Top 150+ Solved Muli-core Architectures and Programming MCQ Questions Answer
Q. Alternative way of a snooping-based coherence protocol, is called a____________
a. Write invalidate protocol
b. Snooping protocol
c. Directory protocol
d. Write update protocol
Q. If no node having a copy of a cache block, this technique is known as ______
a. Cached
b. Un-cached
c. Shared data
d. Valid data
Q. Requesting node sending the requested data starting from the memory,and the requestor which has made the only sharing node, known as ________.
a. Read miss
b. Write miss
c. Invalidate
d. Fetch
Q. A processor performing fetch or decoding of different instruction duringthe execution of another instruction is called ______.
a. Direct interconnects
b. Indirect interconnects
c. Pipe-lining
d. Uniform Memory Access
Q. All nodes in each dimension form a linear array, in the __________.
a. Star topology
b. Ring topology
c. Connect topology
d. Mesh topology
Q. The concept of pipelining is most effective in improving performance if thetasks being performed in different stages :
a. require different amount of time
b. require about the same amount of time
c. require different amount of time with time difference between any two tasks being same
d. require different amount with time difference between any two tasks being different
Q. The expression 'delayed load' is used in context of
a. processor-printer communication
b. memory-monitor communication
c. pipelining
d. none of the above
Q. During the execution of the instructions, a copy of the instructions isplaced in the ______ .
a. Register
b. RAM
c. System heap
d. Cache
Q. Producer consumer problem can be solved using _____________
a. semaphores
b. event counters
c. monitors
d. All of the above
Q. A situation where several processes access and manipulate the same data concurrently and the outcome of the execution depends on the particular order in which access takes place is called:
a. data consistency
b. race condition
c. aging
d. starvation
Q. The segment of code in which the process may change common variables, update tables, write into files is known as :
a. program
b. critical section
c. non – critical section
d. synchronizing
Q. All deadlocks involve conflicting needs for __________
a. Resources
b. Users
c. Computers
d. Programs
Q. ___________ are used for signaling among processes and can be readily usedto enforce a mutual exclusion discipline.
a. Semaphores
b. Messages
c. Monitors
d. Addressing
Q. To avoid deadlock ____________
a. there must be a fixed number of resources to allocate
b. resource allocation must be done only once
c. all deadlocked processes must be aborted
d. inversion technique can be used
Q. A minimum of _____ variable(s) is/are required to be shared betweenprocesses to solve the critical section problem.
a. one
b. two
c. three
d. four