31. . . . . . . . . register is designated to point to the 68000 processor stack.
32. The pipeline bubbling is a method used to prevent data hazard and structural hazards.
33. The processor indicates to the devices that it is ready to receive interrupts . . . . . . . .
34. Which of the following techniques used to effectively utilize main memory?
35. The 68000 uses . . . . . . . . method to access I/O devices buffers.
36. To get the physical address from the logical address generated by CPU we use . . . . . . . .
37. The Branch instruction in 68000 provides how many types of offsets?
38. The last field in the packet is . . . . . . . .
39. The data packets can contain data upto . . . . . . . .
40. What is subroutine nesting?
Read More Section(Computer Architecture)
Each Section contains maximum 100 MCQs question on Computer Architecture. To get more questions visit other sections.
