ImageVerifierCode 换一换
格式:DOCX , 页数:8 ,大小:49.62KB ,
资源ID:6018602      下载积分:3 金币
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.bdocx.com/down/6018602.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(计算机组成与体系结构B卷.docx)为本站会员(b****5)主动上传,冰豆网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知冰豆网(发送邮件至service@bdocx.com或直接QQ联系客服),我们立即给予删除!

计算机组成与体系结构B卷.docx

1、计算机组成与体系结构B卷姓名 学号 学院 专业 座位号 ( 密 封 线 内 不 答 题 )密封线线_ _ 诚信应考,考试作弊将带来严重后果! 华南理工大学期末考试 计算机组成与体系结构 试卷B注意事项:1. 考前请将密封线内填写清楚; 2. 所有答案请直接答在试卷上; 3考试形式:闭卷; 4. 本试卷共 三 大题,满分100分, 考试时间120分钟。题 号一二三四五总分得 分评卷人I. 单项选择题(2 points each)Answer the question 1-2 based on the following information:A memory system uses 24-bi

2、t physical address. It has a direct-mapped cache with 64 entries. The block size is 4 words (word size is 4 bytes). Each cache entry has a “valid bit”, a “tag field”, and space for data.1. The number of bits reserved for the tag field is_.A. 14 B. 10 C. 6 D. 122. The total number of bits in the cach

3、e is_.A. 26*(143) B. 26*(33) C. 28*(145) D. 214*(33) 3. Which one of the following about one-address instruction is true? _A. One-address instruction has only one operandB. One-address instruction may have one operand or two operandsC. One-address instruction has two operands, and the other operand

4、is provided implicitlyD. One-address instruction may have three operands, and the other two operands are provided implicitly4. CPU responses the interrupt request_. A. after it completes its fetch cycleB. after it completes its execution cycleC. when the interrupt source issues the interrupt request

5、 D. when the bus is not busy5. The advantage of carry-lookahead adder is_. A. Optimize the structure of the adderB. Save hardware partsC. Accelerate the generation of the carriesD. Augment the structure of the adder6. In microprogram-controlled machines, the relationship between the machine instruct

6、ion and the microinstruction is_. A. a machine instruction is executed by a microinstructionB. a microinstruciton is composed of several machine instructionsC. a machine instruction is interpreted by a microroutine composed of microinstructionsD. a microroutine is executed by a machine instruction7.

7、 Once the DMA controller obtains access to the system bus, it transfers one byte of data and then returns the control of system to the processor. This DMA transfer mode is_. A. Burst Mode C. Cycle Stealing ModeB. Block Mode D. Transparent Mode8. Assume that the capacity of a kind of SRAM chip is 16K

8、32, so the sum of address lines and data lines of this chip is_. A. 48 B. 46 C. 36 D. 329. Assume that the multiplicand is 110011 and the multiplier is 101110. If multiply them using the Booth algorithm, then the Booth recoding multiplier is_. A. 1 1 0 0 1 0 C. 1 + 1 0 0 1 0 B. + 1 1 0 0 + 1 0 D. 1

9、+ 1 0 0 1 0 10. The microroutines for all instructions in the instruction set of a computer are stored in the .A. memory controller C. control store B. main memory D. cache11. _ is the process by which the next device to become the bus master is selected and bus mastership is transferred to it. A. B

10、us protocol C. Bus timingB. Bus arbitration D. Bus transceiver12. _ has/have external fragmentation problem.A. Paging C. Segmentation with pagingB. Segmentation D. Segmentation and segmentation with paging13. The range and accuracy of floating-point numbers depend on_ respectively. A. The size of ex

11、ponent and the representation of mantissaB. The size of exponent and the size of mantissaC. The size of mantissa and the representation of exponentD. The size of mantissa and the size of exponent14. In a synchronous bus, controlling of data transfer on the bus is based on _. A. a common clock signal

12、 onlyB. a handshake signal onlyC. both clock signal and handshake signalD. either clock signal or handshake signal15. Which one of the following is not used to prevent data hazards? _A. BypassingB. ForwardingC. StallD. Freeze or FlushII. 简答题(5 points each)1. What is the difference between DRAM and S

13、RAM, in terms of characteristics such as speed, size, cost and application? Solution:2. In what circumstance will arithmetic overflow occur when two integers represented by 2s complement form are added? And write out the logic expression to detect overflow.Solution: 3. Describe the process of interr

14、upt processing. Solution:4. (5 points) What are the advantages and disadvantages of hardwired and microprogrammed control? Solution:III. 综合题(10 points each)1. Using nonrestoring division algorithm, perform the operations AB on the 5-bit unsigned numbers A= 10101 and B= 00101. Write the computation p

15、rocesses in a computer machine.Solution: 2. A byte-addressable computer has 16 address lines, 8 data lines, WR signal (read/write control signal) and MREQ signal (access memory control signal). Its address space includes:a) system program area ranging from 0 to 8191(decimal)b) user program area rang

16、ing from 8192 to 32767(decimal)c) and the last 2K address space for system program working areaThere are some memory chips: ROM: 8K8SRAM: 16K1, 2K8, 4K8, 8K8(1) Please specify how many chips to select to design the main memory of the computer.(2) Draw the logic structure figure of the main memory, a

17、nd the connection between the main memory and CPU.Solution:3. The following figure gives part of the microinstruction sequence corresponding to one of the machine instructions of a microprogrammed computer. Microinstruction B is followed by C, E, F, or I, depending on bits b6 and b5 of the machine i

18、nstruction register. Compare the two possible implementations described below. (1) Microinstruction sequencing is accomplished by means of a microprogram counter. Branching is achieved by microinstructions of the form: If b6b5 branch to X where b6b5 is the branch condition and X is the branch addres

19、s.(2) Same as (1) except that the branch microinstruction has the form:Branch to X, ORWhere X is a base branch address. The branch address is modified bybit-ORing of bits b5 and b6 with the appropriate bits with X.ABb6b5=11b6b5=10b6b5=00b6b5=01CEFIDGHJSolution:4. Consider a computer with 4M16 memory

20、 contains 97 instructions in its instruction set. The opcode length is fixed, and the addressing modes are direct, indirect, immediate, index, and relative. (Assume that the instruction length equals to word length) (1) Draw the figure of one-address instruction format, and specify the function of e

21、ach field.(2) Specify the max range of the direct addressing mode. (in decimal)(3) Specify the addressing range of one-level indirect addressing mode. (in decimal)(4) Specify the offset of the relative addressing mode. (in decimal)Solution: 5. A logic circuit is needed to implement the priority netw

22、ork shown like the following figure. The network handles three interrupt request lines. When a request is received on line INTRi, the network generates an acknowledgement on line INTAi. If more than one request is received, only the highest-priority request is acknowledged, where the ordering of priority is: priority of INTR1 priority of INTR2 priority of INTR3.(1) Give a truth table for each of the outputs INTA1, INTA2, and INTA3.(2) Give logic expressions of INTA1, INTA2, INTA3 and a logic circuit for implementing this priority network.Solution:

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1