Embedded System (E&TC) 5I
Embedded System (E&TC) 5I
Embedded System
1. Which one of the following offers CPUs as integrated memory or peripheral interfaces?
a) Microcontroller
b) Microprocessor
c) Embedded system
d) Memory system
Answer: a
2. Which of the following offers external chips for memory and peripheral interface circuits?
a) Microcontroller
b) Microprocessor
c) Peripheral system
d) Embedded system
Answer: b
Answer: d
Answer: d
5. What is CISC?
a) Computing instruction set complex
b) Complex instruction set computing
c) Complimentary instruction set computing
d) Complex instruction set complementary
Answer: b
Answer: b
7. Which of the following possesses a CISC architecture?
a) MC68020
b) ARC
c) Atmel AVR
d) Blackfin
Answer: a
Answer: b
Answer: c
1. It retains its content when power is removed. What type of memory is this?
a) Volatile memory
b) Nonvolatile memory
c) RAM
d) SRAM
Answer: b
Answer: a
Answer: a
Answer: b
Answer: a
Answer: c
Answer: c
8. Which type of memory is suitable for low volume production of embedded systems?
a) ROM
b) Volatile
c) Non-volatile
d) RAM
Answer: c
9. Which is the single device capable of providing prototyping support for a range of microcontroller?
a) ROM
b) Umbrella device
c) OTP
d) RAM
Answer: b
Answer: b
Answer: a
13. How the input terminals are associated with external environments?
a) Actuators
b) Sensors
c) Inputs
d) Outputs
Answer: b
14. Which of the following are external pins whose logic state can be controlled by the processor to either be a logic zero or
logic one is known as
a) Analogue value
b) Display values
c) Binary values
d) Time derived digital outputs
Answer: c
15. What kind of visual panel is used for seven segmented display?
a) LED
b) LCD
c) Binary output
d) Analogue output
Answer: b
Answer: a
Answer: c
Answer: c
Answer: b
Answer: a
Answer: a
Answer: c
a) CCR
b) PC
c) SP
d) IV
Answer: a
Answer: a
Answer: a
Answer: a
3. Flag register of Z80 is also known as
a) Program status register
b) Program status address
c) Program status word
d) Program address register
Answer: c
Answer: d
Answer: a
Answer: c
Answer: c
Answer: c
Answer: b
11. Which signal is used to differentiates the access from a normal memory cycle?
a) HALT
b) RESET
c) MREQ
d) IORQ
Answer: d
Answer: a
Answer: c
1. Which is the first device which started microprocessor revolution by Intel?
a) 8080
b) 8086
c) 8087
d) 8088
View Answer
Answer: a
Explanation: 8086 was released in 1978 and 8088 was released in 1979 .8087 is a numeric coprocessor which was released in
1977. Furthermore, 8080 is a device designed by Intel in 1974.
7. Which of the following is the area of memory that is used for storage?
a) Register
b) Stack
c) Accumulator
d) Memory
View Answer
Answer: b
Explanation: Stack can be used at the time of function call or it is a short time large scale storage of data. Therefore, stack is
the area within memory for storage.
1. Which one of the following is the successor of 8086 and 8088 processor?
a) 80286
b) 80387
c) 8051
d) 8087
View Answer
Answer: a
Explanation: 80286 is the successor of 8086 and 8088 because it possess a CPU based on 8086 and 8088. 8051 is a
microcontroller designed by Intel which is commonly known as Intel MCS-51. 8087 is the first floating point coprocessor of
8086.
Explanation: The processor was successful in the PC market and it was a successful processor behind the IBM.
4. Which register set of 80286 form the same register set of 8086 processor?
a) AH,AL
b) BX
c) BX,AX
d) EL
View Answer
Answer: a
Explanation: The 16 bit register of 80286 can also act as 8 bit register by splitting into a higher register and lower register.
9. Which are the two register available in the protected mode of 80286?
a) General and segmented
b) General and pointer
c) Index and base pointer
d) Index and segmented
View Answer
Answer: c
Explanation: In the protected mode of 80286, two additional register arises which is called index register and base pointer
register.
13. Which is the interrupt vector in 80286 which functions for stack fault?
a) 11
b) 12
c) 14
d) 16
View Answer
Answer: b
Explanation: 12 is the interrupt vector indicating stack fault. It will be different for a different microprocessor.
5. Which of the following processors can perform exponential, logarithmic and trigonometric functions?
a) 8086
b) 8087
c) 8080
d) 8088
View Answer
Answer: b
Explanation: 8087 is a coprocessor which can perform all the mathematical functions including addition, subtraction,
multiplication, division, exponential, logarithmic, trigonometric etc. 8086, 8080 and 8088 are microprocessors which require the
help of a coprocessor for floating point arithmetic.
6. How many stack register does an 8087 have?
a) 4
b) 8
c) 16
d) 32
View Answer
Answer: b
Explanation: The 8087 coprocessor does not have a main register set but they have an 8-level deep stack register from st0 to
st7.
13. How many bits are used for storing signed integers?
a) 2
b) 4
c) 8
d) 16
View Answer
Answer: d
Explanation: Signed integers in a coprocessor are stored as a 16-bit word, 32-bit double word or 64-bit quadword.
2. How instructions and data are accessed to pipeline stages of 80486 processor?
a) Through internal unified cache
b) Through external unified cache
c) Through external cache
d) Through multiple caches
View Answer
Answer: a
Explanation: In order to have instruction and data to the pipeline, the 80486 has an internal unified cache to contain both data
and instructions. This helps in the independency of the processor on external memory.
11. Which of the following processor can execute two instructions per cycle?
a) 80486
b) 80386DX
c) Intel Pentium
d) 80386
View Answer
Answer: c
Explanation: Intel Pentium have many advanced features one of which is, it can execute two instructions per cycle thus
improving the speed of the processor whereas 80486, 80386 and 80386DX does not have this feature.
13. In which processor does the control register and system management mode register first appeared?
a) 80386
b) 80386SL
c) 80386DX
d) 80486
View Answer
Answer: b
Explanation: The control register and system management mode register has first appeared in 80386SL and later on
succeeded by other processors. These registers can provide intelligent power control.
8. Which of the following statements are true for von Neumann architecture?
a) shared bus between the program memory and data memory
b) separate bus between the program memory and data memory
c) external bus for program memory and data memory
d) external bus for data memory only
View Answer
Answer: a
Explanation: von Neumann architecture shares bus between program memory and data memory whereas Harvard architecture
have a separate bus for program memory and data memory.
2. How many tables does an FIR function of a digital signal processor possess?
a) 1
b) 2
c) 3
d) 4
View Answer
Answer: b
Explanation: Digital signal processor function involves setting up of two tables and one is for sampled data and the other table
is for filter coefficients which determine the filter response. It takes values from the table and performs programs.
3. Why is said that branch prediction is not applicable in a digital signal processor?
a) low bandwidth
b) high bandwidth
c) low frequency
d) high frequency
View Answer
Answer: a
Explanation: Loop control timing varies depending on the branch predictions which in turn make bandwidth predictions difficult
thereby lowering the bandwidth of the digital signal processor.
4. Which architecture can one overcome the low bandwidth issue in MC6800 family?
a) RISC
b) CISC
c) von Neumann
d) program stored
View Answer
Answer: a
Explanation: RISC architecture can offer some improvement in the low bandwidth issue since it has the ability to perform
operations in a single cycle.
6. Which of the following processors also can work as a digital signal processor?
a) 8086
b) 8088
c) 8080
d) ARM9E
View Answer
Answer: d
Explanation: ARM9E can also have DSP level of performance without having a digital signal processor by its enhanced DSP
instructions.
7. What types of modules are used in the digital signal processor to form the loop structure?
a) modulo-timer
b) modulo-counter
c) timer
d) external timer
View Answer
Answer: b
Explanation: By using hardware multipliers, counters etc the entire hardware can be redesigned to perform some specific
functions which are used in digital signal processors. One such is the modulo-counter to form the loop structure.
13. How many address register does the AAU of a DSP56000 have?
a) 8
b) 16
c) 24
d) 32
View Answer
Answer: c
Explanation: AAU have 24 address registers in three banks of eight.
9. When an external interrupt is generated, what type of mode does the processor supports?
a) real mode
b) virtual mode
c) protected mode
d) supervisor mode
View Answer
Answer: d
Explanation: In SPARC when an external interrupt is called, it creates an internal trap in which the current and next instructions
get saved and mode of the processor switches to supervisor mode.
10. Where is trap vector table located in SPARC processor?
a) program counter
b) Y register
c) status register
d) trap base register
View Answer
Answer: d
Explanation: The trap vector table is located in the trap base register which supplies the address of the service routine. When it
is completed REIT instructions are executed.
13. How many floating point register does the FPU of the SPARC have?
a) 16 128-bit
b) 32 128-bit
c) 64 128-bit
d) 10 128-bit
View Answer
Answer: a
Explanation: It possesses 32 32-bit single precision, 32 64-bit double precision and 16 128-bit quads precise floating registers.
3. Which of the following processor are designed to perform calculations in graphics rendering?
a) GPU
b) digital signal processor
c) microprocessor
d) microcontroller
View Answer
Answer: a
Explanation: Graphics processing unit is designed to perform calculations in graphics rendering. Intel, NVIDIA, and AMD are
dominant providers of GPU.
4. Which of the processor is a good match for applications such as video games?
a) GPU
b) VLIW
c) Coprocessor
d) Microcontroller
View Answer
Answer: a
Explanation: GPU is a graphics processing unit. Therefore, more graphical images can be created by GPU which is necessary
for video games. Therefore, GPU is a good match for video games.
9. What is ILP?
a) instruction-level parallelism
b) instruction-level panel
c) instruction-language panel
d) inter-language parallelism
View Answer
Answer: a
Explanation: A processor which supports instruction-level parallelism can perform multiple independent operations in every
instruction cycle. Basically, there are four types of instructions. These are CISC instructions, subword parallelism, superscalar,
and VLIW.
9. Which are the two main types of processor connection to the motherboard?
a) sockets and slots
b) sockets and pins
c) slots and pins
d) pins and ports
Answer: a
Explanation: The type of processor which connects to a socket on the bottom surface of the chip that connects to the
motherboard by Zero Insertion Force Socket. Intel 486 is an example of this type of connection. The processor slot is one
which is soldered into a card, which connects to a motherboard by a slot. Example for slot connection is Pentium 3.
4. Which type of storage element of SRAM is very fast in accessing data but consumes lots of power?
a) TTL
b) CMOS
c) NAND
d) NOR
View Answer
Answer: a
Explanation: TTL or transistor-transistor logic which is a type of bipolar junction transistor access data very fastly but consumes
lots of power whereas CMOS is used in low power consumption.
9. Which of the following can access data even when the power supply is lost?
a) Non-volatile SRAM
b) DRAM
c) SRAM
d) RAM
View Answer
Answer: a
Explanation: Random Access Memory is the primary storage which can access data only when it is powered up. But non-
volatile SRAM can access data even when the power supply is lost. It is used in many applications like networking, aerospace
etc.
9. Which of the following is the main factor which determines the memory capacity?
a) number of transistors
b) number of capacitors
c) size of the transistor
d) size of the capacitor
View Answer
Answer: a
Explanation: The chip capacity is dependent on the number of transistors which can be fabricated on the silicon, and DRAM
offers more storage capacity than SRAM.
7. Which of the following memory organisation have the entire memory available to the processor at all times?
a) segmented addressing
b) paging
c) virtual address
d) linear address
View Answer
Answer: d
Explanation: There are two types of memory organisation, linear addressing in which the entire memory is available to the
processor of all times as in Motorola 6800 and the other is segmented addressing where the memory space is divided into
several segments and the processor is limited to access the program instructions and data which are located in particular
segments.
15. Which of the following is a plastic package used primarily for DRAM?
a) SIMM
b) DIMM
c) Zig-zag
d) Dual-in-line
View Answer
Answer: c
3. How many numbers of ways are possible for allocating the memory to the modular blocks?
a) 1
b) 2
c) 3
d) 4
View Answer
Answer: c
Explanation: Most of the systems have a multitasking operating system in which the software consists of modular blocks of
codes which run under the control of the operating system. There are three ways for allocating memory to these blocks. The
first way distributes the block in a predefined way. The second way for allocating memory includes relocation or position
independency in the software and the other way of allocating memory to the block is the address translation in which the logical
address is translated to the physical address.
4. Which of the following is replaced with the absolute addressing mode?
a) relative addressing mode
b) protective addressing mode
c) virtual addressing mode
d) temporary addressing mode
View Answer
Answer: a
Explanation: The memory allocation of the modular blocks can be done by the writing the software program in relocatable or
position independent manner which can execute anywhere in the memory map, but relocatable code must have the same
address between its data and code segments. This is used to avoid the use of absolute addressing modes which is replaced
by the relative addressing modes.
8. What can be done for the fine grain protection of the processor?
a) add extra description bit
b) add error signal
c) add wait stage
d) remains unchanged
View Answer
Answer: a
Explanation: The finer grain protection of memory management is achieved by the addition of extra description bit to an
address to declare its status. The memory management unit can detect an error if the task attempts to access memory that has
not been allocated to it or a certain kind of mismatch occurs.
10. Which of the following consist two lines of legs on both sides of a plastic or ceramic body?
a) SIMM
b) DIMM
c) Zig-zag
d) Dual in-line
View Answer
Answer: d
Explanation: The dual-in-line package consists of two lines of legs on both sides of the plastic or ceramic. Most commonly used
are BIOS EPROMs, DRAM and SRAM.
11. Which package has high memory speed and change in the supply?
a) DIP
b) SIMM
c) DIMM
d) zig-zag
View Answer
Answer: c
Explanation: DIMM is a special version of SIMM which is 168-bits wider bus and looks similar to a larger SIMM. The wider bus
increases the memory speed and change in supply voltage.
12. Which is a subassembly package?
a) dual-in-line
b) zig-zag
c) simm
d) ceramic shell
View Answer
Answer: c
Explanation: The SIMM is basically a subassembly, not a package. It is a small board which possesses finger connection on
the bottom and sufficient memory on the board in order to make up the required configuration.
7. Which refresh techniques depends on the size of time critical code for calculating the refresh cycle?
a) burst refresh
b) distributed refresh
c) refresh cycle
d) software refresh
View Answer
Answer: b
Explanation: Most of the system uses the distributed method and depending on the size of the time critical code, the number of
refresh cycles can be calculated.
15. Which technology is standardized in DRAM for determining the maximum time interval between the refresh cycle?
a) IEEE
b) RAPID
c) JEDEC
d) UNESCO
View Answer
Answer: c
1. In which pin does the data appear in the basic DRAM interfacing?
a) dout pin
b) din pin
c) clock
d) interrupt pin
View Answer
Answer: a
Explanation: In the basic DRAM interfacing, the higher order bits asserts the RAS signal and the lower order bits asserts the
CAS signal. When the access got expired, the data appears on the dout pin and is latched by the processor.
5. What is RDRAM?
a) refresh DRAM
b) recycle DRAM
c) Rambus DRAM
d) refreshing DRAM
View Answer
Answer: c
Explanation: Rambus DRAM is a synchronous memory developed by Rambus. It can replace SDRAM and is useful in high
bandwidth applications.
6. Which of the following can transfer up to 1.6 billion bytes per second?
a) DRAM
b) RDRAM
c) EDO RAM
d) SDRAM
View Answer
Answer: b
Explanation: The Rambus RAM can transfer up to 1.6 billion bytes per second. It possesses RAM controller, a bus which
connects the microprocessor and the device, and random access memory.
8. Which mode of operation selects an internal page of memory in the DRAM interfacing?
a) page interleaving
b) page mode
c) burst mode
d) EDO RAM
View Answer
Answer: b
Explanation: In the page mode operation, the row address is provided as normal but the RAS signal is left asserted. This, in
turn, selects an internal page within the DRAM memory where any bit of data can be accessed by placing the column address
and asserting CAS.
9. What is the maximum time that the RAS signal can be asserted in the page mode operation?
a) 5 microseconds
b) 10 microseconds
c) 15 microseconds
d) 20 microseconds
View Answer
Answer: b
Explanation: The maximum time that the RAS signal can be asserted during the page mode operation is about 10
microseconds. But this is a major disadvantage for page mode operation, that is, the standard PCs have a maximum time of 15
microseconds for the refresh cycle.
10. Which of the following mode of operation in the DRAM interfacing has a page boundary?
a) burst mode
b) EDO RAM
c) page mode
d) page interleaving
View Answer
Answer: c
Explanation: The page mode operation have memory cycles that exhibit some form of locality, that is, stay within the page
boundary which causes page missing when there is access outside the page boundary and two or more wait states.
11. Which mode offers the banking of memory in the DRAM interfacing technique?
a) page mode
b) basic DRAM interfacing
c) page interleaving
d) burst mode
View Answer
Answer: c
Explanation: The accessing of data outside the page boundary can cause missing of pages in the page mode operation. So a
program has to operate for frequently accessing data thereby, increasing the efficiency in the page selection. One such mode
is the page interleaving mode in which the memory is divided into different banks, depending on the number of memories
installed.
13. Which mode reduces the need for fast static RAMs?
a) page mode
b) page interleaving
c) burst mode
d) EDO memory
View Answer
Answer: c
Explanation: The page mode, nibble mode devices can provide data fastly when the new column address is given. In burst
mode operation, the processor can fetch more data than it needs and keeps the remaining data in an internal cache for the
future use which can reduce the need for fast static RAMs.
14. Which of the following is also known as hyper page mode enabled DRAM?
a) page mode
b) EDO DRAM
c) burst EDO DRAM
d) page interleaving
View Answer
Answer: b
Explanation: The EDO DRAM is also known as hyper page mode enable DRAM because of the faster page mode operation
along with some additional features.
3. Which of the following determines a high hit rate of the cache memory?
a) size of the cache
b) number of caches
c) size of the RAM
d) cache access
View Answer
Answer: a
Explanation: The size of the cache increases, a large amount of data can be stored, which can access more data which in turn
increases the hit rate of the cache memory.
9. Which of the following refers to the number of consecutive bytes which are associated with each cache entry?
a) cache size
b) associative set
c) cache line
d) cache word
View Answer
Answer: c
Explanation: The cache line refers to the number of consecutive bytes which are associated with each cache entry. The data is
transferred between the memory and the cache in a particular size which is called a cache line.
11. What are the basic elements required for cache operation?
a) memory array, multivibrator, counter
b) memory array, comparator, counter
c) memory array, trigger circuit, a comparator
d) memory array, comparator, CPU
View Answer
Answer: b
Explanation: The cache memory operation is based on the address tag, that is, the processor generates the address which is
provided to the cache and this cache stores its data with an address tag. The tag is compared with the address, if they did not
match, the next tag is checked. If they match, a cache hit occurs, the data is passed to the processor. So the basic elements
required is a memory array, comparator, and a counter.
12. How many divisions are possible in the cache memory based on the tag or index address?
a) 3
b) 2
c) 4
d) 5
View Answer
Answer: c
1. Which of the following cache has a separate comparator for each entry?
a) direct mapped cache
b) fully associative cache
c) 2-way associative cache
d) 16-way associative cache
View Answer
Answer: b
Explanation: A fully associative cache have a comparator for each entry so that all the entries can be tested simultaneously.
2. What is the disadvantage of a fully associative cache?
a) hardware
b) software
c) memory
d) peripherals
View Answer
Answer: a
Explanation: The major disadvantage of the fully associative cache is the amount of hardware needed for the comparison
increases in proportion to the cache size and hence, limits the fully associative cache.
13. Which of the following has a separate cache for the data and instructions?
a) unified
b) harvard
c) logical
d) physical
View Answer
Answer: b
Explanation: The Harvard cache have a separate cache for the data and the instruction whereas the unified cache has a same
cache for the data and instructions.
1. Which of the following is the biggest challenge in the cache memory design?
a) delay
b) size
c) coherency
d) memory access
View Answer
Answer: c
Explanation: The coherency is a major challenge in designing the cache memory. The cache has to be designed by solving the
problem of data coherency while remaining hardware and software compatible.
2. What arises when a copy of data is held both in the cache and in the main memory?
a) stall data
b) stale data
c) stop data
d) wait for the state
View Answer
Answer: b
Explanation: The stale data arises when the copy is held both in the cache memory and in the main memory. If either copy is
modified, the other data become stale and the system coherency can be destroyed.
3. In which writing scheme does all the data writes go through to main memory and update the system and cache?
a) write-through
b) write-back
c) write buffering
d) no caching of writing cycle
View Answer
Answer: a
Explanation: There are different writing scheme in the cache memory which increases the cache efficiency and one such is the
write-through in which all the data go to the main memory and can update the system as well as the cache.
4. In which writing scheme does the cache is updated but the main memory is not updated?
a) write-through
b) write-back
c) no caching of writing cycle
d) write buffering
View Answer
Answer: b
Explanation: The cache write-back mechanism needs a bus snooping system for the coherency. In this write-back scheme, the
cache is updated first and the main memory is not updated.
6. Which writing mechanism forms the backbone of the bus snooping mechanism?
a) write-back
b) write-through
c) no caching of write cycles
d) write buffer
View Answer
7. What is the main idea of the writing scheme in the cache memory?
a) debugging
b) accessing data
c) bus snooping
d) write-allocate
View Answer
Answer: c
Explanation: There are four main writing scheme in the cache memory which is, write-through, write-back, no caching of the
write cycle and write buffer. All these writing schemes are designed for bus snooping which can reduce the coherency.
8. In which scheme does the data write via a buffer to the main memory?
a) write buffer
b) write-back
c) write-through
d) no caching of the write cycle
View Answer
Answer: a
Explanation: The write-buffer is slightly similar to the write-through mechanism in which data is written to the main memory but
in write buffer mechanism data writes to the main memory via a buffer.
9. Which of the following can allocate entries in the cache for any data that is written out?
a) write-allocate cache
b) read-allocate cache
c) memory-allocate cache
d) write cache
View Answer
Answer: a
Explanation: A write-allocate cache allocates the entries in the cache for any data that is written out. If the data is transferred to
the external memory so that, when it is accessed again, the data is already waiting in the cache. It works efficiently if the size of
the cache is large and it does not overwrite even though it is advantageous.
1. Which of the following include special address generation and data latches?
a) burst interface
b) peripheral interface
c) dma
d) input-output interfacing
View Answer
Answer: a
Explanation: The burst interfacing has special memory interfaces which include special address generation and data latches
that help in the high performance of the processors. It takes the advantages of both the nibble mode memories and paging.
2. Which of the following makes use of the burst fill technique?
a) burst interfaces
b) dma
c) peripheral interfaces
d) input-output interfaces
View Answer
Answer: a
Explanation: The burst interfaces use the burst fill technique in which the processor will access four words in succession, which
fetches the complete cache line or written out to the memory.
4. Which of the following memory access can reduce the clock cycles?
a) bus interfacing
b) burst interfacing
c) dma
d) dram
View Answer
Answer: b
Explanation: The burst interfaces reduces the clock cycles. For fetching four words with a three clock memory, it will take 12
clock cycle but in the burst interface, it will only take five clocks to access the data.
5. How many clocks are required for the first access in the burst interface?
a) 1
b) 2
c) 3
d) 4
View Answer
Answer: b
Explanation: In the burst interface, the first access of the memory address requires two clock cycles and a single cycle for the
remaining memory address.
9. In which memory does the burst interfaces act as a part of the cache?
a) DRAM
b) ROM
c) SRAM
d) Flash memory
View Answer
Answer: c
Explanation: The burst interface is associated with the static RAM.
5. Which of the following is necessary for the address translation in the protected mode?
a) descriptor
b) paging
c) segmentation
d) memory
View Answer
Answer: a
Explanation: The address translation from the logical address to physical address partitions the main memory into different
blocks which is called segmentation. Each of these blocks have a descriptor which possesses a descriptor table. So the size of
every block is very important for the descriptor.
7. How many types of tables are used by the processor in the protected mode?
a) 1
b) 2
c) 3
d) 4
View Answer
Answer: b
Explanation: There are two types of descriptor table used by the processor in the protected mode which are GDT and LDT, that
is global descriptor table and local descriptor table respectively.
1. How many regions are created by the memory range in the ARM architecture?
a) 4
b) 8
c) 16
d) 32
View Answer
Answer: b
2. How many bits does the memory region in the ARM memory protection unit have?
a) 1
b) 2
c) 3
d) 4
View Answer
Answer: c
Explanation: The memory region possesses three bits which are the cacheable bit, bufferable bit and access permission bit.
4. What type of bit in the ARM memory mimics to that of the protection unit of ARM management unit?
a) permission bit
b) buffer bit
c) cacheable bit
d) access permission bit
View Answer
Answer: a
5. Which of the following bits are used to control the cache behaviour?
a) cacheable bit
b) buffer bit
c) cacheable bit and buffer bit
d) cacheable bit, buffer bit and permission access bit
View Answer
Answer: c
Explanation: The cacheable bit and the buffer bit are used to control the behaviour of cache. Depending on the cacheable bit
and the buffer bit, the memory access will complete successfully.
1. Which mode of the Intel timer 8253 provides a software watchdog timer?
a) rate generator
b) hardware triggered strobe
c) square wave rate generator
d) software triggered strobe
View Answer
Answer: d
Explanation: The software triggered strobe can be used as a software-based watchdog timer in which the output is connected
to a non maskable interrupt.
2. Which of the following mode is similar to the mode 4 of the 8253 timer?
a) mode 5
b) mode 6
c) mode 0
d) mode 1
View Answer
Answer: a
Explanation: The mode 5 or the hardware triggered strobe is similar to the mode 4 or the square wave rate generator expect
that the retriggering is done by the external gate pin.
3. Which pin of 8253 is used for the generation of an external interrupt signal?
a) OUT pin
b) IN pin
c) Interrupt pin
d) Ready pin
View Answer
Answer: a
Explanation: The Intel 8253 timer has no interrupt pins. Therefore, the timer OUT pin is used to generate an external interrupt
signal.
4. Which timer architecture can provide a higher resolution than Intel 8253?
a) Intel 8253
b) Intel 8254
c) 8051 timer
d) MC68230
View Answer
Answer: d
Explanation: The Intel 8253 and 8254 have same pin configuration and functions. 8051 timer is a programmable timer in the
8051 microcontroller. The MC68230 timer developed by Motorola can provide a powerful timer architecture which can provide
higher resolution than the Intel 8253.
5. How many bit architecture does MC68230 have?
a) 16
b) 24
c) 32
d) 40
View Answer
Answer: b
Explanation: The MC68230 timer have a 24-bit architecture which is split into three 8-bit components because of the 8-bit bus
in the MC68000 CPU.
6. How many bit bus does MC68230 have?
a) 2
b) 4
c) 8
d) 16
View Answer
Answer: c
Explanation: The MC68230 timer have a 24-bit architecture which is split into three 8-bit components because of the 8-bit bus
which is used for the communication with the host processor like MC68000 CPU which have an 8-bit architecture.
7. Which of the following is a timer processor?
a) Intel 8253
b) MC146818
c) MC68332
d) Intel 8259
View Answer
Answer: c
Explanation: Intel 8253 and 8259 are timers or counters which supports the processors. MC146818 is a real-time clock.
MC68332 which is developed by Motorola is a 32 bit timer processor which can support MC68020.
8. What is the running frequency of MC68332?
a) 12 MHz
b) 14 MHz
c) 16 MHz
d) 18 MHz
View Answer
Answer: c
Explanation: The running frequency of the MC68332 is 16 MHz.
9. Which of the following is a real time clock?
a) MC146818
b) 8253
c) 8259
d) 8254
View Answer
Answer: a
1. Which of the following is the pin efficient method of communicating between other devices?
a) serial port
b) parallel port
c) peripheral port
d) memory port
View Answer
Answer: a
Explanation: The serial ports are considered to be the pin efficient method of communication between other devices within an
embedded system.
2. Which of the following depends the number of bits that are transferred?
a) wait statement
b) ready statement
c) time
d) counter
View Answer
Answer: c
Explanation: The time taken for the data transmission within the system depends on the clock frequency and the number of bits
that are transferred.
3. Which of the following is the most commonly used buffer in the serial porting?
a) LIFO
b) FIFO
c) FILO
d) LILO
View Answer
Answer: b
Explanation: Most of the serial ports uses a FIFO buffer so that the data is not lost. The FIFO buffer is read to receive the data,
that is, first in first out.
4. What does SPI stand for?
a) serial parallel interface
b) serial peripheral interface
c) sequential peripheral interface
d) sequential port interface
View Answer
Answer: b
Explanation: The serial parallel interface bus is a commonly used interface which involves master slave mechanism. The shift
registers are worked as master and the slave devices are driven by a common clock.
5. Which allows the full duplex synchronous communication between the master and the slave?
a) SPI
b) serial port
c) I2C
d) parallel port
View Answer
Answer: a
Explanation: The serial peripheral interface allows the full duplex synchronous communication between the master and the
slave devices. MC68HC05 developed by Motorola uses SPI for interfacing the peripheral devices.
6. Which of the following processor uses SPI for interfacing?
a) 8086
b) 8253
c) 8254
d) MC68HC11
View Answer
Answer: d
Explanation: The MC68HC05 and MC68HC11 microcontrollers use the serial peripheral interface for the peripheral interfacing.
7. In which register does the data is written in the master device?
a) index register
b) accumulator
c) SPDR
d) status register
View Answer
Answer: c
Explanation: The serial peripheral interface follows a master slave mechanism in which the data is written to the SPDR register
in the master device and clocked out into the slave device SPDR by using a common clock signal called SCK.
8. What happens when 8 bits are transferred in the SPI?
a) wait statement
b) ready statement
c) interrupt
d) remains unchanged
View Answer
Answer: c
Explanation: The interrupts are locally generated when 8-bits are transferred so that the data can be read before the next byte
is clocked through.
9. Which signal is used to select the slave in the serial peripheral interfacing?
a) slave select
b) master select
c) interrupt
d) clock signal
View Answer
Answer: a
Explanation: The slave select signal selects which slave is to receive data from the master.
10. How much time period is necessary for the slave to receive the interrupt and transfer the data?
a) 4 clock time period
b) 8 clock time period
c) 16 clock time period
d) 24 clock time period
View Answer
Answer: b
1. Which of the following indicates the type of operation that the master requests?
a) address value
b) initial value
c) terminal count
d) first byte
View Answer
Answer: a
Explanation: The address value helps the master to select the device and indicates what operation should be taken. If the 8th
bit is logic one, read operation takes out and if it is logic zero, write operation takes out.
2. How can both single byte and the double byte address slave use the same bus?
a) extended memory
b) extended address
c) peripheral count
d) slave bus
View Answer
Answer: b
Explanation: For providing more addressing, an extended address is developed which possesses two bytes in which the first
byte uses a special code to distinguish it from a single byte address so that the single byte and double byte address slaves can
use a shared bus.
3. Which counter selects the next register in the I2C?
a) auto-incrementing counter
b) decrementing counter
c) auto-decrementing counter
d) terminal counter
View Answer
Answer: a
Explanation: The peripheral having a small number of locations can use auto-incrementing counter for accessing the next
register. But this will not be applicable in bigger memory devices.
4. Which is an efficient method for the EEPROM?
a) combined format
b) auto-incrementing counter
c) register set
d) single format
View Answer
Answer: a
Explanation: Combined format is an efficient method for the EEPROM because it is having a large number of registers.
5. Which of the following uses two data transfers?
a) auto-incrementing counter
b) auto-decrementing counter
c) combined format
d) single format
View Answer
Answer: c
Explanation: The EEPROM is having a large number of registers, so auto incrementing counter will not be applicable. So there
is an alternative method which uses index value that is written to the chip, prior to accessing the data. This is called combined
format and this combined format uses two data transfer. One is to write the data and the other is to read.
6. Which of the following is efficient for the small number of registers?
a) auto-incrementing counter
b) auto-decrementing counter
c) combined format
d) single format
View Answer
Answer: a
Explanation: The peripherals which have a small number of locations can use auto-increment counter within the peripheral in
which each access selects the next register.
7. Which can determine the timeout value?
a) polling
b) timer
c) combined format
d) watchdog timer
View Answer
Answer: a
Explanation: The polling can be used along with the counter to determine the timeout value.
8. How is bus lockup avoided?
a) timer and polling
b) combined format
c) terminal counter
d) counter
View Answer
Answer: a
Explanation: The timeout value can be changed by the peripheral devices, so for a sophisticated system a combination of
polling and timer is used to check for the signal n times within a predefined interval. This can avoid the bus lock.
9. Which of the following can determine if two masters start to use the bus at the same time?
a) counter detect
b) collision detect
c) combined format
d) auto-incremental counter
View Answer
Answer: b
Explanation: The collision detects technique helps to determine whether two or more masters are using the same bus in a
multi-master device.
10. Which ports are used in the multi-master system to avoid errors?
a) unidirectional port
b) bidirectional port
c) multi directional port
d) tridirectional port
View Answer
Answer: b
1. Which of the following is the pin efficient method of communicating between other devices?
a) serial port
b) parallel port
c) peripheral port
d) memory port
View Answer
Answer: a
Explanation: The serial ports are considered to be the pin efficient method of communication between other devices within an
embedded system.
2. Which of the following depends the number of bits that are transferred?
a) wait statement
b) ready statement
c) time
d) counter
View Answer
Answer: c
Explanation: The time taken for the data transmission within the system depends on the clock frequency and the number of bits
that are transferred.
3. Which of the following is the most commonly used buffer in the serial porting?
a) LIFO
b) FIFO
c) FILO
d) LILO
View Answer
Answer: b
Explanation: Most of the serial ports uses a FIFO buffer so that the data is not lost. The FIFO buffer is read to receive the data,
that is, first in first out.
4. What does SPI stand for?
a) serial parallel interface
b) serial peripheral interface
c) sequential peripheral interface
d) sequential port interface
View Answer
Answer: b
Explanation: The serial parallel interface bus is a commonly used interface which involves master slave mechanism. The shift
registers are worked as master and the slave devices are driven by a common clock.
5. Which allows the full duplex synchronous communication between the master and the slave?
a) SPI
b) serial port
c) I2C
d) parallel port
View Answer
Answer: a
Explanation: The serial peripheral interface allows the full duplex synchronous communication between the master and the
slave devices. MC68HC05 developed by Motorola uses SPI for interfacing the peripheral devices.
6. Which of the following processor uses SPI for interfacing?
a) 8086
b) 8253
c) 8254
d) MC68HC11
View Answer
Answer: d
Explanation: The MC68HC05 and MC68HC11 microcontrollers use the serial peripheral interface for the peripheral interfacing.
7. In which register does the data is written in the master device?
a) index register
b) accumulator
c) SPDR
d) status register
View Answer
Answer: c
Explanation: The serial peripheral interface follows a master slave mechanism in which the data is written to the SPDR register
in the master device and clocked out into the slave device SPDR by using a common clock signal called SCK.
8. What happens when 8 bits are transferred in the SPI?
a) wait statement
b) ready statement
c) interrupt
d) remains unchanged
View Answer
Answer: c
Explanation: The interrupts are locally generated when 8-bits are transferred so that the data can be read before the next byte
is clocked through.
9. Which signal is used to select the slave in the serial peripheral interfacing?
a) slave select
b) master select
c) interrupt
d) clock signal
View Answer
Answer: a
Explanation: The slave select signal selects which slave is to receive data from the master.
10. How much time period is necessary for the slave to receive the interrupt and transfer the data?
a) 4 clock time period
b) 8 clock time period
c) 16 clock time period
d) 24 clock time period
View Answer
Answer: b
1. Which of the following can be used for long distance communication?
a) I2C
b) Parallel port
c) SPI
d) RS232
View Answer
Answer: d
Explanation: A slightly different serial port called RS232 is used for long distance communication, otherwise the clock may get
skewed. The low voltage signal also affects the long distance communication.
2. Which of the following can affect the long distance communication?
a) clock
b) resistor
c) inductor
d) capacitor
View Answer
Answer: a
Explanation: For small distance communication, the clock signal which allows a synchronous transmission of data is more than
enough, and the low voltage signal of TTL or CMOS is sufficient for the operation. But for long distance communication, the
clock signal may get skewed and the low voltage can be affected by the cable capacitance. So for long distance
communication RS232 can be used.
3. Which are the serial ports of the IBM PC?
a) COM1
b) COM4 and COM1
c) COM1 and COM2
d) COM3
View Answer
Answer: c
Explanation: The IBM PC has one or two serial ports called the COM1 and the COM2, which are used for the data
transmission between the PC and many other peripheral units like a printer, modem etc.
4. Which of the following can provide hardware handshaking?
a) RS232
b) Parallel port
c) Counter
d) Timer
View Answer
Answer: a
Explanation: In RS232, several lines are used for transmitting and receiving data and these also provide control for the
hardware handshaking.
5. Which of the following have an asynchronous data transmission?
a) SPI
b) RS232
c) Parallel port
d) I2C
View Answer
Answer: b
Explanation: The data is transmitted asynchronously in RS232 which enhance long distance communication, whereas SPI, I2C
offers short distance communication, and therefore, they are using synchronous data transmission.
6. How many areas does the serial interface have?
a) 1
b) 3
c) 2
d) 4
View Answer
Answer: c
Explanation: The serial interface is divided into two, physical interface and the electrical interface.
7. The RS232 is also known as
a) UART
b) SPI
c) Physical interface
d) Electrical interface
View Answer
Answer: d
Explanation: The RS232 is also known as the physical interface and it is also known as EIA232.
9. Which of the following signals are active low in the 8250 UART?
a) BAUDOUT
b) DDIS
c) INTR
d) MR
View Answer
Answer: a
10. Which of the signal can control bus arbitration logic in 8250?
a) MR
b) DDIS
c) INTR
d) RCLK
Answer: b
1. Which of the following is used to reset the device in 8250?
a) MR
b) DDIS
c) INTR
d) RCLK
View Answer
Answer: a
Explanation: MR is the master reset pin which helps to reset the device and restore the internal registers.
2. Which provides an input clock for the receiver part of the UART 8250?
a) RD
b) RCLK
c) MR
d) DDIS
View Answer
Answer: b
Explanation: RCLK provides an input clock for the receiver part of the UART. RD is the read signal. MR is the master reset pin
and DDIS is used to control bus arbitration logic.
3. Which of the following is a general purpose I/O pin?
a) OUT1
b) RD
c) ADS
d) MR
View Answer
Answer: a
Explanation: There are two general purposes I/O pin OUT1 and OUT2. OUT1 is set by the programming bit 2 of the MCR to a
„1‟ whereas OUT2 is set by the programming bit 3 of the MCR to „1‟. These are active low pins in 8250.
4. Which of the following indicate the type of access that the CPU needs to perform?
a) MR
b) RD
c) ADS
d) RCLK
View Answer
Answer: b
Explanation: RD and WR signals are indicating the type of access that the CPU needs to perform, that is, whether it is a read
cycle or write cycle.
5. Which pins are used for additional DMA control?
a) RXRDY
b) RD
c) MR
d) INR
View Answer
Answer: a
Explanation: The RXRDY and TXRDY are two active low pins which are used for additional DMA control. It can be used for
DMA transfers to and from the read and write buffers.
6. Which of the following are not used within the IBM PC?
a) TXRDY
b) BAUDOUT
c) ADS
d) OUT2
View Answer
Answer: a
Explanation: The CPU is responsible for moving data to and from the UART in the IBM PC, therefore it does not have TXRDY
and RXRDY pins which are used for DMA accessing.
7. Which pins are used to connect an external crystal?
a) INR
b) ADS
c) XIN
d) SIN
View Answer
Answer: c
Explanation: The XIN and XOUT pins are used to connect an external crystal. These pins can also connect an external clock.
8. Which UART is used in MC680 by 0 design?
a) Intel 8250
b) 16450
c) 16550
d) MC68681
View Answer
Answer: d
Explanation: The MC68681 is a standard UART developed by Motorola. It has been used in many MC680 by 0 designs.
9. Which of the following have large FIFO buffer?
a) 8253
b) 8250
c) 16550
d) 16450
View Answer
Answer: c
Explanation: The largest buffer of 16 bytes is available on 16550 UART which is used for high speed data communications.
10. Which of the following has a quadruple buffered receiver and a double buffered transmitter?
a) Intel 8250
b) 16450
c) 16550
d) MC68681
View Answer
Answer: d
1. Which of the following can be done to ensure that all interrupts are recognised?
a) reset pin
b) external ready pin
c) handshaking
d) acknowledgment
View Answer
Answer: c
Explanation: The exception handler performs some kind of handshaking to ensure that all the interrupts are recognised.
2. How many types of exceptions are associated with the asynchronous imprecise?
a) 1
b) 2
c) 3
d) 4
View Answer
Answer: b
Explanation: Two types of exceptions are associated with the asynchronous imprecise. These are system reset and machine
checks.
3. How is the internal registers and memories are reset?
a) system reset
b) memory reset
c) peripheral reset
d) software reset
View Answer
Answer: a
Explanation: By doing the system reset, all the current processing are stopped and the internal registers and the memories are
reset.
4. How is the machine check exception is taken in an asynchronous imprecise?
a) ME bit
b) EE bit
c) FE0
d) FE1
View Answer
Answer: a
Explanation: The machine check exception is taken only if the ME bit of the MSR is set. If it is cleared, the processor will enter
into a check stop state.
5. Which of the following are the exceptions associated with the asynchronous imprecise?
a) decrementer interrupt
b) machine check
c) instruction dependent
d) external interrupt
View Answer
Answer: b
Explanation: The machine check and the system reset are two types of exceptions which are associated with the
asynchronous imprecise.
6. Which of the following possesses an additional priority?
a) asynchronous precise
b) asynchronous imprecise
c) synchronous precise
d) synchronous imprecise
View Answer
Answer: c
Explanation: The synchronous precise exceptions provide additional priority because it is possible for an instruction to generate
more than one exception.
7. Which of the following has more priority?
a) system reset
b) machine check
c) external interrupt
d) decrementer interrupt
View Answer
Answer: a
Explanation: The system reset has the first priority then comes the machine reset, next priority moves for the instruction
dependent, and the next priority is an external interrupt, and last priority level goes for the decrementer interrupt.
8. Which bit controls the external interrupts and the decrementer exceptions?
a) FE1
b) FE0
c) EE
d) ME
View Answer
Answer: c
Explanation: The EE bit in the MSR controls the external interrupts and the decrementer exceptions.
9. Which bit controls the machine check exceptions?
a) ME
b) FE0
c) FE1
d) EE
View Answer
Answer: a
Explanation: The ME bit in the MSR controls the machine check interrupts.
10. Which bits control the floating point exceptions?
a) EE
b) FE0
c) FE1
d) both FE1 and FE2
View Answer
Answer: d
Explanation: The FE0 and FE1 control the floating point exceptions.
11. Which of the following is a 16 kbyte block?
a) register
b) vector table
c) buffer
d) lookaside buffer
View Answer
Answer: b
1. Which processors use fast interrupts?
a) DSP processor
b) RISC processor
c) CISC processor
d) Harvard processor
View Answer
Answer: a
Explanation: The fast interrupts are used in the DSP processors or in microcontrollers in which a small routine is executed
without saving the context of the processor.
2. Which interrupts generate fast interrupt exception?
a) internal interrupt
b) external interrupt
c) software interrupt
d) hardware interrupt
View Answer
Answer: b
Explanation: The external interrupts generates the fast interrupt routine exception in which the external interrupt is
synchronised with the processor clock.
3. What is the disadvantage of the fast interrupts?
a) stack frame
b) delay
c) size of routine
d) low speed
View Answer
Answer: c
Explanation: The disadvantages associated with the fast interrupt is the size of routine which can be executed and the
resources allocated. In this technique, it allocates a couple of address registers for the fast interrupt routine.
4. Which of the following does not have a stack frame building?
a) hardware interrupt
b) software interrupt
c) non-maskable interrupt
d) fast interrupt
View Answer
Answer: d
Explanation: The fast interrupt does not have stack frame building and it does not possess any such delays. This can be
considered as the advantage of the fast interrupts.
5. What is programmed to generate a two instruction fast interrupt?
a) software
b) application
c) timer
d) sensor
View Answer
Answer: c
Explanation: The SCI timer generates the two instruction fast interrupt. This increment the register R1.
6. Which of the following can auto increment the register R1?
a) SCI timer
b) interrupt
c) software interrupt
d) non-maskable interrupt
View Answer
Answer: a
Explanation: The SCI timer is used to generate the two instruction fast interrupt that can increment the register R1 which acts
as a simple counter.
7. Which of the following forces a standard service routine?
a) READY interrupt
b) IRQA interrupt
c) NMI
d) software interrupt
View Answer
Answer: b
Explanation: The SCI timer is used to generate the two instruction fast interrupt which increments the register R1 that acts as a
simple counter which times the period between the events. The events itself generates an IRQA interrupt, that forces the
service routine.
8. Which of the following can be used as a reset button?
a) NMI
b) internal interrupt
c) external interrupt
d) software interrupt
View Answer
Answer: a
Explanation: The non-maskable interrupt is used to generate an interrupt to try and recover control and therefore, the NMI can
be used as a reset button.
9. Which of the following is connected to a fault detection circuit?
a) internal interrupt
b) external interrupt
c) NMI
d) software interrupt
View Answer
Answer: c
1. Which of the following provides a buffer between the user and the low-level interfaces to the hardware?
a) operating system
b) kernel
c) software
d) hardware
View Answer
Answer: a
Explanation: The operating system is software which provides a buffer between the low-level interfaces to the hardware within
the system and the user.
2. Which of the following enables the user to utilise the system efficiently?
a) kernel
b) operating system
c) software
d) hardware
View Answer
Answer: b
Explanation: The operating system is software that enables the users to utilise the system effectively.
3. Which of the following can make the application program hardware independent?
a) software
b) application manager
c) operating system
d) kernel
View Answer
Answer: c
Explanation: The operating system allows the software to be moved from one system to another and therefore, it can make the
application program hardware independent.
4. Which of the following speed up the testing process?
a) kernel
b) software
c) application manager
d) program debugging tools
View Answer
Answer: d
Explanation: The program debugging tools can speed up the testing process which can make the processor faster.
5. Which of the following includes its own I/O routine?
a) hardware
b) kernel
c) operating system
d) application manager
View Answer
Answer: c
Explanation: An operating system is a software which includes its own I/o routine in order to drive the serial ports and the
parallel ports.
6. Which forms the heart of the operating system?
a) kernel
b) applications
c) hardware
d) operating system
View Answer
Answer: a
Explanation: The kernel is the heart of the operating system. This can control the hardware and can deal with the interrupts, I/O
systems, memory etc.
7. Which of the following locates a parameter block by using an address pointer?
a) OS
b) kernel
c) system
d) memory
View Answer
Answer: b
Explanation: The kernel is the heart of the operating system which can control the hardware and can deal with the interrupts,
I/O systems, memory etc. It can also locate the parameter block by using an address pointer which is stored in the
predetermined address register.
8. Which of the following are not dependent on the actual hardware performing the physical task?
a) applications
b) hardware
c) registers
d) parameter block
View Answer
Answer: d
Explanation: The kernel can locate the parameter block by using an address pointer which is stored in the predetermined
address register. These parameter blocks are standard throughout the operating system, that is, they are not dependent on the
actual hardware performing the physical task.
9. Which of the following bus can easily upgrade the system hardware?
a) control bus
b) data bus
c) VMEbus
d) bus interface unit
View Answer
Answer: c
Explanation: The software can be easily moved from one system to another which is more important for designing embedded
systems, especially for those which use an industry standard bus such as VMEbus, in which the system hardware can be
expanded or upgraded.
10. Which of the following is the first widely used operating system?
a) MS-DOS
b) windows XP
c) android
d) CP/M
View Answer
Answer:d
Explanation: The first widely used operating system is the CP/M which is developed for Intel 8080 and the 8”floppy disk
system.
11. Which of the following is an example of a single task operating system?
a) android
b) windows
c) IOS
d) CP/M
View Answer
Answer: d
Explanation: The CP/M is a single task operating system, that is, only one task or an application can be executed at a time.
12. Which of the following becomes a limiting factor while an application program has to be complete?
a) memory
b) peripheral
c) input
d) output
View Answer
Answer: a
Explanation: The application program has to complete and the memory becomes a limiting factor, which can be solved by
using program overlays.
13. Which of the following cannot carry implicit information?
a) semaphore
b) message passing
c) threads
d) process
View Answer
Answer: a
1. Which task swapping method does not require the time critical operations?
a) time slice
b) pre-emption
c) cooperative multitasking
d) schedule algorithm
View Answer
Answer: a
Explanation: Time-critical operations are not essential in the time slice mechanism. Time slice mechanism describes the task
switching in a particular time slot.
2. Which task swap method works in a regular periodic point?
a) pre-emption
b) time slice
c) schedule algorithm
d) cooperative multitasking
View Answer
Answer: b
Explanation: The time slicing works by switching task in regular periodic points in time, that is, any task that needs to run next
will have to wait until the current time slice is completed.
3. Which of the following determines the next task in the time slice method of task swapping?
a) scheduling program
b) scheduling application
c) scheduling algorithm
d) scheduling task
View Answer
Answer: c
Explanation: The time slice mechanism can also be used as a scheduling method in which the task to run next is determined
by the scheduling algorithm.
4. Which of the following can be used to distribute the time slice across all the task?
a) timer
b) counter
c) round-robin
d) task slicing
View Answer
Answer: c
Explanation: The time slice based system uses fairness scheduler or round robin to distribute the time slices across all the
tasks that need to run in a particular time slot.
5. What do a time slice period plus a context switch time of the processor determines?
a) scheduling task
b) scheduling algorithm
c) context task
d) context switch time
View Answer
Answer: d
Explanation: The context switch time of the processor along with the time slice period determines the context switch time of the
system which is an important factor in system response, that is, the time period can be reduced to improve the context
switching of the system which will increase the number of task switches.
6. Which can increase the number of task switches?
a) time period
b) frequency
c) time rate
d) number of cycles
View Answer
Answer: a
Explanation: The time period can be reduced to improve the context switching of the system which will increase the number of
task switches.
7. Which mechanism is used behind the Windows 3.1?
a) time slice
b) pre-emption
c) cooperative multitasking
d) scheduling algorithm
View Answer
Answer: c
Explanation: The cooperative multitasking mechanism is used the Windows 3.1 but it is not applicable to the real-time
operating systems.
8. Which of the following provides an illusion of multitasking?
a) single task operating system
b) multitasking operating system
c) cooperative multitasking
d) pre-emption
View Answer
Answer: c
Explanation: The cooperative multitasking co-operates between them which provides the illusion of multitasking. This is done
by periodically executing the tasks.
9. Which task method follows a currently running task to be stopped by a higher priority task?
a) scheduling algorithm
b) time slice
c) cooperative multitasking
d) pre-emption
View Answer
Answer: d
Explanation: The pre-emption is an alternative method of the time slice where the currently running task can be stopped or
preempted or switched out by a higher priority active task.
10. Which of the following requires programming within the application?
a) time slice
b) scheduling algorithm
c) pre-emption
d) cooperative multitasking
View Answer
Answer: d
Explanation: The cooperative multitasking requires programming within the application and the system can be destroyed by a
single program which hogs all the processing power. Therefore, it is not applicable in the real-time operating system.
11. What does RMS stand for?
a) rate monotonic scheduling
b) rate machine scheduling
c) rate monotonic software
d) rate machine software
View Answer
Answer: a
Explanation: The rate monotonic scheduling is a method that is used to assign priority for a pre-emptive system such that the
correct execution can be guaranteed.
12. Which of the following task swapping method is a better choice in the embedded systems design?
a) RMS
b) pre-emptive
c) cooperative multitasking
d) time slice
View Answer
Answer: b
1. Which of the following allows a lower priority task to run despite the higher priority task is active and waiting to preempt?
a) message queue
b) message passing
c) semaphore
d) priority inversion
View Answer
Answer: d
Explanation: The priority inversion mechanism where the lower priority task can continue to run despite there being a higher
priority task active and waiting to preempt.
2. What happens to the interrupts in an interrupt service routine?
a) disable interrupt
b) enable interrupts
c) remains unchanged
d) ready state
View Answer
Answer: a
Explanation: In the interrupt service routine, all the other interrupts are disabled till the routine completes which can cause a
problem if another interrupt is received and held pending. This can result in priority inversion.
3. Which of the following is a part of RTOS kernel?
a) memory
b) input
c) ISR
d) register
View Answer
Answer: c
Explanation: The ISR can send the message for the tasks and it is a part of RTOS kernel.
4. Which of the following is an industrial interconnection bus?
a) bus interface unit
b) data bus
c) address bus
d) VMEbus
View Answer
Answer: d
Explanation: The VMEbus is an interconnection bus which is used in the industrial control and many other real-time
applications.
5. Which of the following supports seven interrupt priority level?
a) kernel
b) operating system
c) VMEbus
d) data bus
View Answer
Answer: c
Explanation: The VMEbus supports seven interrupt priority level which allows the prioritisation of the resources.
6. What type of interrupt handling is seen in multiprocessor applications?
a) centralised interrupt
b) handled by one MASTER
c) distributed handling
d) shared handling
View Answer
Answer: c
Explanation: The multiprocessor applications allows distributed handling in which the direct communication with the individual
masters is possible.
7. Which of the following is an asynchronous bus?
a) VMEbus
b) timer
c) data bus
d) address bus
View Answer
Answer: a
Explanation: The VMEbus is based on Eurocard sizes and is asynchronous which is similar to the MC68000.
8. Which of the following is not a priority based?
a) priority inversion
b) message passing
c) fairness system
d) message queuing
View Answer
Answer: c
1. Which of the following can be used to refer to entities within the RTOS?
a) threads
b) kernels
c) system
d) applications
View Answer
Answer: a
Explanation: The threads and processes can be used to refer to entities within the RTOS. They provide an interchangeable
replacement for the task. They have a slight difference in their function. A process is a program in execution and it has its own
address space whereas threads have a shared address space. The task can be defined as a set of instructions which can be
loaded into the memory.
2. Which of the following defines the set of instructions loaded into the memory?
a) process
b) task
c) thread
d) system hardware
View Answer
Answer: b
Explanation: The task can be defined by the set of instructions which is loaded into the memory and it can split into two or more
tasks.
3. Which of the following uses its own address space?
a) thread
b) process
c) task
d) kernel
View Answer
Answer: a
Explanation: Threads uses shared memory space and it uses the memory space of the process.
4. Which of the following does not uses a shared memory?
a) process
b) thread
c) task
d) kernel
View Answer
Answer: a
Explanation: The program in execution is known as the process. The process does not share the memory space but the
threads have a shared memory address. When the CPU switches from process to another, the current information is stored in
the process descriptor.
5. Which of the following can own and control the resources?
a) thread
b) task
c) system
d) peripheral
View Answer
Answer: b
Explanation: The task and process have several characteristics and one such is that the task or process can own or control
resources and it has threads of execution which are the paths through the code.
6. Which can be supported if the task or process maintains a separate data area for each thread?
a) single thread system
b) mono thread system
c) multiple threads
d) dual threads
View Answer
Answer: c
Explanation: The multiple threads can be supported only if the process or task can maintain separate data areas for each
thread.
7. Which of the following possesses threads of execution?
a) process
b) thread
c) kernel
d) operating system
View Answer
Answer: a
Explanation: The process has threads of execution which are the paths through the code.
8. Which of the following is inherited from the parent task?
a) task
b) process
c) thread
d) kernel
View Answer
Answer: c
Explanation: The threads are a part of the process, that is, it uses a shared memory of the process and therefore said that its
resources are inherited from the parent process or task.
9. Which term is used to encompass more than a simple context switch?
a) process
b) single thread system
c) thread
d) multithread
View Answer
Answer: a
Explanation: The process includes the additional information which is used to encompass more than a simple context switch.
This is similar to the task switching, that is why it is said that process and task are interchangeable.
10. Which can be considered as the lower level in the multitasking operating system?
a) process
b) task
c) threads
d) multi threads
View Answer
Answer: c
1. Which can provide efficient downloading and debugging communication between the host and target system?
a) pSOS+
b) pSOS+ kernel
c) pHILE+ file system
d) pNA+ network manager
View Answer
Answer: d
Explanation: The pNA+ network manager can provide efficient downloading and debugging communication between the host
and target system.
2. Which of the following is a system level debugger which provides the low-level debugging facilities and the system
debugging?
a) pROBE+ system level debugger
b) pNA+ network manager
c) pHILE+ file system
d) pNA+ network manager
View Answer
Answer: a
Explanation: The pROBE+ system level debugger which can provide the system debugging and the low level debugging.
3. How is the pROBE+ system level debugger communicate with the outside world?
a) peripheral output
b) serial port
c) LCD display
d) LED
View Answer
Answer: b
Explanation: The pROBE+ system level debugger can communicate with the outside world through the serial port or by
installing pNA+, a TCP/IP link can be used instead.
4. Which of the following is a complementary product to pROBE+ system level debugger?
a) pSOS+ kernel
b) pSOS+
c) XRAY+ source level debugger
d) pSOS+m
View Answer
Answer: c
Explanation: The XRAY+ source level debugger is a complementary product to pROBE+ system level debugger as it can use
the debugger information and combine with the C source and other functions on the host that can provide an integrated
debugging.
5. Which of the following supports the MS-DOS file?
a) pNA+ network manager
b) pSOS+ kernel
c) pSOS+ m
d) pHILE+ file system
View Answer
Answer: d
Explanation: The pHILE+ file system supports the MS-DOS file structure and the product can provide input and output file.
6. Who developed the OS-9?
a) Microwave
b) Microwave and Motorola
c) Motorola and IBM
d) Microwave and IBM
View Answer
Answer: b
Explanation: The OS-9 is developed by Motorola and Microwave as a real-time operating system. The operating system is
developed for MC6809 which is an 8-bit processor.
7. Who had developed VRTX-32?
a) Microtec Research
b) Microwave
c) Motorola
d) IBM
View Answer
Answer: a
Explanation: The VRTX-32 is developed by Microtec Research which is a high-performance real-time kernel.
8. Which provides the library interface to allow C programs to call standard I/O functions?
a) RTL
b) TNX
c) IFX
d) MPV
View Answer
Answer: a
1. Which of the following uses a swap file to provide the virtual memory?
a) windows NT
b) kernel
c) memory
d) memory management unit
View Answer
Answer: a
Explanation: The Windows NT use a swap file for providing a virtual memory environment. This file is dynamic and varies with
the amount of memory that all the software including the device driver, operating systems and so on.
2. What is the size of the swap file in Windows 3.1?
a) 25 Mbytes
b) 30 Mbytes
c) 50 Mbytes
d) 100 Mbytes
View Answer
Answer: b
Explanation: The Windows 3.1 have a swap file of size 25 Mbytes.
3. What is the nature of the swap file in the Windows NT?
a) static
b) dynamic
c) linear
d) non-linear
View Answer
Answer: b
Explanation: The swap file used in the Windows NT is dynamic and it varies with the amount of memory that all the software
including the device driver, operating systems and so on.
4. What limits the amount of virtual memory in Windows 3.1?
a) size of the swap file
b) nature of swap file
c) static file
d) dynamic file
View Answer
Answer: a
Explanation: The swap file of Windows 3.1 have a size of 25 Mbytes and thus limits the amount of virtual memory that it can
support.
5. Which of the following control and supervises the memory requirements of an operating system?
a) processor
b) physical memory manager
c) virtual memory manager
d) ram
View Answer
Answer: c
Explanation: The virtual memory manager can control and supervises the memory requirements of the operating system.
6. What is the size of the linear address in the virtual memory manager?
a) 2 Gbytes
b) 12 Gbytes
c) 4 Gbytes
d) 16 Gbytes
View Answer
Answer: c
Explanation: The virtual memory manager can allocate a linear address space of size 4 Gbytes to each process which is
unique and cannot be accessed by the other processes.
7. How many modes are used to isolate the kernel and the other components of the operating system?
a) 2
b) 3
c) 4
d) 5
View Answer
Answer: a
Explanation: There are two modes that are used for isolating the kernel and the other components of the operating system
from any process and user applications that are running. These are kernel mode and the user mode.
8. Which are the two modes used in the isolation of the kernel and the user?
a) real mode and virtual mode
b) real mode and user mode
c) user mode and kernel mode
d) kernel mode and real mode
View Answer
Answer: c
Explanation: The two modes are kernel mode and the user mode which are used for isolating the kernel and the other
components of the operating system from any process and user applications that are running.
9. Which of the following must be used to isolate the access in the user mode?
a) device driver
b) software driver
c) on-chip memory
d) peripherals
View Answer
Answer: a
Explanation: The device driver is used to control and isolate the access when it is in user mode. This is used to ensure that no
conflict is caused.
10. Which mode uses 16 higher real-time class priority levels?
a) real mode
b) user mode
c) kernel mode
d) protected mode
View Answer
Answer: c
1. Which allows the parallel development of the hardware and software in the simulation?
a) high-level language simulation
b) low-level language simulation
c) cpu simulator
d) onboard simulator
View Answer
Answer: a
Explanation: The high-level language simulation allows parallel development of the software and the hardware and when two
parts are integrated, that will work. It can simulate I/O using the keyboard as the inputs or task which passes input data for
other modules.
2. Which of the following are used to test the software?
a) data entity
b) data entry
c) data table
d) data book
View Answer
Answer: c
Explanation: In the high-level language simulation, many techniques are used to simulate the system and one such is the data
table which contains the data sequences which are used to test the software.
3. Which allows the UNIX software to be ported using a simple recompilation?
a) pSOS+
b) UNIX compatible library
c) pSOS+m
d) pOS+kernel
View Answer
Answer: b
Explanation: The most of the operating system support or provide the UNIX-compatible library which supports the UNIX
software to be ported using a simple recompilation.
4. Which of the following can simulate the processor, memory, and peripherals?
a) input simulator
b) peripheral simulator
c) memory simulator
d) cpu simulator
View Answer
Answer: d
Explanation: The CPU simulator can simulate the memory, processor, and the peripherals and allow the low-level assembler
code and the small HLL programs to be tested without the actual hardware.
5. How many categories are there for the low-level simulation?
a) 2
b) 3
c) 4
d) 5
View Answer
Answer: a
Explanation: There are two categories for the low-level simulation. The first category simulates the memory system,
programming model and can offer simple debugging tools whereas the second category simulation provides timing information
based on the number of clocks.
6. Which of the following can simulate the LCD controllers and parallel ports?
a) memory simulator
b) sds
c) input simulator
d) output tools
View Answer
Answer: b
Explanation: There are certain tools which provide powerful tools for simulation and one such is the SDS which can simulate
the processor, memory systems, integrated processor, onboard peripherals such as LCD controllers and parallel ports.
7. Which of the following provides a low-level method of debugging software?
a) high-level simulator
b) low-level simulator
c) onboard debugger
d) cpu simulator
View Answer
Answer: c
Explanation: The onboard debugger provides a very low-level method of simulating or debugging the software. It usually
handles EPROMs which are plugged into the board or a set of application codes by providing a serial connection to
communicate with the PC or workstation.
8. Which of the following has the ability to download code using a serial port?
a) cpu simulator
b) high-level language simulator
c) onboard debugger
d) low-level language simulator
View Answer
Answer: c
Explanation: The onboard debugger has the ability to download code from a floppy disk or by using a serial port.
9. What does the processor fetch from the EPROM if the board is powered?
a) reset vector
b) ready vector
c) start vector
d) acknowledge vector
View Answer
Answer: a
Explanation: The processor fetches its reset vector from the table which is stored in the EPROM when the board is powered
and then starts the initialize the board.
10. Which of the following device can transfer the vector table from the EPROM?
a) ROM
b) RAM
c) CPU
d) peripheral
View Answer
Answer: b
Explanation: When the board gets powered up, the reset vector from the table stored in the EPROM makes the initialisation of
the board and is transferred to the RAM from the EPROM through the hardware where the EPROM memory address is
temporarily altered.
11. Which of the following is used to determine the number of memory access in an onboard debugger?
a) timer
b) counter
c) input
d) memory
View Answer
Answer: b
Explanation: The counter is used to determine a preset number of memory accesses, which is assumed that the table has
been transferred by the debugger and the EPROM address can be safely be changed.
12. Which of the following has the ability to use the high-level language functions, instructions instead of the normal address?
a) task level debugging
b) low level debugging
c) onboard debugging
d) symbolic debugging
View Answer
Answer: d
Explanation: The symbolic debugging has the ability to use high-level language functions, instructions and the variables
instead of the normal addresses and their contents.
13. Which of the following debugger works at the operating system level?
a) task level debugging
b) low level debugging
c) onboard debugging
d) symbolic debugging
View Answer
Answer: a
1. Which of the following has a single set of compiler and the debugger tools?
a) Xray
b) onboard debugger
c) emulation
d) high-level simulator
View Answer
Answer: a
Explanation: The Xray debugging technique is a product from the Microtec which is having a complete set of compiler and
debugger tools which will work with the simulator, debugger, emulator and the onboard debugger.
2. Who developed the Xray product?
a) IBM
b) Intel
c) Microtec
d) Motorola
View Answer
Answer: c
Explanation: The Xray which is a product from the Microtec is having a complete set of compiler and debugger tools.
3. Which part of the Xray can interface with a simulator?
a) emulator
b) debugger
c) simulator
d) onboard debugger
View Answer
Answer: b
Explanation: The Xray consists of the consistent debugger which can interface the emulator, simulator, task level debugger or
onboard debugger.
4. Which can provide the consistent interface to the Xray?
a) emulator
b) simulator
c) memory simulator
d) debugger system
View Answer
Answer: d
Explanation: The Xray consists of the debugger which interfaces with the emulator, simulator, onboard debugger that provides
the consistent interface to the Xray product. This can improve the overall productivity of the product since it does not require
any relearning.
5. Which of the following can access the information directly in the Xray?
a) emulator
b) debugger
c) simulator
d) hardware
View Answer
Answer: c
Explanation: The Xray obtain its debugging information from a variety of sources and how it access these sources. The
simulator can access direct information but the emulator can access the information via a serial line or via the ethernet or
directly across a shared memory interface.
6. Which of the following access the information through the ethernet in a Xray?
a) simulator
b) debugger
c) onboard debugger
d) emulator
View Answer
Answer: d
Explanation: The Xray obtain its debugging information from a variety of sources. The emulator can access the information via
a serial line or via the ethernet or directly across a shared memory interface and the simulator can access the direct
information.
7. Which tools help the Xray allows the software to be developed on the host system?
a) compiler tool
b) simulator tool
c) debugger tool
d) emulator tool
View Answer
Answer: a
Explanation: The compiler tools allow the software to be developed on the host system and this system does not have to use
the same processor as the target.
8. Which of the following is ideal for debugging codes at an early stage?
a) compiler
b) debugger
c) simulator
d) emulator
View Answer
Answer: c
Explanation: There are a variety of ways for executing the codes. The simulator provides an ideal way for debugging the codes
at an early stage, that is before the hardware is available and it can allow the software to proceed in parallel with the hardware.
9. How can we extend the power of Xray?
a) Xray interface
b) Xray memory
c) Xray input
d) Xray peripheral
View Answer
Answer: a
Explanation: The power of the Xray product can be extended by the Xray interface method from the operating system
debugger.
10. Which of the following uses the Xray interface method to provide the debugging interface?
a) pSOS+m
b) pSOS
c) pSOS+
d) NAP
View Answer
Answer: c
Explanation: The pSOS+ uses the Xray interface method to provide the debugging interfaces which can extend the power of
the Xray.
11. How is the processor enter into a BDM state?
a) BDM signal
b) Start signal
c) BDM acknowledge signal
d) Start signal of the processor
View Answer
Answer: a
1. Which of the following allows the multiple tasks to process data simultaneously?
a) single buffer
b) double buffer
c) buffer exchange
d) directional buffer
View Answer
Answer: c
Explanation: The buffer exchange allows the multiple tasks to process simultaneously without having to have control structures
to supervise access and it is also used to simplify the control code.
2. Which buffering mechanism is common to the SPOX operating system?
a) buffer exchange
b) single buffer
c) linear buffer
d) directional buffer
View Answer
Answer: a
Explanation: The buffer exchange can support the SPOX operating system which is used for the digital signal processors and it
is easy to implement.
3. Which buffers exchange the empty buffers for full ones?
a) single buffer
b) buffer exchange
c) directional buffer
d) double buffer
View Answer
Answer: b
Explanation: The buffer exchange can be used for exchanging the empty buffers with the full ones. It will have more than two
buffers.
4. Which process takes place when the buffer is empty?
a) read
b) write
c) read and write
d) memory access
View Answer
Answer: a
Explanation: The buffer exchange will contain the data in case of the writing process but the buffer will be emptied in the case
of the read cycle.
5. Which process takes place when the buffer contains data?
a) read
b) read and write
c) acknowledge
d) write
View Answer
Answer: d
Explanation: The buffer will be emptied in the case of the readin process and it will contain the data in case of the writing
process.
6. Which of the following does not need to have a semaphore?
a) double buffer
b) single buffer
c) buffer exchange
d) directional buffer
View Answer
Answer: c
Explanation: There are many advantages over the buffer exchange. One such is that it will not have a semaphore to control
any shared memory or buffers.
7. Which buffer can assimilate a large amount of data before processing?
a) single buffer
b) double buffer
c) multiple buffers
d) directional buffer
View Answer
Answer: c
Explanation: The requesting task can use multiple buffers which can assimilate large amounts of data before processing. This
can be considered one of the advantages of the buffer exchange.
8. Which can reduce the latency?
a) partial filling
b) complete filling
c) no filling
d) multiple buffers
View Answer
Answer: a
Explanation: The latency is introduced because of the size of the buffer. The partial filling of data can be used to reduce the
latency but it requires some additional control signal.
9. Which of the following can indicate when the buffer is full or ready for collection?
a) intra-task communication
b) inter-task communication
c) memory task communication
d) peripheral task communication
View Answer
Answer: b
Explanation: The level of the inter-task communication can indicate the buffer status, that is whether it is full or ready for
collection.
10. What solution can be done for the inefficiency in the memory usage of small data?
a) same size buffer
b) single buffer
c) variable size buffer
d) directional buffer
View Answer
Answer: c
Explanation: The buffer exchange becomes inefficient while concerning the memory usage for small and the simple data. In
order to solve this problem, variable size buffers can be used but this requires a more complex operation to handle the length
of the valid data.
11. Which processor has a different segment buffer?
a) 8051
b) 8086
c) ARM
d) MC68HC11
View Answer
Answer: b
Explanation: The 8086 has a segmented architecture where the buffers are having a different segment. In such processors, the
device drive is running in the supervisor mode, requesting task in the user mode and so on.
12. Which of the following can combine buffers in a regular and methodical way using pointers?
a) buffer exchange
b) directional buffer
c) linked lists
d) double buffer
View Answer
Answer: c
Explanation: The linked lists are the way of combining buffers in a methodical way and regular method by using the pointers to
point the next entry in the list. This can be maintained by adding an entry to the which contains the address of the next buffer.
13. Which entry will have a special value in the linked list?
a) first entry
b) last entry
c) second entry
d) second last entry
View Answer
Answer: b
Explanation: The last entry will have a special value that indicates that the entry is the last one but the first entry uses the
pointer entry to locate the position.
14. Which entry can use the pointer in the linked list?
a) first entry
b) last entry
c) second entry
d) third entry
View Answer
Answer: a
Answer: c
1. Which of the following allows the reuse of the software and the hardware components?
a) platform based design
b) memory design
c) peripheral design
d) input design
View Answer
Answer: a
Explanation: The platform design allows the reuse of the software and the hardware components in order to cope with the
increasing complexity in the design of embedded systems.
2. Which of the following is the design in which both the hardware and software are considered during the design?
a) platform based design
b) memory based design
c) software/hardware codesign
d) peripheral design
View Answer
Answer: c
Explanation: The software/hardware codesign is the one which having both hardware and software design concerns. This will
help in the right combination of the hardware and the software for the efficient product.
3. What does API stand for?
a) address programming interface
b) application programming interface
c) accessing peripheral through interface
d) address programming interface
View Answer
Answer: b
Explanation: The platform-based design helps in the reuse of both the hardware and the software components. The application
programming interface helps in extending the platform towards software applications.
4. Which activity is concerned with identifying the task at the final embedded systems?
a) high-level transformation
b) compilation
c) scheduling
d) task-level concurrency management
View Answer
Answer: d
Explanation: There are many design activities associated with the platforms in the embedded system and one such is the task-
level concurrency management which helps in identifying the task that needed to be present in the final embedded systems.
5. In which design activity, the loops are interchangeable?
a) compilation
b) scheduling
c) high-level transformation
d) hardware/software partitioning
View Answer
Answer: c
Explanation: The high-level transformation is responsible for the high optimizing transformations, that is, the loops can be
interchanged so that the accesses to array components become more local.
6. Which design activity helps in the transformation of the floating point arithmetic to fixed point arithmetic?
a) high-level transformation
b) scheduling
c) compilation
d) task-level concurrency management
View Answer
Answer: a
Explanation: The high-level transformation are responsible for the high optimizing transformations, that is, for the loop
interchanging and the transformation of the floating point arithmetic to the fixed point arithmetic can be done by the high-level
transformation.
7. Which design activity is in charge of mapping operations to hardware?
a) scheduling
b) high-level transformation
c) hardware/software partitioning
d) compilation
View Answer
Answer: c
Explanation: The hardware/software partitioning is the activity which is in charge of mapping operations to the software or to
the hardware.
8. Which of the following is approximated during hardware/software partitioning, during task-level concurrency management?
a) scheduling
b) compilation
c) task-level concurrency management
d) high-level transformation
View Answer
Answer: a
Explanation: The scheduling is performed in several contexts. It should be approximated with the other design activities like the
compilation, hardware/software partitioning, and task-level concurrency management. The scheduling should be precise for the
final code.
9. Which of the following is a process of analyzing the set of possible designs?
a) design space exploration
b) scheduling
c) compilation
d) hardware/software partitioning
View Answer
Answer: a
Explanation: The design space exploration is the process of analyzing the set of designs and the design which meet the
specification is selected.
10. Which of the following is a meet-in-the-middle approach?
a) peripheral based design
b) platform based design
c) memory based design
d) processor design
View Answer
Answer: b
1. Which of the following helps in reducing the energy consumption of the embedded system?
a) compilers
b) simulator
c) debugger
d) emulator
View Answer
Answer: a
Explanation: The compilers can reduce the energy consumption of the embedded system and the compilers performing the
energy optimizations are available.
2. Which of the following help to meet and prove real-time constraints?
a) simulator
b) debugger
c) emulator
d) compiler
View Answer
Answer: d
Explanation: There are several reasons for designing the optimization and compilers and one such is that it could help to meet
and prove the real-time constraints.
3. Which of the following is an important ingredient of all power optimization?
a) energy model
b) power model
c) watt model
d) power compiler
View Answer
Answer: b
Explanation: Saving energy can be done at any stage of the embedded system development. The high-level optimization
techniques can reduce power consumption and similarly compiler optimization also can reduce the power consumption and the
most important thing in power optimization are the power model.
4. Who proposed the first power model?
a) Jacome
b) Russell
c) Tiwari
d) Russell and Jacome
View Answer
Answer: c
Explanation: Tiwari proposed the first power model in the year 1974. The model includes the so-called bases and the inter-
instruction instructions. Base costs of the instruction correspond to the energy consumed per instruction execution when an
infinite sequence of that instruction is executed. Inter instruction costs model the additional energy consumed by the processor
if instructions change.
5. Who proposed the third power model?
a) Tiwari
b) Russell
c) Jacome
d) Russell and Jacome
View Answer
Answer: d
Explanation: The third model was proposed by Russell and Jacome in the year 1998.
6. Which compiler is based on the precise measurements of two fixed configurations?
a) first power model
b) second power model
c) third power model
d) fourth power model
View Answer
Answer: c
Explanation: The third model was proposed by Russell and Jacome in the year 1998 and is based on the precise
measurements of the two fixed configurations.
7. What does SPM stand for?
a) scratch pad memories
b) sensor parity machine
c) scratch pad machine
d) sensor parity memories
View Answer
Answer: a
Explanation: The smaller memories provide faster access and consume less energy per access and SPM or scratch pad
memories is a kind of small memory which access fastly and consume less energy per access and it can be exploited by the
compiler.
8. Which model is based on precise measurements using real hardware?
a) encc energy-aware compiler
b) first power model
c) third power model
d) second power model
View Answer
Answer: a
Explanation: The encc-energy aware compiler uses the energy model by Steinke et al. it is based on the precise
measurements of the real hardware. The power consumption of the memory, as well as the processor, is included in this
model.
9. What is the solution to the knapsack problem?
a) many-to-many mapping
b) one-to-many mapping
c) many-to-one mapping
d) one-to-one mapping
View Answer
Answer: d
Explanation: The knapsack problem is associated with the size constraints, that is the size of the scratch pad memories. This
problem can be solved by one-to-one mapping which was presented in an integer programming model by Steinke et al.
10. How can one compute the power consumption of the cache?
a) Lee power model
b) First power model
c) Third power model
d) CACTI
View Answer
Answer: d