Accounting and Financial Management (3) Analog and Digital Communication (2) Artificial Intelligence (2) BE(Civil) (2) BE(CSE) (83) BE(ECE) (11) BE(Mech) (10) Business Processes (3) C# and .NET Framework (2) Communication Skills (1) Compiler Design (1) COMPONENT BASED TECHNOLOGY (1) COMPUTER ARCHITECTURE (1) COMPUTER GRAPHICS and MULTIMEDIA SYSTEMS (6) COMPUTER INTEGRATED MANUFACTURING (1) Computer Networks (9) Computer Organization (2) Computer Programming (1) Consumer Behaviour (1) Control Systems (1) Cryptography and Network Security (3) Datastructures and Algorithms (10) Datawarehousing and Mining (1) DBMS (5) DESIGN AND ANALYSIS OF ALGORITHMS (9) DESIGN OF MACHINE ELEMENTS (1) DIGITAL PRINCIPLES AND SYSTEMS DESIGN (3) Discrete Mathematics (1) DISTRIBUTED COMPUTING (2) DSP (8) DYNAMICS OF MACHINERY (2) Economic Foundations (1) ELECTRICAL ENGINEERING (1) ELECTRICAL ENGINEERING AND CONTROL SYSTEMS (1) Electromagnetic Fields (3) ELECTRONIC CIRCUITS (1) ELECTRONIC COMMERCE (4) ELECTRONIC DEVICES AND CIRCUITS (1) EMBEDDED SYSTEMS (1) FUNDAMENTALS OF COMPUTING (2) Graphics and Multimedia (3) HEAT AND MASS TRANSFER (1) HUMAN RESOURCE MANAGEMENT (1) Internet Programming (9) INTRODUCTION TO FINITE ELEMENT ANALYSIS (1) Legal Aspects of Business (1) MANAGEMENT INFORMATION SYSTEMS (1) Marketing Management (1) MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE (4) MATHEMATICS - I (1) MBA (9) MCA (83) MCA QUESTION BANK (2) MECHATRONICS (1) MicroProcessor and Controllers (4) MICROPROCESSORS AND APPLICATIONS (5) MIDDLE WARE TECHNOLOGIES (3) MOBILE COMPUTING (5) NETWORK PROGRAMMING (1) NUMERICAL METHODS (1) OBJECT ORIENTED ANALYSIS AND DESIGN (5) Object Oriented Programming (18) Operating System (2) OPERATING SYSTEMS (9) Organizational Behaviour (2) POWER ELECTRONICS (1) Principles of Management (8) PROBABILITY AND QUEUEING THEORY (2) Probability and Statistics (1) PROBLEM SOLVING AND PROGRAMMING (2) PROCESS PLANNING AND COST ESTIMATION (1) PROFESSIONAL ETHICS AND HUMAN VALUES (1) RANDOM PROCESSES (1) RESOURCE MANAGEMENT TECHNIQUES (2) ROBOTICS (1) Security analysis (1) Service Marketing (1) SIGNALS AND SYSTEMS (1) Software Engineering (8) SOFTWARE PROJECT MANAGEMENT (4) SOFTWARE QUALITY MANAGEMENT (2) System Software (2) TCP/IP PROTOCOL SUITE (3) Theory of Computation (4) Total Quality Management (2) UNIX AND NETWORK PROGRAMMING (4) Visual Programming (2) WEB GRAPHICS (2) WEB TECHNOLOGY (2) XML AND WEB SERVICES (4)

Friday, July 4, 2008

COMPUTER ARCHITECTURE 2008 - B.E C.S.E

COMPUTER ARCHITECTURE
PART-A
1) What is tri state gate?
2) Why is the data bus in most microprocessors bidirectional while the address bus is unidirectional?
3) Perform 1010100-1000100 using 1’s and 2’s complement?
4) Define underflow and overflow?
5) What is pipelining and what are the advantages of pipelining?
6) What is the difference between hardwired control and micro programmed control?
7) List the difference between static RAM and dynamic RAM?
8) Define the terms: spatial locality and temporal locality?
9) What factors influences the bus design decisions?
10)What is priority interrupt?


PART-B

11)a) i) With a neat diagram explain Von-Neumann computer architecture.
ii) What are the major instruction design issues?
(or)
b) i) Explain various instruction formats in details.
ii) What is a stack and what are operations on stack? Give any three applications 
of stack.
12)a) i) Design a 4-bit binary adder/ subtractor and explain its operation.
ii) Give the algorithm for multiplication of signed 2’s complement numbers and . illustrate with an example.
(or)
b) i) Design an array multiplier that multiplies two 4-bit numbers and explain its 
operation. 
ii) Write the algorithm for division of floating point numbers and illustrate with
an example.
13)a) i) What is branch hazard? Describe the methods for dealing with the branch 
hazard.
ii) With a suitable diagram describe the sequence of micro operations involved in 
fetching and executing a typical instruction.
(or)
b) What is data hazard? Explain the methods for dealing with the data hazards.

14) a) i) Describe the functional characteristics that are common to the devices used to 
build main and secondary computer memories.
ii) Explain various mechanisms of mapping main memory address into cache 
memory addresses.
(or)
b) i) Explain how the virtual address is converted into real address in a paged virtual 
memory system.
ii) Describe the working principle of a typical magnetic disk.
15) a) Draw the typical lock diagram of a DMA controller and explain how it is used for 
direct data transfer between memory and peripherals.
(or)
b) i) Describe the working principles of USB.
ii) Briefly compare the characteristics of SCSI with PCI.

No comments:

Post a Comment