Embedded Systems Quiz Guide
Embedded Systems Quiz Guide
Answer: d
Explanation: DRAM is used in PCs and Embedded systems because of its low cost. SRAM, flash
memory and EEPROM are more costly than DRAM.
2. How is the protection and security for an embedded system made?
a) Security chips
b) Memory disk security
c) IPR
d) OTP
Answer: c
Explanation: Intellectual property right provides security and protection to embedded systems.
3. Which of the following task swapping method is a better choice in the embedded systems
design?
a) time slice
b) RMS
c) cooperative multitasking
d) pre-emptive
Answer: d
Explanation: The pre-emptive method of task swapping is the first choice for embedded system
design because of its better system response.
4. Which type of memory is suitable for low volume production of embedded systems?
a) Non-volatile
b) RAM
c) Volatile
d) ROM
Answer: a
Explanation: The devices which use non-volatile memory allow the software to be download and
returned in the device. UV erasable EPROM is favorable but EEPROM is also gaining favor.
Therefore, this type of memory is used in low volume production.
5. Which activity is concerned with identifying the task at the final embedded systems?
a) scheduling
b) task-level concurrency management
c) high-level transformation
d) compilation
Answer: b
Explanation: There are many design activities associated with the platforms in the embedded
system and one such is the task-level concurrency management which helps in identifying the task
that needed to be present in the final embedded systems.
6. Which level simulates the algorithms that are used within the embedded systems?
a) algorithmic level
b) switch level
c) gate level
d) circuit level
Answer: a
Explanation: The algorithmic level simulates the algorithm which is used within in the embedded
system.
7. How an embedded system communicates with the outside world?
a) Memory
b) Output
c) Peripherals
d) Input
Answer: c
Explanation: The system communicates with the outside world through peripherals
8 Which of the following helps in reducing the energy consumption of the embedded system?
a) emulator
b) debugger
c) simulator
d) compilers
Answer: d
Explanation: The compilers can reduce the energy consumption of the embedded system and the
compilers performing the energy optimizations are available
9 What is the purpose of memory refresh register of Z80?
a) To control on-chip SRAM
b) To control on-chip DRAM
c) To clear cache
d) To control ROM
Answer: b
Explanation: In addition to the general-purpose registers, a stack pointer, program counter, and two
index registers are included in Z80 It was also used in many embedded designs because of its
high-quality performance and for its in-built refresh circuitry for DRAMs
10 What does MESI stand for?
a) modified exclusive system input
b) modifies embedded shared invalid
c) modified exclusive shared invalid
d) modified exclusive stale invalid
Answer: c
Explanation: The MESI protocol supports a shared state which is a formal mechanism for
controlling the cache coherency by using the bus snooping techniques MESI refers to the states
that cached data can access In MESI protocol, multiple processors can cache shared data
11 Which of the following is the pin efficient method of communicating between other devices?
a) memory port
b) peripheral port
c) parallel port
d) serial port
Answer: d
Explanation: The serial ports are considered to be the pin efficient method of communication
between other devices within an embedded system
12 Which of the following is a traditional method for emulating the processor?
a) CPU simulator
b) SDS
c) ICE
d) Low-level language simulator
Answer: c
Explanation: The SDS is one of the simulation tools used in the embedded systems CPU
simulator and the low-level simulator are the other kinds of the simulator used in the embedded
system design
13 Which of the following unit protects the memory?
a) memory management unit
b) peripheral unit
c) execution unit
d) bus interface unit
Answer: a
Explanation: The resources have to be protected in an embedded system and the most important
resource to be protected is the memory which is protected by the memory management unit
through different programming
14 Identify the standard software components that can be reused in an embedded system
design?
a) memory
b) application software
c) application manager
d) operating system
Answer: d
Explanation: There are certain software components that can be reused in an embedded system
design These are the operating systems, real-time databases and some other forms of
middleware
15 What does ICE stand for?
a) in-circuit EPOM
b) in-code emulation
c) in-circuit emulation
d) in-code EPROM
Answer: c
Explanation: The ICE or in-circuit emulation is one the traditional method used to emulate the
processor in the embedded system so that the software can be downloaded and can be debugged
in situ in the end application
16 Who proposed the first power model?
a) Tiwari
b) Russell and Jacome
c) Russell
d) Jacome
Answer: a
Explanation: Tiwari proposed the first power model in the year 1974 The model includes the so-
called bases and the inter-instruction instructions Base costs of the instruction correspond to the
energy consumed per instruction execution when an infinite sequence of that instruction is
executed Inter instruction costs model the additional energy consumed by the processor if
instructions change
17 Which of the following offers external chips for memory and peripheral interface circuits?
a) Embedded system
b) Peripheral system
c) Microcontroller
d) Microprocessor
Answer: d
Explanation: Microcontrollers are the CPUs which have integrated memory and peripherals
whereas microprocessor offers external chips for memory
18 What kind of socket does an external EPROM to plugged in for prototyping?
a) Piggyback reset socket
b) Multi-socket
c) Piggyback
d) Single socket
Answer: c
Explanation: Some controllers use a special package called piggyback socket on the top of the
package to allow the EPROM for prototyping
19 Which is the single device capable of providing prototyping support for a range of
microcontroller?
a) Umbrella device
b) OTP
c) RAM
d) ROM
Answer: a
Explanation: Umbrella device is capable of providing prototyping support for a range of
microcontrollers
20 By which instruction does the switching of registers take place?
a) Register instruction
b) EXX instruction
c) Instruction opcodes
d) AXX instruction
Answer: c
Explanation: Only one set of registers can be used at one time and the switching of registers and
data transfer is performed by the EXX instruction
21 Which of the architecture is more complex?
a) MC68040
b) MC68030
c) SPARC
d) 8086
Answer: c
Explanation: SPARC have RISC architecture which has a simple instruction set but MC68020,
MC68030, 8086 have CISC architecture which is more complex than CISC
22 Which of the following statements are true for von Neumann architecture?
a) separate bus between the program memory and data memory
b) external bus for program memory and data memory
c) external bus for data memory only
d) shared bus between the program memory and data memory
Answer: d
Explanation: von Neumann architecture shares bus between program memory and data memory
whereas Harvard architecture have a separate bus for program memory and data memory
23 What is approximate data access time of SRAM?
a) 2ns
b) 10ns
c) 60ns
d) 4ns
Answer: d
Explanation: SRAM access data in approximately 4ns because of its flip-flop arrangement of
transistors whereas the data access time in DRAM is approximately 60ns since it has a single
capacitor for one-bit storage
24 Which of the following is a plastic package used primarily for DRAM?
a) Zig-zag
b) DIMM
c) SIMM
d) Dual-in-line
Answer: a
Explanation: Zig-zag package of memory is a plastic package used for DRAM The leads of this
package are arranged in a zigzag manner
25 Which of the following is the biggest challenge in the cache memory design?
a) coherency
b) memory access
c) size
d) delay
Answer: a
Explanation: The coherency is a major challenge in designing the cache memory The cache has
to be designed by solving the problem of data coherency while remaining hardware and software
compatible
26 Which ports are used in the multi-master system to avoid errors?
a) bidirectional port
b) tridirectionally port
c) multi directional port
d) unidirectional port
Answer: a
Explanation: By using the bidirectional ports, each master can monitor the line and confirm its
expected state and if it is not matched, a mismatch or collision had occurred which will discontinue
the transmission by the master
27 Which provides an input clock for the receiver part of the UART 8250?
a) DDIS
b) MR
c) RD
d) RCLK
Answer: d
Explanation: RCLK provides an input clock for the receiver part of the UART RD is the read signal
MR is the master reset pin and DDIS is used to control bus arbitration logic
28 What does PCM stand for?
a) peculiar code modulation
b) pulse codec machine
c) pulse code modulation
d) peripheral code machine
Answer: c
Explanation: The linear codec is also known as pulse code modulation which is commonly used in
the telecommunications industry
29 Which of the following is the common method for connecting the peripheral to the processor?
a) software
b) exception
c) external interrupts
d) internal interrupts
Answer: c
Explanation: The common method for connecting the peripheral to the processor is the external
interrupts The external interrupts are provided through the external pins which are connected to
the peripherals
30 What allows the data protection in the software interrupt mechanism?
a) TRAP
b) SWI
c) Same mode
d) Different mode
Answer: d
Explanation: The switching between user mode and supervisor mode provides protection for the
processor, that is, the different modes in the software interrupt allows the memory and the
associated code and data to be protected from each other
32 Which interrupts generate fast interrupt exception?
a) software interrupt
b) hardware interrupt
c) internal interrupt
d) external interrupt
Answer: d
Explanation: The external interrupts generate the fast interrupt routine exception in which the
external interrupt is synchronized with the processor clock
33 Which task swap method works in a regular periodic point?
a) cooperative multitasking
b) schedule algorithm
c) pre-emption
d) time slice
Answer: d
Explanation: The time slicing works by switching task in regular periodic points in time, that is, any
task that needs to run next will have to wait until the current time slice is completed
34 Which of the following is a part of RTOS kernel?
a) register
b) ISR
c) memory
d) input
Answer: b
Explanation: The ISR can send the message for the tasks and it is a part of RTOS kernel
36 What limits the amount of virtual memory in Windows 3 1?
a) static file
b) dynamic file
c) nature of swap file
d) size of the swap file
Answer: d
Explanation: The swap file of Windows 3.1 have a size of 25 Mbytes and thus limits the amount of
virtual memory that it can support
37 Which one of the following offers CPUs as integrated memory or peripheral interfaces?
a) Memory system
b) Embedded system
c) Microcontroller
d) Microprocessor
Answer: c
Explanation: Microcontrollers are the CPUs which have integrated memory and peripherals but
microprocessor possesses external chips for memory
38 Which algorithm is based on Jackson’s rule?
a) EDF
b) LST
c) LL
d) EDD
Answer: d
Explanation: The EDD or earliest due date is based on Jackson’s rule The Jackson’s rule states
that for a given a set of n independent tasks, any algorithm that executes the tasks in the order of
nondecreasing deadlines is optimal with respect to reducing the maximum lateness EDF is the
earliest deadline first, LL is the least laxity and the LST is the least slack time first
1 Which of the following is a category of a stimuli?
a) Periodic stimuli
b) Software stimuli
c) Hardware stimuli
d) Management stimuli
2 Which of the following activities may be included in a real-time software design process?
a) Platform selection
b) Timing analysis
c) Process design
d) All of the mentioned
Answer: d
Explanation: All these can be implemented
3 Which of the following is not a real-time architectural pattern
a) Observe and React
b) Environmental Control
c) Embedded System
d) Process Pipeline
Answer: c
Explanation: Embedded systems’ patterns are process-oriented rather than object- or component-
oriented
4 RTOS stands for
a) real-life operating system
b) real-time operating system
c) real-time operating software
d) real-life operating software
Answer: b
Explanation: Embedded applications are built on top of a real-time operating system (RTOS)
5 The times by which stimuli must be processed and some response produced by the system is
known as
a) Compile time
b) Frequency
c) Deadlines
d) Execution time
Answer: c
Explanation: If the system does not meet a deadline then, it results in a system failure; in a soft
real-time system, it results in degraded system service
6 The switch to backup power must be completed within a deadline of
a) 50 ms
b) 55 ms
c) 70 ms
d) 100 ms
Answer: a
Explanation: The time required to power failure stimuli is 50 millisecond
7 An example of a system that may use a process pipeline is a _________
a) High-speed data acquisition system
b) Failure of a power supply in an embedded system
c) Both High-speed data acquisition system AND Failure of a power supply in an embedded
system
d) None of the mentioned
Answer: a
Explanation: Data acquisition systems collect data from sensors for subsequent processing and
analysis These systems are used in situations where the sensors are collecting a lot of data from
the system’s environment and it isn’t possible or necessary to process that data in real time
8 Periodic occur irregularly and unpredictably and are usually signaled using the computer’s
interrupt mechanism
a) True
b) False
Answer: b
Explanation: This is the case for Aperiodic stimuli
9 If you detect power failure by monitoring a voltage level, you have to make more than one
observation to detect that the voltage is dropping
a) True
b) False
Answer: a
Explanation: If you run the process 250 times per second, this means that it runs every 4 ms and
you may require up to two periods to detect the voltage drop
10 The average execution time of the power monitor process should be less than
a) 1ms
b) 10ms
c) 100ms
d) none of the mentioned
Answer: a
Explanation: General embedded software property
1 Which of the following can be used to refer to entities within the RTOS?
a) threads
b) kernels
c) system
d) applications
Answer: a
Explanation: The threads and processes can be used to refer to entities within the RTOS They
provide an interchangeable replacement for the task They have a slight difference in their function
A process is a program in execution and it has its own address space whereas threads have a
shared address space The task can be defined as a set of instructions which can be loaded into
the memory
2 Which of the following defines the set of instructions loaded into the memory?
a) process
b) task
c) thread
d) system hardware
Answer: b
Explanation: The task can be defined by the set of instructions which is loaded into the memory
and it can split into two or more tasks
3 Which of the following uses its own address space?
a) thread
b) process
c) task
d) kernel
Answer: a
Explanation: Threads uses shared memory space and it uses the memory space of the process
4 Which of the following does not uses a shared memory?
a) process
b) thread
c) task
d) kernel
Answer: a
Explanation: The program in execution is known as the process The process does not share the
memory space but the threads have a shared memory address When the CPU switches from
process to another, the current information is stored in the process descriptor
5 Which of the following can own and control the resources?
a) thread
b) task
c) system
d) peripheral
Answer: b
Explanation: The task and process have several characteristics and one such is that the task or
process can own or control resources and it has threads of execution which are the paths through
the code
6 Which can be supported if the task or process maintains a separate data area for each thread?
a) single thread system
b) mono thread system
c) multiple threads
d) dual threads
Answer: c
Explanation: The multiple threads can be supported only if the process or task can maintain
separate data areas for each thread
7 Which of the following possesses threads of execution?
a) process
b) thread
c) kernel
d) operating system
Answer: a
Explanation: The process has threads of execution which are the paths through the code
8 Which of the following is inherited from the parent task?
a) task
b) process
c) thread
d) kernel
Answer: c
Explanation: The threads are a part of the process, that is, it uses a shared memory of the process
and therefore said that its resources are inherited from the parent process or task
9 Which term is used to encompass more than a simple context switch?
a) process
b) single thread system
c) thread
d) multithread
Answer: a
Explanation: The process includes the additional information which is used to encompass more
than a simple context switch This is similar to the task switching, that is why it is said that process
and task are interchangeable
10 Which can be considered as the lower level in the multitasking operating system?
a) process
b) task
c) threads
d) multi threads
Answer: c
Explanation: In the multitasking operating system, the process and tasks form the higher level
whereas the thread is the lower level But in a simple operating system, there is no difference
between the context switch of thread and the process
1 The software substituted for hardware and stored in ROM
a) Synchronous Software
b) Package Software
c) Firmware
d) Middleware
Answer: c
Explanation: Software refers to a collection of programs Firm wares act as a link between the
hardware and the system It is stored in read only memory
2 Middleware has enabled the production of various types of smart machines having
microprocessor chips with embedded software
a) True
b) False
Answer: b
Explanation: The statement is false Firmware is designed for this purpose and not middleware A
middleware is for providing abstraction in programming
3 A “glue” between client and server parts of application
a) Middleware
b) Firmware
c) Package
d) System Software
Answer: a
Explanation: A middleware acts as a glue between client and server parts of application It
provides programming abstraction which means hiding all the relevant details
4 MOM stands for?
a) Message oriented middleware
b) Mails oriented middleware
c) Middleware of messages
d) Main object middleware
Answer: a
Explanation: MOM is message-oriented middleware It is basically responsible for sending and
receiving messages across distributed systems
5 Storage of firmware is ___________
a) Cache Memory
b) RAM
c) External
d) ROM
Answer: d
Explanation: Firmware is stored in ROM which is the read only memory Firmware basically acts
as a link between the hardware and the system
6 DNS stands for?
a) Domain Name System
b) Direct Name System
c) Direct Network System
d) Domain Network System
Answer: a
Explanation: DNS stands for Domain Name System Domain name system is the way in which the
internet domain names are traced and then translated into IP addresses
7 A software that lies between the OS and the applications running on it
a) Firmware
b) Middleware
c) Utility Software
d) Application Software
Answer: b
Explanation: It is called as middleware Middleware enables the interaction between the Operating
System and the applications running on it
8 A type of middleware that allows for between the built-in applications and the real-time OS?
a) Firmware
b) Database middleware
c) Portals
d) Embedded Middleware
Answer: d
Explanation: It is called the embedded middleware since it activates the communication link
between the built-in applications and the real time operating system
9 What is the other name for object middleware?
a) Object request interface
b) Object enabled interface
c) Object Request broker
d) Object enabled broker
Answer: c
Explanation: It is also called as object request broker It gives the applications ability to send the
objects and receive services through an object
10 The _______ calls certain procedures on remote systems and is used to perform synchronous
or asynchronous interactions between systems
a) Procedure
b) RPC
c) Message Oriented
d) DB
Answer: b
Explanation: It is called the RPC or the Remote Procedure Call The functioning is to call certain
procedures on remote applications This is generally utilized in a software application
1 What does I2C stand for?
a) inter-IC
b) intra-IC
c) individual integrated chip
d) intel IC
Answer: a
Explanation: The I2C is known as inter-IC, which is developed by Philips for interfacing with the
peripheral devices
2 Which company developed I2C?
a) Intel
b) Motorola
c) Phillips
d) IBM
Answer: c
Explanation: The I2C is developed by Philips for use within the television sets
3 Which of the following is the most known simple interface?
a) I2C
b) Serial port
c) Parallel port
d) SPI
Answer: a
Explanation: The I2C is the most known simple interface which is used currently It can combine
both the hardware and the software protocols to provide a bus interface which helps in the
communication with many peripherals
4 Which are the two lines used in the I2C?
a) SDA and SPDR
b) SPDR and SCL
c) SDA and SCL
d) SCL and status line
Answer: c
Explanation: The I2C bus consists of two lines which are called SDA and SCL The master and
slave devices are attached to these lines
6 Which pin provides the reference clock for the transfer of data?
a) SDA
b) SCL
c) SPDR
d) Interrupt pin
Answer: b
Explanation: The SCL pin can provide the reference clock for the transmission of data but it is not a
free running clock
7 Which of the following are the three hardware signals?
a) START, STOP, ACKNOWLEDGE
b) STOP, TERMINATE, END
c) START, SCL, SDA
d) STOP, SCL, SDA
Answer: a
Explanation: The three hardware signals are START, STOP and ACKNOWLEDGE These signals
help in the transmission of data between the slave and the masters
8 Which of the following performs the START signal?
a) master
b) slave
c) CPU
d) memory
Answer: a
Explanation: The START signal is performed by the master by making the SCL and SDA pin high
9 Which of the following are handshake signals?
a) START
b) STOP
c) ACKNOWLEDGE
d) START and STOP
Answer: c
Explanation: The START signal and ACKNOWLEDGE signals are almost similar but there exhibits
a small change The START signal is initiated by the master only but the ACKNOWLEDGE signal
is a handshake between both the master and slave
10 A packet is also referred to as
a) postcard
b) telegram
c) letter
d) data
Answer: b
Explanation: The data is transmitted in packets with a having one or more bytes These packets of
data are also known as a telegram
11 Which of the following byte performs the slave selection?
a) first byte
b) second byte
c) terminal byte
d) eighth byte
Answer: a
Explanation: The slave selection is performed by using the first byte as an address byte When the
address byte is sent out all the slave devices compares the address by its own value If there is a
match, the ACKNOWLEDGE signal will be sent by the slave
1 Which of the following is the pin efficient method of communicating between other devices?
a) serial port
b) parallel port
c) peripheral port
d) memory port
Answer: a
Explanation: The serial ports are considered to be the pin efficient method of communication
between other devices within an embedded system
2 Which of the following depends the number of bits that are transferred?
a) wait statement
b) ready statement
c) time
d) counter
Answer: c
Explanation: The time taken for the data transmission within the system depends on the clock
frequency and the number of bits that are transferred
3 Which of the following is the most commonly used buffer in the serial porting?
a) LIFO
b) FIFO
c) FILO
d) LILO
Answer: b
Explanation: Most of the serial ports uses a FIFO buffer so that the data is not lost The FIFO
buffer is read to receive the data, that is, first in first out
4 What does SPI stand for?
a) serial parallel interface
b) serial peripheral interface
c) sequential peripheral interface
d) sequential port interface
Answer: b
Explanation: The serial parallel interface bus is a commonly used interface which involves master
slave mechanism The shift registers are worked as master and the slave devices are driven by a
common clock
5 Which allows the full duplex synchronous communication between the master and the slave?
a) SPI
b) serial port
c) I2C
d) parallel port
Answer: a
Explanation: The serial peripheral interface allows the full duplex synchronous communication
between the master and the slave devices MC68HC05 developed by Motorola uses SPI for
interfacing the peripheral devices
6 Which of the following processor uses SPI for interfacing?
a) 8086
b) 8253
c) 8254
d) MC68HC11
Answer: d
Explanation: The MC68HC05 and MC68HC11 microcontrollers use the serial peripheral interface
for the peripheral interfacing
7 In which register does the data is written in the master device?
a) index register
b) accumulator
c) SPDR
d) status register
Answer: c
Explanation: The serial peripheral interface follows a master slave mechanism in which the data is
written to the SPDR register in the master device and clocked out into the slave device SPDR by
using a common clock signal called SCK
8 What happens when 8 bits are transferred in the SPI?
a) wait statement
b) ready statement
c) interrupt
d) remains unchanged
Answer: c
Explanation: The interrupts are locally generated when 8-bits are transferred so that the data can
be read before the next byte is clocked through
9 Which signal is used to select the slave in the serial peripheral interfacing?
a) slave select
b) master select
c) interrupt
d) clock signal
Answer: a
Explanation: The slave select signal selects which slave is to receive data from the master
10 How much time period is necessary for the slave to receive the interrupt and transfer the data?
a) 4 clock time period
b) 8 clock time period
c) 16 clock time period
d) 24 clock time period
Answer: b
Explanation: The SPI uses an eight clock time period for the slave to receive the interrupt and
transfer the data which determines the maximum data rate
1 Which of the following is a category of a stimuli?
a) Periodic stimuli
b) Software stimuli
c) Hardware stimuli
d) Management stimuli
Answer: a
Explanation: Periodic stimuli occur at predictable time intervals For example, the system may
examine a sensor every 50 milliseconds and take action depending on that sensor value
2 Which of the following activities may be included in a real-time software design process?
a) Platform selection
b) Timing analysis
c) Process design
d) All of the mentioned
Answer: d
Explanation: All these can be implemented
3 Which of the following is not a real-time architectural pattern
a) Observe and React
b) Environmental Control
c) Embedded System
d) Process Pipeline
Answer: c
Explanation: Embedded systems’ patterns are process-oriented rather than object- or component-
oriented
4 RTOS stands for
a) real-life operating system
b) real-time operating system
c) real-time operating software
d) real-life operating software
Answer: b
Explanation: Embedded applications are built on top of a real-time operating system (RTOS)
5 The times by which stimuli must be processed and some response produced by the system is
known as
a) Compile time
b) Frequency
c) Deadlines
d) Execution time
Answer: c
Explanation: If the system does not meet a deadline then, it results in a system failure; in a soft
real-time system, it results in degraded system service
6 The switch to backup power must be completed within a deadline of
a) 50 ms
b) 55 ms
c) 70 ms
d) 100 ms
Answer: a
Explanation: The time required to power failure stimuli is 50 millisecond
7 An example of a system that may use a process pipeline is a _________
a) High-speed data acquisition system
b) Failure of a power supply in an embedded system
c) Both High-speed data acquisition system AND Failure of a power supply in an embedded
system
d) None of the mentioned
Answer: a
Explanation: Data acquisition systems collect data from sensors for subsequent processing and
analysis These systems are used in situations where the sensors are collecting a lot of data from
the system’s environment and it isn’t possible or necessary to process that data in real time
8 Periodic occur irregularly and unpredictably and are usually signaled using the computer’s
interrupt mechanism
a) True
b) False
Answer: b
Explanation: This is the case for Aperiodic stimuli
9 If you detect power failure by monitoring a voltage level, you have to make more than one
observation to detect that the voltage is dropping
a) True
b) False
Answer: a
Explanation: If you run the process 250 times per second, this means that it runs every 4 ms and
you may require up to two periods to detect the voltage drop
10 The average execution time of the power monitor process should be less than
a) 1ms
b) 10ms
c) 100ms
d) none of the mentioned
Answer: a
Explanation: General embedded software property
1 Which of the following indicates the type of operation that the master requests?
a) address value
b) initial value
c) terminal count
d) first byte
Answer: a
Explanation: The address value helps the master to select the device and indicates what operation
should be taken If the 8th bit is logic one, read operation takes out and if it is logic zero, write
operation takes out
2 How can both single byte and the double byte address slave use the same bus?
a) extended memory
b) extended address
c) peripheral count
d) slave bus
Answer: b
Explanation: For providing more addressing, an extended address is developed which possesses
two bytes in which the first byte uses a special code to distinguish it from a single byte address so
that the single byte and double byte address slaves can use a shared bus
3 Which counter selects the next register in the I2C?
a) auto-incrementing counter
b) decrementing counter
c) auto-decrementing counter
d) terminal counter
Answer: a
Explanation: The peripheral having a small number of locations can use auto-incrementing counter
for accessing the next register But this will not be applicable in bigger memory devices
4 Which is an efficient method for the EEPROM?
a) combined format
b) auto-incrementing counter
c) register set
d) single format
Answer: a
Explanation: Combined format is an efficient method for the EEPROM because it is having a large
number of registers
5 Which of the following uses two data transfers?
a) auto-incrementing counter
b) auto-decrementing counter
c) combined format
d) single format
Answer: c
Explanation: The EEPROM is having a large number of registers, so auto incrementing counter will
not be applicable So there is an alternative method which uses index value that is written to the
chip, prior to accessing the data This is called combined format and this combined format uses
two data transfer One is to write the data and the other is to read
6 Which of the following is efficient for the small number of registers?
a) auto-incrementing counter
b) auto-decrementing counter
c) combined format
d) single format
Answer: a
Explanation: The peripherals which have a small number of locations can use auto-increment
counter within the peripheral in which each access selects the next register
7 Which can determine the timeout value?
a) polling
b) timer
c) combined format
d) watchdog timer
Answer: a
Explanation: The polling can be used along with the counter to determine the timeout value
8 How is bus lockup avoided?
a) timer and polling
b) combined format
c) terminal counter
d) counter
Answer: a
Explanation: The timeout value can be changed by the peripheral devices, so for a sophisticated
system a combination of polling and timer is used to check for the signal n times within a
predefined interval This can avoid the bus lock
9 Which of the following can determine if two masters start to use the bus at the same time?
a) counter detect
b) collision detect
c) combined format
d) auto-incremental counter
Answer: b
Explanation: The collision detects technique helps to determine whether two or more masters are
using the same bus in a multi-master device
10 Which ports are used in the multi-master system to avoid errors?
a) unidirectional port
b) bidirectional port
c) multi directional port
d) tridirectional port
Answer: b
Explanation: By using the bidirectional ports, each master can monitor the line and confirm its
expected state and if it is not matched, a mismatch or collision had occurred which will discontinue
the transmission by the master
1 Which of the following provides a buffer between the user and the low-level interfaces to the
hardware?
a) operating system
b) kernel
c) software
d) hardware
Answer: a
Explanation: The operating system is software which provides a buffer between the low-level
interfaces to the hardware within the system and the user
2 Which of the following enables the user to utilize the system efficiently?
a) kernel
b) operating system
c) software
d) hardware
Answer: b
Explanation: The operating system is software that enables the users to utilize the system
effectively
3 Which of the following can make the application program hardware independent?
a) software
b) application manager
c) operating system
d) kernel
Answer: c
Explanation: The operating system allows the software to be moved from one system to another
and therefore, it can make the application program hardware independent
4 Which of the following speed up the testing process?
a) kernel
b) software
c) application manager
d) program debugging tools
Answer: d
Explanation: The program debugging tools can speed up the testing process which can make the
processor faster
5 Which of the following includes its own I/O routine?
a) hardware
b) kernel
c) operating system
d) application manager
Answer: c
Explanation: An operating system is a software which includes its own I/o routine in order to drive
the serial ports and the parallel ports
6 Which forms the heart of the operating system?
a) kernel
b) applications
c) hardware
d) operating system
Answer: a
Explanation: The kernel is the heart of the operating system This can control the hardware and
can deal with the interrupts, I/O systems, memory etc
7 Which of the following locates a parameter block by using an address pointer?
a) OS
b) kernel
c) system
d) memory
Answer: b
Explanation: The kernel is the heart of the operating system which can control the hardware and
can deal with the interrupts, I/O systems, memory etc It can also locate the parameter block by
using an address pointer which is stored in the predetermined address register
8 Which of the following are not dependent on the actual hardware performing the physical task?
a) applications
b) hardware
c) registers
d) parameter block
Answer: d
Explanation: The kernel can locate the parameter block by using an address pointer which is
stored in the predetermined address register These parameter blocks are standard throughout the
operating system, that is, they are not dependent on the actual hardware performing the physical
task
9 Which of the following bus can easily upgrade the system hardware?
a) control bus
b) data bus
c) VMEbus
d) bus interface unit
Answer: c
Explanation: The software can be easily moved from one system to another which is more
important for designing embedded systems, especially for those which use an industry standard
bus such as VMEbus, in which the system hardware can be expanded or upgraded
10 Which of the following is the first widely used operating system?
a) MS-DOS
b) windows XP
c) android
d) CP/M
Answer:d
Explanation: The first widely used operating system is the CP/M which is developed for Intel 8080
and the 8”floppy disk system
11 Which of the following is an example of a single task operating system?
a) android
b) windows
c) IOS
d) CP/M
Answer: d
Explanation: The CP/M is a single task operating system, that is, only one task or an application
can be executed at a time
12 Which of the following becomes a limiting factor while an application program has to be
complete?
a) memory
b) peripheral
c) input
d) output
Answer: a
Explanation: The application program has to complete and the memory becomes a limiting factor,
which can be solved by using program overlays
13 Which of the following cannot carry implicit information?
a) semaphore
b) message passing
c) threads
d) process
Answer: a
Explanation: The kernel in the real-time operating system which deals with the flag but cannot carry
implicit information are called semaphores or events