Computer Architecture And Design Interview Questions & Answers
Download PDF

Elevate your Computer Architecture And Design interview readiness with our detailed compilation of 42 questions. Each question is designed to test and expand your Computer Architecture And Design expertise. Suitable for all experience levels, these questions will help you prepare thoroughly. Download the free PDF now to get all 42 questions and ensure you're well-prepared for your Computer Architecture And Design interview. This resource is perfect for in-depth preparation and boosting your confidence.

42 Computer Architecture And Design Questions and Answers:

Computer Architecture And Design Job Interview Questions Table of Contents:

Computer Architecture And Design Job Interview Questions and Answers
Computer Architecture And Design Job Interview Questions and Answers

1 :: Described some of the common rules of assembly language?

Some of the common rules of assembly level language are as follows:
★ In assembly language the label field can be either empty or may specify a symbolic address.
★ Instruction fields can specify pseudo or machine instructions.
★ Comment fields can be left empty or can be commented with.
★ Up to 4 characters are only allowed in the case of symbolic addresses.
★ The symbolic addresses field are terminated by a comma whereas the comment field begins with a forward slash.

2 :: List the components of the Ven Neumann architecture?

The main components of the Ven Nuemann architecture were as follows:
★ It consisted of a main memory which would be used to store all the data and instructions.
★ It would consist of an arithmetic logical unit also known as the ALU. This part was to be able to work with binary data.
★ It also comprised of a control unit which would be responsible for the interpretation of instructions and their execution.
★ The control unit would also be controlled by the control unit itself.

3 :: Which steps are involved in an instruction cycle?

Any program residing in the memory contains a set of instruction that need to be executed by the computer in a sequential manner. This cycle for every instruction is known as the instruction cycle . The cycle consists of the following steps:
★ Fetch instruction:
Like the name stated in this process the cpu fetches the instruction from the memory. The PC get loaded with the address of the instruction.
★ Decode:
The instruction: In this process the instruction gets decoded by the processor.
★ In case the instruction has an indirect address the effective address is read from the memory.
★ Fetch the operand from the memory
★ Execution:
Once the instruction gets decoded the processor executes the instruction.
★ Result:
Store the result in the appropriate place.

4 :: Described the characteristics of the RISC architecture?

RISC meaning reduced instruction set as the acronym say aims to reduce the execution times of instructions by simplifying the instructions. The major characteristics of RISC are as follows:
★ Compared to normal instructions they have a lower number of instructions.
★ The addressing modes in case of RISC is also lower.
★ All the operations that are required to be performed take place within the CPU.
★ All instruction are executed in a single cycle hence have a faster execution time.
★ in this architecture the processors have a large number of registers and a much more efficient instruction pipeline.
★ Also the instruction formats are of fixed length and can be easily decoded.

5 :: Explain about the major difficulties of pipeline conflicts in processors supporting pipe lining?

The following are the main reasons for pipe line conflicts in the processor:
★ When the same resource is accessed at the same time by two different segments it results in resource conflicts. The only way to resolve this problem is to use separate data memories.
★ In case an instruction's execution depends on the result of a previous instruction and that result is unavailable it leads to data dependency conflicts.
★ Instructions that change the count of the PC can cause a lot of problems. This is prevalent particularly in the case of Branch instructions. A method to resolve this issue is known as delayed load where certain instruction are made to execute in a delayed manner to avoid conflicts.

6 :: Described the different types of fields that are part of an instruction?

An instruction can be considered to be a command that has been issued to a computer to perform a particular operation. The instruction format contains various field in them such as:

★ Operation Code Field:
Also known as the op code field, this field is used to specify the operation to be performed for the instruction.
★ Address Field:
This field as its name specifies is used to designate the various addresses such as register address and memory address.
★ Mode field:
This field specifies as to how effective address is derives or how an operand is to perform.
★ For ex. ADD R0, R1. In this case the ADD is the operand whereas the R1, ans R0 are the address fields.

7 :: List the different types of micro-operations?

The micro-operations in computers are classified into the following categories:
★ Register transfer micro-operations:
These type of micro operations are used to transfer from one register to another binary information.
★ Arithmetic micro-operations:
These micro-operations are used to perform on numeric data stored in the registers some arithmetic operations.
★ Logic micro-operations:
These micro operations are used to perform bit style operations / manipulations on non numeric data.
★ Shift micro operations:
As their name suggests they are used to perform shift operations in data store in registers.

8 :: Explain Write through method?

Considered to be the simplest this method involves the updating of the main memory corresponding to every write operation. With this the cache memory is also updated in parallel in case it also contains the word specified at the address. The primary advantage of this method is data integrity, the primary and the cache memory both contain the same data.

9 :: Explain Write back method?

In this method only the location in the cache is updated. Whenever such an update occurs a flag is set which makes sure that in case the word is removed from the cache the correct copy is saved to the main memory. This approach is usually taken when a word is constantly updated at frequent intervals.

10 :: Explain Set-associative mapping?

This form of mapping is a modified form of the direct mapping where the disadvantage of direct mapping is removed. Set-associative mapping allows that each word that is present in the cache can have two or more words in the main memory for the same index address.

11 :: What is Associative mapping?

In this type of mapping the associative memory is used to store content and addresses both of the memory word. This enables the placement of the any word at any place in the cache memory. It is considered to be the fastest and the most flexible mapping form.

12 :: Explain Direct mapping?

In direct mapping the RAM is made use of to store data and some is stored in the cache. An address space is split into two parts index field and tag field. The cache is used to store the tag field whereas the rest is stored in the main memory. Direct mapping`s performance is directly proportional to the Hit ratio.

13 :: Explain Vertical Micro code?

★ In case of vertical micro code every action is encoded in density.
★ Vertical micro code are slower but they take less space and their actions at execution time need to be decoded to a signal.

14 :: Explain Horizontal Micro Code?

★ In this types of code the micro code contains the control signal without any intermediary.
★ Horizontal micro code instruction contain a lot of signals and hence due to that the number of bits also increase.

15 :: Described the features of Assembly language?

★ Although Assembly level languages are not easy to understand they are relatively easier as compared to machine level languages.
★ The programs written in this language are not portable and the debugging process is also not very easy.
★ The programs developed in assembly language are thoroughly machine dependent.

16 :: Described the features of high level language?

★ High level languages are easily understandable.
★ The programs that are developed in high level language are portable.
★ In case of high level languages debugging of the code is easy and the program written is not machine dependent.

17 :: Explain virtualization with the pros and cons?

In a way virtualization appears similar to emulation but actually it shares hardware resources from the host OS.
★ This method is slower as compared to partition method but is faster than emulation.
★ Virtualization had also vast support considering it can also provide with 3d support.
★ With the help of virtualization it enable users to create virtual clusters.
★ But virtualization systems require a lot of memory in form of ram.
★ For virtualization it is mandatory that the virtualized platform has the same architecture as the host pc otherwise due to incompatibilities it is not possible.

18 :: Give advantages and disadvantages of partitioning in reference to operating systems?

★ Partitioning allows each operating system to work optimally.
★ Each os has the complete access to the hardware of the system on which it is being executed.
★ Also depending on the file system used the user is free to resize his partition according to his needs.
★ But manual partition is not a simple task and requires patience.
★ The system needs to be restarted in case the user wants to switch operating systems.

19 :: Explain partitioning in reference to operating systems?

Partitioning involves the user to partition their hard drives and then they can implement / install multiple operating systems on them. The user requires a boot manager to switch between different operating systems.

20 :: What are Flip-flops?

★ Flip flops are also known as bi-stable multi-vibrators. They are able to store one bit of data.
★ Flip flops are able to be in two stable states namely one and zero. They can be in either states and in order to change their states they have to be driven by a trigger.
★ Certain flip flops are edge triggered meaning they only respond to voltage changes from one level to another. They can be either positive edged triggering or negative edged triggering.
★ Flip flops turn on in a random manner that is they can be in either of the states when they are turned on. In order to have a uniform state when they are powered on a CLEAR signal has to be sent to the flip flops. They can also be made to turn on in a particular state by applying PRESET.

21 :: Described the different ways in which the table can be organized?

★ On the basis of the demands of the CPU data is transferred between the two memories.
★ Due to this a mapping technique is required which can be implemented using page-table.
★ The page table can be organized in two ways namely in the R/W memory and by using associative logic.
★ In case of R/W memory the speed of execution of programs is slow as it requires two main memory references to read data. It is also known as memory page table.
★ In case of associative logic it is considered to be more effective because it can be built with simply keeping mind to have equal no. of blocks in the memory as many as there are words.

22 :: What are the requirement of page-table?

For any computer generally the memory space is lesser as compared to the address space this implies that the main memory is lesser as compared to the secondary memory.

23 :: Can you explain the two hardware methods to establish priority?

Two different ways of establishing hardware priority are Daisy Chaining and parallel priority.
★ Daisy chaining is a form of a hardware implementation of the polling procedure.
★ Parallel priority is quicker of the two and uses a priority encoder to establish priorities.
★ In parallel priority interrupt a register is used for which the bits are separated by the interrupt signals from every device.
★ The parallel priority interrupt may also contain a mask register which is primarily used to control the status of every request regarding interrupts.

24 :: Explain about designing strategy of a control unit coded on vertical code?

★ A no operation NOP can be included in each field if necessary.
★ The remaining micro operations can be distributed among the other operation field bits.
★ Also micro operations that modify the same registers could be grouped together in the same field.

25 :: What is Vertical microcode?

Vertical microcode can be considered to be a segment of code or operators that have been clubbed together into fields. In this field every micro operation is given a unique value.
Computer Architecture And Design Interview Questions and Answers
42 Computer Architecture And Design Interview Questions and Answers