ESD Objective Questions
ESD Objective Questions
CHAPTER - I
11. Which of the following is / are example of an embedded system for signal processing? [ ]
(a) Apple iPod (b) SanDisk USB Storage Device (c) Both a & b (d) None
12. The software designed to manage and allocate system resources and execute other software is
(a) Operating System (b) Application Software (c) System Software (d) DOS [ ]
16. You are working on a mission critical embedded system development project for a client and the
client and your company has signed a NDA on the disclosure of the project related information. You
share the details of the project you are working, with your friend. Which aspect of information
security are you violating here? [ ]
(a) Integrity (b) Confidentiality (c) Availability (d) All of the above
17. The MTBF for an embedded product is very high. This means [ ]
(a) Product is highly reliable (b) Availability of product is high
(c) Preventive maintenance of the product is very less (d) All of the above
Solutions
1. D 2. B 3. A 4. C 5. C 6. C 7. B 8. B 9. C 10. C
11. A 12. A 13. A 14. A 15. D 16. D 17. D 18. D 19. A 20. A
Fill in the Blanks.
1. Measure of information security in embedded systems is __________________________________.
2. In data collection systems DATA refers to _____________________________________________.
3. ______________________ is a typical example of an embedded system employing Data Processing.
4. The MTBF of an embedded product is 4 months and the MTTR is 2 weeks. The availability of the
product is __________________.
5. Large Scale embedded system use _____ or _____ bit processors.
6. An example of embedded system used in Consumer electronics is ______________________.
7. Water Sprinkler is an application of ___________________________________ category.
8. A digital camera is an example of an embedded system with _______________________________
representation of data.
9. A Digital Hearing aid is an example of an embedded system employing _____________________.
10. Bench Mark of an embedded system is a ____________________ or ________________________.
11. In the information security context, Confidentiality deals with protection of ___________ and
__________ from unauthorized disclosure.
12. Portability is a measure of ___________________________________.
13. For a commercial product the sales volume is high during _______________________________.
14. An example of gradual safety threat from an embedded system is _________________________.
15. Embedded Systems are application and domain specific. True / False.
Solutions
CHAPTER - II
1. The minimum number of I/O lines required to interface a 16-key matrix keyboard is ___ [ ]
(a) 16 (b) 8 (c) 4 (d) 15
3. Which of the following memory type is best suitable for development purpose? [ ]
(a) EEPROM (b) Flash (c) UVEPROM (d) MROM
4. Streaming devices (audio) use ________ type of data transfers with USB [ ]
(a) Interrupt (b) Control (c) Isochronous (d) Bulk
7. A device that converts energy from one to another for any measurement or control purpose is
(a) Sensor (b) Transducer (c) Actuator (d) None of the above [ ]
10. The minimum number of interface lines required for implementing I2C are ______ [ ]
(a) 1 (b) 2 (c) 3 (d) 4
11. The maximum number of USB devices that can be connected to a USB host is _______ [ ]
(a) Unlimited (b) 127 (c) 128 (d) None of the above
12. The theoretical maximum data rate supported by GPRS is ________ [ ]
(a) 8 Mbps (b) 12 Mbps (c) 100 Kbps (d) 171.2 Kbps
15. The processor architecture that supports easier instruction pipelining is __________ [ ]
(a) Harvard (b) Von-Neuman (c) Both a & b (d) None of the above
19. Each Bluetooth device will have a ________ bit unique identification number. [ ]
(a) 56 (b) 48 (c) 32 (d) 24
Solutions
1. B 2. B 3. B 4. C 5. D 6. B 7. A 8. D 9. B 10. B
11. B 12. D 13. B 14. C 15. A 16. A 17. C 18. D 19. B 20. A
Fill in the Blanks
1. The microprocessor that has a single bus for instruction and data employs _________________ type
of architecture.
2. In Big Endian Processors, the higher order of data byte is stored at ____________of the memory.
3. The TCP/IP module available from various manufacturers is an example of ____________
component.
4. A Wi-Fi device employs security mechanisms like ________________ and __________________.
5. Flash Memory is organized as ________________ or ______________.
6. The typical erasable speed of Flash is __________________.
7. An SRAM cell can be realized by __________ transistors.
8. In a PC, _______________________ stores the information of hardware configuration.
9. For ___________________ configuration, anode of each LED segment is connected to the port pins
of the port to which the display is interfaced.
10. ________________ are powerful special purpose processors designed to meet computational
demands and power considerations of embedded audio and video applications.
11. SCADA means ____________________________________________________________.
12. Serial Peripheral is _________________________________________ serial interface bus.
13. ______________________ a form of transducer that converts signals to corresponding physical
action.
14. ________________ of an embedded system facilitates the interaction of an embedded system with
external world
15. ________________ acts a dynamic path selector for signals and power
Solutions
1. Von-Neuman 2. Lower address 3. COTS 4. WEP, WPA 5. Sectors (Blocks), Pages
6. 1000 cycles 7. 6 MOSFET’s 8. BIOS 9. Common Cathode
10. DSP 11. Supervisory control and Data Acquisition system
12. Synchronous bidirectional full duplex four wire 13. Transducer 14. I/O Subsystem
15. Relay
SREYAS
INSTITUTE OF ENGINEERING AND TECHNOLOGY
9-39, Sy.No.107, Tattiannaram, G.S.I. Bandlaguda, Nagole, Hyderabad - 500 068.
CHAPTER - III
1. __________ diode is used in Brownout Protection Circuit [ ]
(a) PN (b) Zener (c) Light Emitting (d) None of the above
6. _______________ uses hardware logic for enabling / disabling, resetting the watchdog count
(a) Internal watchdog timer (b) External watchdog timer (c) Both (d) None [ ]
7. The __________ can interrupt the OS kernel by asserting the interrupt line of the processor /
controller to which RTC interrupt line is connected. [ ]
(a) RTC (b) Clock (c) Interrupt (d) Control Signal
9. For conventional processors / controllers the reset signal starts the firmware from ___________
address. [ ]
(a) 0x0000 (b) 0x0001 (c) 0x0008 (d) 0x0010
10. The Power consumed in a processor / controller is ___________ proportional to clock frequency
(a) Equal (b) Directly (c) Indirectly (d) No Relation [ ]
11. For operating system based embedded devices, a timing reference is essential for ____________ the
operations of OS Kernel. [ ]
(a) Pipelining (b) RTC (c) Synchronizing (d) IRQ
18. An embedded firmware design model which executes tasks in infinite loop at predefined order is
called as ___________________. [ ]
(a) Loop Model (b) Super Loop Model (c) Sequential Loop (d) All of the above
20. The software used for linking various object files of a project is called ___________. [ ]
(a) Locator (b) Linker (c) Keil (d) None
Solutions
1. B 2. B 3. B 4. C 5. D 6. D 7. A 8. C 9. A 10. B
11. C 12. A 13. A 14. B 15. B 16. A 17. A 18. B 19. C 20. B
Fill in the Blanks
3. When a reset signal is active low the processor undergoes reset when the reset pin of the processor is
______________________.
Solutions
1. Real Time Clock 2. Watchdog Timer 3. Low / 0 4. PN
5. Unexpected program execution behavior when supply voltage falls below a specified voltage
6. Clock Frequency 7. Assembler 8. Macro 9. Mnemonic
10. Hex File
SREYAS
INSTITUTE OF ENGINEERING AND TECHNOLOGY
9-39, Sy.No.107, Tattiannaram, G.S.I. Bandlaguda, Nagole, Hyderabad - 500 068.
CHAPTER - IV
1. Who determines which task is to be executed at a given point of time? [ ]
(a) Process Manager (b) Context Manager (c) Scheduler (d) None of the above
7. The memory area which holds the program code corresponds to the core OS applications / services is
known as ______________________. [ ]
(a) User Space (b) Kernel Space (c) Share Memory (d) All of the above
8. For a good scheduling algorithm, the Turn Around Time for the process should be ____. [ ]
(a) Minimum (b) Maximum (c) Average (d) Varying
9. Interrupts which occur in sync with the currently executing task are known as _______. [ ]
(a) Asynchronous Interrupts (b) Synchronous Interrupts (c) External Interrupts (d) None
11. The state where a process is incepted into the memory and waiting the processing time for execution
is known as __________________. [ ]
(a) Created State (b) Blocked State (c) Ready State (d) Waiting State
12. Multiple threads of the same process share ____________________. [ ]
(a) Data Memory (b) Code Memory (c) Stack Memory (d) All of the above
13. Which of the following is the POSIX standard library for thread creation and management?
(a) PThreads (b) Threads (c) JThreads (d) None of these [ ]
14. Which of the following are the valid thread binding models for user level to kernel level thread
binding? [ ]
(a) One to Many (b) Many to one (c) One to One (d) Both b & c
15. The CPU allocation for a process may change when it changes its state from _______. [ ]
(a) Running to Ready (b) Ready to Running (c) Running to Blocked (d) All of the above
17. In a commercial RTOS, when an illegal memory access occurs then the kernel enters ___.[ ]
(a) Safe Mode (b) Fail Mode (c) Fail-Safe Mode (d) None of the above
18. Transition of a process from one state to another state is called _______________. [ ]
(a) State Transition (b) Process Transition (c) A or B (d) Both
20. The amount of time taken by the process to complete its execution is called __________. [ ]
(a) Response Time (b) Waiting Time (c) Turn Around Time(d) Throughput
1. C 2. D 3. A 4. D 5. D 6. D 7. B 8. A 9. X 10. C
11. C 12. D 13. A 14. D 15. C 16. D 17. C 18. A 19. B 20. C
Solutions
1. Application Programming Interface 2. Kernel Space 3. Minimum
4. ATM or Audio-Video Playback System 5. Round Robin and Pre-emptive
6. FCFS with Time Slicing 7. As least as possible 8. Throughput 9. Thread Context Switching
10. Portable Operating System Interface 11. Thread 12. Blocked State / Wait State
13. Process Life Cycle 14. Stack Memory 15. Soft Real Time System
SREYAS
INSTITUTE OF ENGINEERING AND TECHNOLOGY
9-39, Sy.No.107, Tattiannaram, G.S.I. Bandlaguda, Nagole, Hyderabad - 500 068.
CHAPTER - V
1. Which of the following techniques is used by operating system for interprocess communication?
(a) Shared Memory (b) Messaging (c) Signaling (d) All of the above [ ]
2. Which of the following is not non-functional requirement of selecting RTOS for embedded design?
(a) After Sales (b) Ease of use (c) Interrupt Latency (d) Cost [ ]
3. Which of the following is functional requirement of selecting RTOS for embedded system design?
(a) Processor Support (b) Memory Requirement (c) Real-Time Capabilities (d) All of these
7. ______________________ contains low level implementations for the onboard peripherals and
OEM adaptation layer.
(a) Board Support Package (b) Board Support Platform (c) Device Drivers (d) All of the
above
10. ______________________ is a sleep and wakeup based mutual exclusion implementation for shared
resource. [ ]
(a) Event (b) Semaphore (c) Signal (d) All of the above
1. A 2. C 3. D 4. B 5. C 6. B 7. A 8. D 9. A 10. B
Fill in the Blanks
1. Drivers which run in user space are known as _________________________________.
2. Stream Sockets supports _________________________ protocols.
3. IPC stands for _________________________________.
4. The Busy Waiting technique uses a lock technique for implementing ________________________ .
5. ________________________ is a (a) synchronous information exchange mechanism used for
Interprocess / thread communication.
6. _________________ is an alternate form of Message queues in RTOS.
7. In object oriented language terminology RPC is also known as __________________ or _________.
8. The process of making processes aware of the access of shared resource by each process to avoid
conflicts is known as _________________________.
9. The situation in which multiple processes compete each other to access and manipulate shared data
concurrently is called _________________________ and they produces incorrect results.
10. ____________________ condition produces a situation where none of the process are able to make
any progress in their execution.
11. A condition similar to deadlock except that a process changes its state with time is ______________.
12. A __________________ refers to a state where a running process is temporarily suspended from
execution and does not have immediate access to resources.
13. The condition in which a process does not get the resources required to continue its execution for a
long time is known as _______________________________________.
14. A thread which produces data is called as _________________________ and the thread which
consumes data is called as __________________________.
15. ________________________ is the by-product of the combination of blocking based process
synchronization and pre-emptive priority scheduling.
Solutions
1. Kernel Mode Drivers 2. TCP / IP 3. Inter Process Communication 4. Mutual Exclusion
5. Message Passing 6. Mail Boxes 7. Remote Invocation or Remote Method Invocation
8. Task / Process Synchronization 9. Racing 10. Deadlock 11. LiveLock 12. Deadlock
13. Starvation 14. Producer Thread, Consumer Thread 15. Priority Inversion