Advanced Computers and Microprocessors Quiz

Computers and Microprocessors Quiz – Set 7

Attempt each question, then click “Show answer” to reveal the correct option and a brief explanation.

1. In computer networking, which model divides communication into seven conceptual layers?

  • A. TCP/IP model
  • B. OSI reference model
  • C. Client–server model
  • D. Peer-to-peer model
Correct answer: B. OSI reference model — It has 7 layers from Physical to Application.

2. In the OSI model, which layer is primarily responsible for end-to-end logical addressing and routing?

  • A. Data Link layer
  • B. Network layer
  • C. Transport layer
  • D. Application layer
Correct answer: B. Network layer — It handles logical addressing (e.g., IP addresses) and routing decisions.

3. Which of the following is an example of an application-layer protocol?

  • A. IP
  • B. TCP
  • C. UDP
  • D. HTTP
Correct answer: D. HTTP — IP, TCP, and UDP belong to lower layers in the TCP/IP stack.

4. In microprocessors, “instruction-level parallelism” (ILP) refers to:

  • A. Running multiple programs on different computers
  • B. Executing multiple instructions from a single program simultaneously or overlapped
  • C. Using multiple operating systems at once
  • D. Sharing one instruction among multiple CPUs
Correct answer: B. Multiple instructions in parallel — Superscalar and pipelined CPUs exploit ILP.

5. Superscalar processors improve performance mainly by:

  • A. Increasing only the clock speed
  • B. Having multiple execution units to issue and execute more than one instruction per clock cycle
  • C. Using only one very complex execution unit
  • D. Disabling pipelining completely
Correct answer: B. Multiple execution units — They can issue several instructions in the same cycle if no hazards arise.

6. In digital systems, the “flip-flop” is used primarily for:

  • A. Combinational logic without memory
  • B. Storing a single bit of data as a basic memory element
  • C. Performing high-speed arithmetic multiplication
  • D. Converting analog signals to digital signals
Correct answer: B. Storing one bit — Flip-flops are building blocks of registers and sequential circuits.

7. Which of the following is a common use of “shifts” (shift instructions) in microprocessor programming?

  • A. To reset the CPU
  • B. To quickly multiply or divide integers by powers of two
  • C. To generate random numbers
  • D. To clear the screen in a text editor
Correct answer: B. Multiply/divide by 2ⁿ — Left shifts multiply by 2, right shifts divide (for unsigned integers).

8. Which of the following describes “endianness” correctly?

  • A. The order in which bits are transmitted over a network
  • B. The order in which bytes of a multi-byte data type are stored in memory
  • C. The speed of the processor’s clock
  • D. The priority order of interrupts in a system
Correct answer: B. Byte order — Little-endian stores least significant byte first; big-endian stores most significant byte first.

9. Which of the following best describes a “watchdog timer” in embedded systems?

  • A. Timer used only to display current time to the user
  • B. Hardware timer that resets the system if software fails to periodically reset the timer
  • C. Software alarm for notifying low battery
  • D. Clock used only for payroll systems
Correct answer: B. Hardware safety mechanism — It helps recover from software hangs or infinite loops.

10. In networking, which device operates mainly at the Data Link layer (Layer 2) of the OSI model?

  • A. Hub
  • B. Switch
  • C. Router
  • D. Gateway (L7)
Correct answer: B. Switch — Modern switches make forwarding decisions based on MAC addresses (Layer 2).

11. Which of the following is a primary role of the Transport layer in the TCP/IP model?

  • A. Physical signal modulation
  • B. Routing packets between networks
  • C. Providing end-to-end reliability and flow control (e.g., TCP)
  • D. Handling web page rendering in browsers
Correct answer: C. End-to-end reliability — TCP handles segmentation, acknowledgments, and flow control.

12. Which of the following is NOT a characteristic of a good cryptographic hash function used in computer security?

  • A. Preimage resistance (hard to invert)
  • B. Collision resistance (hard to find two inputs with same hash)
  • C. Small changes in input cause small changes in output
  • D. Avalanche effect (changing one bit changes many bits of output)
Correct answer: C. Small changes in input cause small changes — Good hashes produce large, unpredictable changes (avalanche effect).

13. In CPU performance analysis, MIPS stands for:

  • A. Mega Integrated Processing System
  • B. Million Instructions Per Second
  • C. Multiple Interrupt Processing Scheduler
  • D. Memory Input Processing Speed
Correct answer: B. Million Instructions Per Second — It is a rough metric of processor speed.

14. Which of the following is a drawback of using MIPS as a sole performance metric?

  • A. It always underestimates performance.
  • B. It depends on the instruction set and may not reflect real workload performance.
  • C. It cannot be measured at all.
  • D. It is only applicable to GPUs, not CPUs.
Correct answer: B. Instruction-set dependent — Different ISAs and instruction mixes make MIPS misleading alone.

15. Which memory consistency technique ensures that multiple cores see memory writes in the same order?

  • A. Virtual memory
  • B. Cache coherence protocol
  • C. DMA
  • D. Interrupt vectoring
Correct answer: B. Cache coherence protocol — Protocols like MESI maintain a consistent view of memory across caches.

16. Which of the following is a key difference between SRAM and DRAM at the circuit level?

  • A. SRAM uses capacitors; DRAM uses flip-flops.
  • B. SRAM uses flip-flops (multiple transistors); DRAM uses capacitors that must be refreshed.
  • C. Both use identical circuits but different packaging.
  • D. DRAM is non-volatile; SRAM is volatile.
Correct answer: B. Flip-flops vs capacitors — DRAM cells leak charge and need periodic refresh, SRAM cells do not.

17. Which of the following is a typical function of a “microcode update” in modern CPUs?

  • A. Changing the physical transistor layout
  • B. Fixing low-level bugs and security vulnerabilities in the CPU’s control logic
  • C. Increasing the clock speed beyond design limits
  • D. Updating the operating system’s GUI only
Correct answer: B. Fixing low-level CPU behaviour — Microcode patches adjust how certain instructions are internally executed.

18. Which of these is an advantage of “virtual machines” (VMs) in server environments?

  • A. They eliminate the need for any operating system.
  • B. They allow multiple isolated OS instances on one physical machine, improving utilization and isolation.
  • C. They prevent all hardware failures from affecting software.
  • D. They can only run a single application at a time.
Correct answer: B. Multiple isolated OS instances — VMs support consolidation, testing, and isolation.

19. Which of the following best describes “DMA controller” role in a system?

  • A. It controls CPU instruction decoding.
  • B. It manages direct transfers of data between I/O devices and memory without continuous CPU intervention.
  • C. It schedules processes in the OS.
  • D. It encrypts data before storage on disk.
Correct answer: B. Manages direct memory access — This frees CPU cycles for other tasks.

20. In binary fixed-point numbers, what is the main effect of shifting a number left by one bit (for unsigned values)?

  • A. Divide the number by 2
  • B. Multiply the number by 2
  • C. Add 1 to the number
  • D. Subtract 1 from the number
Correct answer: B. Multiply by 2 — Each left shift increases the value by a factor of two, if no overflow occurs.

Leave a Reply

Latest News

Virus Quiz : Test your knowledge

.quiz-question { border: 1px solid #ddd; padding: 12px 16px; ...

More Articles Like This

spot_img