers? How do the different priority schemes work?
(MAY/JUNE 2006)
26. Write short notes on: (NOV/DEC 2007)
i. DMA.
ii. Bus Arbitration
iii. Printer-processor Communication.
iv. USB.
27. Explain the organization of a magnetic disk in detail. (MAY/JUNE 2007)
28. How do you connect multiple I/O devices to a processor using interrupts? Explain with
suitable diagrams. (NOV/DEC 2007)
29. Explain the use of DMA Controllers in a computer system with a neat diagram.
30. Explain Handshake protocol. Depict clearly how it controls data transfer during an input
operation. (APRIL/MAY 2008)
31. Describe the working principles of USB. (APRIL/MAY 2008) & (MAY/JUNE 2006)
32.Briefly compare the characteristics of SCSI with PCI. (APRIL/MAY 2008) & (NOV/DEC
2006) & (MAY/JUNE 2007)
33.Describe the functions of SCSI with a meat diagram. (MAY/JUNE 2007)
34.Explain the advantages of USB over older I/O bus architecture. ( NOV/DEC 2006)
35.Describe the hardware mechanism for handling multiple interrupt requests.
(APRIL/MAY 2010)
36. What are handshaking signals? Explain the handshake control of data
transfer during input and output operation. (APRIL/MAY 2010)(Apr/May 2011)
37. What are the needs for input- output interface? Explain the functions of a typical 8- bit
parallel interface in detail. (APRIL/MAY 2010) (Apr/May 2011)
38. Describe the USB architecture and protocols with the help of a neat diagram.
(APRIL/MAY 2010)(Apr/May 2011).
39. What is interrupt? Explain the different types of interrupts and the different ways of
handling interrupts? (Nov/Dec 2012)
40. Explain in detail about Buses? (May/June 2013)
41. Design a parallel priority interrupt hardware for a system with eight interrupt sources
and explain? (Nov / Dec 2013)
42. Explain the USB interface? (Nov / Dec 2013)
43. Write short note on I/O Processor? (Nov / Dec 2013)
44. What is the need for an I/O Interface? Describe the functions of SCSI Interface with neat
diagram? (Nov / Dec 2013)
45. Elaborate on the various memory technologies and its relevance? (April/May 2015)
================================*******================================