ImageVerifierCode 换一换
格式:DOCX , 页数:7 ,大小:52.27KB ,
资源ID:3773549      下载积分:3 金币
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.bdocx.com/down/3773549.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(计算机组成与体系结构A卷.docx)为本站会员(b****4)主动上传,冰豆网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知冰豆网(发送邮件至service@bdocx.com或直接QQ联系客服),我们立即给予删除!

计算机组成与体系结构A卷.docx

1、计算机组成与体系结构A卷姓名 学号 学院 专业 座位号 ( 密 封 线 内 不 答 题 )密封线线_ _ 诚信应考,考试作弊将带来严重后果! 华南理工大学期末考试 计算机组成与体系结构 试卷A注意事项:1. 考前请将密封线内填写清楚; 2. 所有答案请直接答在试卷上; 3考试形式:闭卷; 4. 本试卷共 三 大题,满分100分, 考试时间120分钟。题 号一二三四五总分得 分评卷人I. 单选题(2 points each)For each question in this section, choose 1 answer. Choose the best answer.1. Which one

2、 of these will cause overflow in signed addition? .A. If there is a carry out of the least significant bit. B. If there is a carry out of the most significant bit.C. If adding two negative numbers results in a positive result. D. If the magnitude of the result is smaller than the magnitude of the sm

3、aller added.2. A major advantage of direct mapping of cache is its simplicity. The main disadvantage of this organization is that .A. It does not allow simultaneous access to the intended data and its tag.B. Its more expensive than more other types of cache organizations.C. The cache hit ratio is de

4、graded if two or more blocks used alternately map onto the same block frame in the cache.D. Its access time is greater than that of other cache organizations. 3. In an interrupt process, the usage of saving PC is .A. to make CPU find the entry address of the interrupt service routineB. to continue f

5、rom the program breakpoint when returning from interruptC. to make CPU and peripherals working in parallelD. to enable interrupt nesting4. What is the effect of the following instruction? .move ecx, ebp+8A. Add 8 to the contents of ebp and store the sum in ecx.B. Add 8 to the contents of ebp, treat

6、the sum as a memory address and store the contents at that address in ecx.C. Add 8 to the contents of the memory location whose address is stored in ebp and store the sum in ecx.D. Add the contents of ebp to the contents of memory address 8 and store the sum in ecx.5. The part of machine level instr

7、uction, which tells the central processor what was to be Done is .A. operation code B. address C. operand D. none of the above6. In a cache memory system, for a write operation, if the cache location and the main memory location are updated simultaneously, then it uses technique.A. write-back B. wri

8、te-out C. write-allocation D. write-through7. is the process by which the next device to become the bus master is selected and bus mastership is transferred to it.A. Bus phase B. Bus arbitration C. Bus timing D. Bus transceiver8. Which one of the following about benefits of virtual memory is not tru

9、e? .A. provide large address space B. relieve programmers from burden of overlaysC. resolve internal fragmentation D. simplify relocation9. A hard disk with 5 platters has 2048 tracks/platter, 1024 sectors/track (fixed number of sectors per track), and 512 byte sectors. What is its total capacity? .

10、A. 5GB B. 10GB C. 15GB D. 20GB10. Translate the IEEE single-precision floating point numbers shown below to their decimal equivalent. .A. +832 B. -832 C. +416 D. -41611. In microprogram-controlled machines, the relationship between the machine instruction and the microinstruction is .A. a machine in

11、struction is executed by a microinstructionB. a microinstruciton is composed of several machine instructionsC. a machine instruction is interpreted by a microroutine composed of microinstructionsD. a microroutine is executed by a machine instruction12. In the following statements, is not true.A. Bra

12、nch instructions can cause delays in pipelined processors, because the processor cannot determine which instruction to fetch next until the branch has executed.B. Structural hazards occur when the processors hardware is not capable of executing all the instructions in the pipeline simultaneously.C.

13、Pipelining increases processor performance by decreasing the execution time of an instruction.D. Data hazards occur when the pipeline changes the order of read/write accesses to operands so that the order differs from the order seen by sequentially executing instructions on the unpipelined machine.1

14、3. Interrupts generated by the keyboard will interrupt the CPU .A. only when the CPU is executing a busy-loop.B. only when the CPU is not doing any useful work.C. after the CPU has turned on the interrupt-enable flag.D. when the CPU is executing time-critical work.14. In a computer with a microprogr

15、ammable control unit the period of the clock is determined by .A. the delay of the control memory.B. the delay of the main memory.C. the delay of the ALU.D. the sum of two of the above delays.15. If the 2010 version of a computer executes a program in 200s and the version of the computer made in the

16、 year 2011 executes the same program in 120s, then the speedup that the manufacturer has achieved over the two-year period is .A. 1.44 B. 1.78 C. 1.53 D. 1.67II. 简答题 (5 points each)1. What is the difference between the DMA and interrupt-driven methods?(from two ways to analyze: (1) What time should

17、CPU response DMA request or interrupt request? (2) Which work should CPU need to do when it acknowledges DMA request or interrupt request?)Solution:2. A set-associative cache consists of a total 32 blocks divided into 4-block sets. The main memory contains 1024 blocks, each consisting of 64 words.(1

18、) How many bits are there in a main memory address?(2) How many bits are there in each of the TAG, SET, and WORD fields?Solution:3. The two unsigned binary numbers shown below are to be multiplied using a multiplier that uses Booths Algorithm:1 0 0 1 1 0 1 0X 0 1 1 1 0 1 1 1(1) How many bits will be

19、 needed to store the product of these two numbers?(2) How many additions and subtractions will be performed by the Booths Algorithm multiplier respectively?Solution:4. What are the advantages and disadvantages of hardwired and microprogrammed control?Solution:III. 综合题(10 points each)1. Assume that a

20、 computers instruction length is 16-bit, and its operand address is 6-bit. Suppose the designers need two-address instructions, one-address instructions and zero-address instructions. How should we design the instruction format? And specify the numbers of each type of instruction can be designed.Sol

21、ution:2. Consider that floating-point numbers are represented in a 12-bit format. The scale factor has an implied base of 2 and a 5-bit, excess-15 exponent, with the two end value of 0 and 31 used to signify exact 0 and infinity, respectively. The 6-bit mantissa is normalized as in the IEEE format,

22、with an implied 1 to the left of the binary point.(1) Represent the numbers -0.6875 and +19 in this format.(2) Perform Sub Operation on the operands A = 0 10001 011011, B = 1 01111 101010. ( Note: Using rounding as the truncation method in the answers. Write the computation process! )Solution: 3. A

23、logic circuit is needed to implement the priority network shown like figure below. The network handles three interrupt request lines. When a request is received on line INTRi, the network generates an acknowledgement on line INTAi. If more than one request is received, only the highest-priority requ

24、est is acknowledged, where the ordering of priority is: priority of INTR1 priority of INTR2 priority of INTR3.(1) Give a truth table for each of the outputs INTA1, INTA2, and INTA3.(2) Give logic expressions of INTA1, INTA2, INTA3 and a logic circuit for implementing this priority network.Solution:4

25、. The following figure gives part of the microinstruction sequence corresponding to one of the machine instructions of a microprogrammed computer. Microinstruction B is followed by C, D, F, or I, depending on bits IR6, IR5 and IR4 of the machine instruction register. Give the possible implementation

26、. Microinstruction sequencing is accomplished by means of a microprogram counter. Branching is achieved by microinstructions of the form: Branch to X, OR Where X is a base branch address. The branch address is modified by bit-ORing of bits IR4, IR5 and IR6 with the appropriate bits with X.Solution:5

27、. Consider the following piece of code:int i;int A1024*1024;int x=0;for (i=0;i1024;i+) x+=Ai+A1024*i;Suppose that it is executed on a system with a 2-way set associative 16KB data cache with 32-byte blocks, 32-bit words, and an LRU replacement policy. Assume that int is word-sized. Also assume that the address of a is 0x0, that i and x are in registers, and that the cache is initially empty. How many data cache misses are there? How many hits are there?Solution:

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1