Cache Memory Writing Scheme MCQ Quiz – Objective Question with Answer for Writing Scheme of Cache Memory

11. What leads to the development of MESI and MEI protocol?

A. cache size
B. cache coherency
C. bus snooping
D. number of caches

Answer: B

The problem of cache coherency lead to the formation of two standard mechanisms called MESI and MEI protocol. MC88100 has a MESI protocol and MC68040 uses an MEI protocol.

 

12. Which of the following is also known as Illinois protocol?

A. MESI protocol
B. MEI protocol
C. Bus snooping
D. Modified exclusive invalid

Answer: A

The MESI protocol is also known as the Illinois protocol because of its formation at the University of Illinois.

 

13. What does MESI stand for?

A. modified exclusive stale invalid
B. modified exclusively shared invalid
C. modified exclusive system input
D. modifies embedded shared invalid

Answer: B

The MESI protocol supports a shared state which is a formal mechanism for controlling the cache coherency by using the bus snooping techniques. MESI refers to the states that cached data can access. In the MESI protocol, multiple processors can cache shared data.

 

14. What does MEI stand for?

A. modified embedded invalid
B. modified embedded input
C. modified exclusive invalid
D. modified exclusive input

Answer: C

MEI protocol is less complex and easy to implement. It does not allow a shared state for the cache.

 

15. Which protocol does MPC601 use?

A. MESI protocol
B. MEI protocol
C. MOSI protocol
D. MESIF protocol

Answer: A

MPC601 uses a MESI protocol, that is they have a shared state for data accessing in the cache. It can reduce the cache coherency but the cache coherency is processor-specific. So different processors have different cache coherency implementations.

 

16. Which of the following include special address generation and data latches?

A. burst interface
B. peripheral interface
C. DMA
D. input-output interfacing

Answer: A

The burst interfacing has special memory interfaces which include special address generation and data latches that help in the high performance of the processors. It takes the advantages of both the nibble mode memories and paging.

 

17. Which of the following makes use of the burst fill technique?

A. burst interfaces
B. DMA
C. peripheral interfaces
D. input-output interfaces

Answer: A

The burst interfaces use the burst fill technique in which the processor will access four words in succession, which fetches the complete cache line or written out to the memory.

 

18. How did burst interfaces access faster memory?

A. segmentation
B. DMA
C. static column memory
D. memory

Answer: C

The speed of the memory can be improved by the page mode or the static column memory which offers faster access in a single cycle.

 

19. Which of the following memory access can reduce the clock cycles?

A. bus interfacing
B. burst interfacing
C. DMA
D. dram

Answer: B

The burst interfaces reduce the clock cycles. For fetching four words with a three-clock memory, it will take 12 clock cycles but in the burst interface, it will only take five clocks to access the data.

 

20. How many clocks are required for the first access in the burst interface?

A. 1
B. 2
C. 3
D. 4

Answer: B

In the burst interface, the first access of the memory address requires two clock cycles and a single cycle for the remaining memory address.

Scroll to Top