Top 150+ Solved Muli-core Architectures and Programming MCQ Questions Answer

From 16 to 30 of 120

Q. Alternative way of a snooping-based coherence protocol, is called a____________

a. Write invalidate protocol

b. Snooping protocol

c. Directory protocol

d. Write update protocol

  • c. Directory protocol

Q. If no node having a copy of a cache block, this technique is known as ______

a. Cached

b. Un-cached

c. Shared data

d. Valid data

  • b. Un-cached

Q. A processor performing fetch or decoding of different instruction duringthe execution of another instruction is called ______.

a. Direct interconnects

b. Indirect interconnects

c. Pipe-lining

d. Uniform Memory Access

  • c. Pipe-lining

Q. All nodes in each dimension form a linear array, in the __________.

a. Star topology

b. Ring topology

c. Connect topology

d. Mesh topology

  • d. Mesh topology

Q. The concept of pipelining is most effective in improving performance if thetasks being performed in different stages :

a. require different amount of time

b. require about the same amount of time

c. require different amount of time with time difference between any two tasks being same

d. require different amount with time difference between any two tasks being different

  • b. require about the same amount of time

Q. The expression 'delayed load' is used in context of

a. processor-printer communication

b. memory-monitor communication

c. pipelining

d. none of the above

  • c. pipelining

Q. Producer consumer problem can be solved using _____________

a. semaphores

b. event counters

c. monitors

d. All of the above

  • c. monitors

Q. The segment of code in which the process may change common variables, update tables, write into files is known as :

a. program

b. critical section

c. non – critical section

d. synchronizing

  • b. critical section

Q. All deadlocks involve conflicting needs for __________

a. Resources

b. Users

c. Computers

d. Programs

  • a. Resources

Q. To avoid deadlock ____________

a. there must be a fixed number of resources to allocate

b. resource allocation must be done only once

c. all deadlocked processes must be aborted

d. inversion technique can be used

  • a. there must be a fixed number of resources to allocate
Subscribe Now

Get All Updates & News