module 2

module 2

University

10 Qs

quiz-placeholder

Similar activities

Cache

Cache

University

10 Qs

Unit 1: Introduction to microcontrollers

Unit 1: Introduction to microcontrollers

University

12 Qs

Quiz sobre Memorias Semiconductoras

Quiz sobre Memorias Semiconductoras

University

10 Qs

Module 4: Quiz 2 Gururaj Surampalli

Module 4: Quiz 2 Gururaj Surampalli

University

10 Qs

Basics of Embedded Systems

Basics of Embedded Systems

University

15 Qs

MICROPROCESSOR

MICROPROCESSOR

University

7 Qs

Code Blitz 40

Code Blitz 40

University

15 Qs

Regularization Techniques Quiz

Regularization Techniques Quiz

University

15 Qs

module 2

module 2

Assessment

Quiz

Engineering

University

Hard

Created by

Padmanaban R

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following techniques is used to reduce cache miss penalty?
A. Increasing associativity
B. Critical word first and early restart
C. Increasing cache block size indefinitely
D. Write-through policy only

Increasing associativity

Critical word first and early restart

Increasing cache block size indefinitely

Write-through policy only

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A victim cache is mainly used to:

Store dirty blocks before write-back

Reduce conflict misses

Increase block size without increasing latency

Store data for prefetching

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is true about DRAM compared to SRAM?

DRAM is faster but more expensive

DRAM is slower but denser and cheaper

DRAM uses flip-flops to store bits

DRAM requires no refresh cycles

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In virtual memory, the translation from virtual address to physical address is handled by:

Cache controller

Page table and TLB

DMA controller

Instruction decoder

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One key advantage of using virtual machines is:

Lower instruction execution latency

Better direct hardware control by the user process

Isolation between multiple OS instances

Elimination of context switching

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a challenge in designing efficient virtual machines?

Privileged instruction handling

Memory virtualization overhead

Instruction fetch decoding

Transparent resource sharing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Intel Core i7 uses which cache inclusion policy?

Exclusive L2 cache

Inclusive L3 cache

Non-inclusive, non-exclusive L3 cache

Victim cache for L2

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?