Professional Documents
Culture Documents
reviewer1@nptel.iitm.ac.in ▼
Unit 2 - Week 1
Course
outline Assignment 1
The due date for submitting this assignment has passed. Due on 2018-02-21, 23:59 IST.
How to access
the portal Submitted assignment
https://onlinecourses.nptel.ac.in/noc18_cs12/unit?unit=5&assessment=36 1/3
16/05/2018 Real Time Operating System - - Unit 2 - Week 1
The result produced by the task is discarded if produced after deadline
4) Which one of the following tasks can be considered to be a hard real- 1 point
time task?
The time between a job becoming ready and the job completing
The time between a job starting to execute and the job completing
The time between a job becoming ready and the job being taken up for
execution
The total time a job waits before becoming ready
No, the answer is incorrect.
Score: 0
Accepted Answers:
The time between a job becoming ready and the job completing
7) Given that two tasks have different phases, which one of the 1 point
following can be inferred?
The absolute deadline changes for different task instances, but the
relative deadline is fixed
The relative deadline changes for different task instances, but the
absolute deadline is fixed
Both the relative deadline for different task instances, as well as the
absolute deadline are fixed
https://onlinecourses.nptel.ac.in/noc18_cs12/unit?unit=5&assessment=36 2/3
16/05/2018 Real Time Operating System - - Unit 2 - Week 1
Both the relative deadline as well as the absolute deadline change for
different task instances
No, the answer is incorrect.
Score: 0
Accepted Answers:
The absolute deadline changes for different task instances, but the relative
deadline is fixed
9) Which one of the following is not true of a cyclic scheduler? 1 point
Computationally efficient
Takes very little memory space
Tolerant to changing execution times and periods of tasks
Can be used to schedule tasks with widely varying periods
No, the answer is incorrect.
Score: 0
Accepted Answers:
Tolerant to changing execution times and periods of tasks
10)Suppose a cyclic scheduler is used to schedule a set of periodic real-time tasks {Ti}. The 1 point
execution time, period, and deadline of a task Ti is given by <ei,Pi,di>. If the frame size chosen is F,
then which one of the following must be false?
F>max({ei})
F divides the major cycle
F –(gcd(F,Pi)/2) < di/2 for every task Ti
2×F – gcd(F,Pi) > di for every task Ti
Funded by
Powered by
https://onlinecourses.nptel.ac.in/noc18_cs12/unit?unit=5&assessment=36 3/3
16/05/2018 Real Time Operating System - - Unit 3 - Week 2
reviewer1@nptel.iitm.ac.in ▼
Unit 3 - Week 2
Course
outline Assignment 2
The due date for submitting this assignment has passed. Due on 2018-02-22, 13:29 IST.
How to access
the portal Submitted assignment
Week 1 1) Regarding rate monotonic scheduler (RMS) and earliest deadline first 1 point
scheduler (EDF), which one of the following can be said?
Week 2
EDF is more proficient than RMS
Lecture 6: RMS is more proficient than EDF
Exercises on
RMS and EDF are equally proficient
Frame size
Selection The proficiency of RMS and EDF cannot be compared
Lecture 7 : No, the answer is incorrect.
Event-driven Score: 0
schedulers
Accepted Answers:
Lecture 8 : Rate EDF is more proficient than RMS
Monotonic
Algorithm 2) Which one of the following types of events best define the scheduling 1 point
points for a rate monotonic scheduler
Lecture 9 : RMA
Task
Schedulability
Arrival of task instances
Completion of task instances
Lecture 10 :
Rate Monotonic
Both arrival and completion of task instances
Analysis Interrupts generated from a periodic timer
Feedback for No, the answer is incorrect.
Week 2 Score: 0
Quiz : Accepted Answers:
Assignment 2 Both arrival and completion of task instances
Week 2 Lecture
3) Which one the following is considered as a dynamic priority real-time 1 point
Material
task scheduler?
Assignment-2
Solutions Rate monotonic scheduler
Cyclic scheduler
Week 3
Deadline monotonic scheduler
Week 4 Earliest deadline first scheduler
No, the answer is incorrect.
DOWNLOAD
Score: 0
VIDEOS
Accepted Answers:
Earliest deadline first scheduler
4) Suppose three periodic tasks with execution times of 20 millisecond, 1 point
30 millisecond, and 40 millisecond, and periods of 150 millisecond, 250
millisecond, and 350 millisecond are to be run using a basic table-driven
https://onlinecourses.nptel.ac.in/noc18_cs12/unit?unit=6&assessment=41 1/4
16/05/2018 Real Time Operating System - - Unit 3 - Week 2
scheduler. What is the minimum time period for which the task schedule
should be stored in a schedule table?
750 milliseconds
120 milliseconds
80 milliseconds
5250 milliseconds
No, the answer is incorrect.
Score: 0
Accepted Answers:
5250 milliseconds
5) In a foreground-background scheduler, a background task requiring 1 point
1400 milliseconds is to be run. Two foreground tasks T1 and T2 with execution
times 10 milliseconds and 15 milliseconds and periods of 50 milliseconds and
100 milliseconds respectively are also to be run. Assume all tasks have zero
phasing. What is the expected completion time for the background task?
1792 milliseconds
1876 milliseconds
2018 milliseconds
2154 milliseconds
No, the answer is incorrect.
Score: 0
Accepted Answers:
2154 milliseconds
6) What would be the processor utilization due to the following three 1 point
tasks when run on a uni-processor?
Task Execution Time (in millisec) Period (in millisec) Deadline (in millisec)
T1 10 100 100
T2 20 150 150
T3 5 50 50
0.68
0.44
0.34
0.24
No, the answer is incorrect.
Score: 0
Accepted Answers:
0.34
7) 7. If the tasks shown in the following table are to be run on a 1 point
uniprocessor by a rate monotonic scheduler, which one of the following is a
correct priority assignment to the tasks? Assume that the higher is the priority
value assigned to a task, the lower is its priority.
Task Execution Time (in millisec) Period (in millisec) Deadline (in millisec)
T1 10 100 100
T2 20 150 150
T3 5 50 50
https://onlinecourses.nptel.ac.in/noc18_cs12/unit?unit=6&assessment=41 2/4
16/05/2018 Real Time Operating System - - Unit 3 - Week 2
1
0.87
0.73
0.69
9) Which one of the following is not true of the EDF (Earliest Deadline 1 point
First) scheduling algorithm?
O(n)
O(n2)
O(logn)
O(nlogn)
No, the answer is incorrect.
Score: 0
Accepted Answers:
O(nlogn)
https://onlinecourses.nptel.ac.in/noc18_cs12/unit?unit=6&assessment=41 3/4
16/05/2018 Real Time Operating System - - Unit 3 - Week 2
Funded by
Powered by
https://onlinecourses.nptel.ac.in/noc18_cs12/unit?unit=6&assessment=41 4/4
16/05/2018 Real Time Operating System - - Unit 4 - Week 3
reviewer1@nptel.iitm.ac.in ▼
Unit 4 - Week 3
Course
outline Assignment 3
The due date for submitting this assignment has passed. Due on 2018-02-28, 23:59 IST.
How to access
the portal Submitted assignment
Week 1 1) Consider a certain application in which two periodic real-time tasks 1 point
are to be run on a uniprocessor using a rate monotonic scheduler. What should
Week 2 be the maximum processor utilization due to the two tasks, if it is required that
the two tasks should run without missing any deadlines?
Week 3
0.88
Lecture 11 : 0.82
RMA
0.76
Generalizations
0.73
Lecture 12 :
Further RMA No, the answer is incorrect.
Generalizations Score: 0
Lecture 13 : Accepted Answers:
Resource 0.82
Sharing among
Real-Time 2) Suppose a single periodic real-time task is to be run on a uniprocessor 1 point
Tasks using a rate monotonic scheduler. For the task to run without missing any
Lecture 14 : deadlines, what should be the maximum processor utilization due the task?
Solution to
Priority 1
Inversion 0.88
Problem
0.82
Lecture 15 : 0.76
Highest Locker
Protocol No, the answer is incorrect.
Feedback for
Score: 0
Week 3 Accepted Answers:
Quiz :
1
Assignment 3
3) Consider a periodic task set whose characteristics are shown in the 1 point
Week 3 Lecture following table. Would this task set be schedulable on a uniprocessor under
Material rate monotonic scheduling based on the Liu-Layland criterion for determining
Assignment-3
schedulability?
Solutions Task Set (All data in milliseconds)
https://onlinecourses.nptel.ac.in/noc18_cs12/unit?unit=7&assessment=42 1/4
16/05/2018 Real Time Operating System - - Unit 4 - Week 3
Task3 100 20 50 50
20 milliseconds
40 milliseconds
60 milliseconds
70 milliseconds
No, the answer is incorrect.
Score: 0
Accepted Answers:
60 milliseconds
5) Consider an application in which a set of periodic real-time tasks 1 point
share a set of non-preemptable resources and are scheduled using a rate
monotonic scheduler. Which one of the following problems cannot be
completely prevented even when choice can be made from any of the
available resource sharing protocols?
Deadlock
Chain blocking
Priority inversion
Unbounded priority inversion
No, the answer is incorrect.
Score: 0
Accepted Answers:
Priority inversion
6) Which one of the following is the closest definition of a critical 1 point
section?
https://onlinecourses.nptel.ac.in/noc18_cs12/unit?unit=7&assessment=42 2/4
16/05/2018 Real Time Operating System - - Unit 4 - Week 3
7) Consider an application in which a set of periodic real-time tasks 1 point
share a set of non-preeemptable resources and are scheduled using a rate
monotonic scheduler incorporating the basic priority inheritance protocol.
Which one of the following problems cannot occur in this situation?
Deadlock
Chain blocking
Priority inversion
Unbounded priority inversion
No, the answer is incorrect.
Score: 0
Accepted Answers:
Unbounded priority inversion
8) Assume that four periodic real-time tasks T1, T2, T3, and T4 share three non- 1 point
preemptable resources R1, R2, and R3 as shown in the following diagram. The
time for which each task needs a resource is annotated on the arrow connecting the task
to the corresponding resource. The tasks are arranged in decreasing order of their
priorities, with T1 being the highest priority task and T4 the lowest priority task. The tasks
are scheduled using a rate monotonic scheduler incorporating the basic priority
inheritance protocol. Which tasks would undergo direct blocking?
5 units
2 units
10 units
It does not undergo any direct inversion
https://onlinecourses.nptel.ac.in/noc18_cs12/unit?unit=7&assessment=42 3/4
16/05/2018 Real Time Operating System - - Unit 4 - Week 3
No, the answer is incorrect.
Score: 0
Accepted Answers:
10 units
10)Assume that four periodic real-time tasks T1, T2, T3, and T4 share three non- 1 point
preemptable resources R1, R2, and R3 as shown in the following diagram. The
time for which each task needs a resource is annotated on the arrow connecting the task
to the corresponding resource. The tasks are arranged in decreasing order of their
priorities, with T1 being the highest priority task and T4 the lowest priority task. The tasks
are scheduled using a rate monotonic scheduler with the basic priority inheritance
protocol. The task T3 would undergo inheritance blocking due to which tasks?
T1
T2
T4
Both T2 and T4
No, the answer is incorrect.
Score: 0
Accepted Answers:
T4
Funded by
Powered by
https://onlinecourses.nptel.ac.in/noc18_cs12/unit?unit=7&assessment=42 4/4
16/05/2018 Real Time Operating System - - Unit 5 - Week 4
reviewer1@nptel.iitm.ac.in ▼
Unit 5 - Week 4
Course
outline Assignment 4
The due date for submitting this assignment has passed. Due on 2018-03-07, 23:59 IST.
How to access
the portal Submitted assignment
Week 1 1) ssume that four periodic real-time tasks T1, T2, T3, and T4 share 1 point
three non-preemptable resources R1, R2, and R3 as shown in the following
Week 2 diagram. The time for which a task needs a resource is annotated on the arrow
connecting the task to the resource. The tasks are arranged in decreasing
Week 3 order of their priorities. That is, T1 is the highest priority task and T4 is the
lowest priority task. The tasks are scheduled using a rate monotonic scheduler
Week 4 incorporating the basic priority inheritance protocol. What is the maximum
duration for which the task T3 would undergo inheritance blocking?
Lecture 16 :
Priority Ceiling
Protocol
Lecture 17 :
PCP Priority
Inversions
Lecture 18 :
Analysis of PCP
priority
inversions
5 units
Lecture 19 :
Some basic 8 units
issues in Real- 13 units
Time Operating
1 unit
Systems
Lecture 20 :
No, the answer is incorrect.
Unix as a Real- Score: 0
Time operating Accepted Answers:
System
5 units
Feedback for
Week 4 2) Assume that four periodic real-time tasks T1, T2, T3, and T4 share 1 point
three non-preemptable resources R1, R2, and R3 as shown in the following
Quiz : diagram. The time for which each task needs a resource is annotated on the
Assignment 4
arrow connecting the task to the resource. The tasks are arranged in
Week 4: Lecture decreasing order of their priorities. That is, T1 is the highest priority task and
Material T4 is the lowest priority task. The tasks are scheduled using a rate monotonic
Assignment-4 scheduler that incorporates the highest locker protocol for supporting
Solutions
DOWNLOAD
VIDEOS
https://onlinecourses.nptel.ac.in/noc18_cs12/unit?unit=8&assessment=43 1/5
16/05/2018 Real Time Operating System - - Unit 5 - Week 4
resource sharing. What will be the ceiling priority of the resource R1?
Priority of T1
Priority of T2
Priority of T3
Priority of T4
No, the answer is incorrect.
Score: 0
Accepted Answers:
Priority of T1
3) Assume that four periodic real-time tasks T1, T2, T3, and T4 share 1 point
three non-preemptable resources R1, R2, and R3 as shown in the following
diagram. The time for which each task needs a resource is annotated on the
arrow connecting the task to the resource. The tasks are arranged in
decreasing order of their priorities. That is, T1 is the highest priority task and
T4 is the lowest priority task. The tasks are scheduled using a would undergo
direct blocking?
https://onlinecourses.nptel.ac.in/noc18_cs12/unit?unit=8&assessment=43 2/5
16/05/2018 Real Time Operating System - - Unit 5 - Week 4
Accepted Answers:
Too much overhead in recomputing changed task and ceiling priorities
5) Which one of the following is false regarding the utilization-balancing 1 point
algorithm for task allocation in multiprocessors?
https://onlinecourses.nptel.ac.in/noc18_cs12/unit?unit=8&assessment=43 3/5
16/05/2018 Real Time Operating System - - Unit 5 - Week 4
5
8
10
0
No, the answer is incorrect.
Score: 0
Accepted Answers:
8
10)Assume that four periodic real-time tasks T1, T2, T3, and T4 share 1 point
three non-preemptable resources R1, R2, and R3 as shown in the following
diagram. The time for which a task needs a resource is annotated on the arrow
connecting the task to the resource. The tasks are arranged in decreasing
order of their priorities. That is, T1 is the highest priority task and T4 is the
lowest priority task. The tasks are scheduled using a rate monotonic scheduler
incorporating the priority ceiling protocol (PCP) for resource sharing. Which
task would not suffer any avoidance related inversions?
T1
T2
T3
T4
No, the answer is incorrect.
Score: 0
https://onlinecourses.nptel.ac.in/noc18_cs12/unit?unit=8&assessment=43 4/5
16/05/2018 Real Time Operating System - - Unit 5 - Week 4
Accepted Answers:
T4
Funded by
Powered by
https://onlinecourses.nptel.ac.in/noc18_cs12/unit?unit=8&assessment=43 5/5
Embedded Systems-- Design Verification and Tes... https://onlinecourses.nptel.ac.in/noc18_cs54/uni...
reviewer3@nptel.iitm.ac.in ▼
Unit 1 - How to
access the portal
Course
outline
Assignment-00
The due date for submitting this assignment has passed.
How to access As per our records you have not submitted this Due on 2018-07-29, 23:59 IST.
the portal assignment.
How to access 1) How many full adders and half adders are required to construct an m-bit parallel adder? 1 point
the home
page?
m/2 full adders and m/2 half adders
How to access
the course m half adders
page?
m-1 full adders and 1 half adder
How to access
m+1 half adders
the MCQ, MSQ
and No, the answer is incorrect.
Programming
Score: 0
assignments?
Accepted Answers:
Quiz :
m-1 full adders and 1 half adder
Assignment-00
2) How many types of flip-flops are generally used? 1 point
Introduction and
Modeling
2
Modeling and 3
Synthesis
issues 4
5
Architectural
Synthesis of No, the answer is incorrect.
Hardwares
Score: 0
3) How many inputs and outputs does a D flip-flop has (excluding the clock) 1 point
Temporal Logic
Funded by
Embedded
System X/4 MHz
Hardware X/8 MHz
Testing - II
X/32 MHz
Advances in
Embedded X/320 MHz
System
No, the answer is incorrect.
Hardware
Testing Score: 0
Accepted Answers:
Advances in X/320 MHz
Embedded
System 5) Which of the following describes most appropriately a “shift register”? 1 point
Hardware
Testing - II The register that can shift information bits to another register
Testing for The register that can shift information bits either to the right or to the left
Embedded
The register that can shift information bits to the right only
Software
Systems The register that can shift information bits to the left only
6) Which among the following is the queue that keeps the processes that are residing in main 1 point
memory and are ready and waiting to be executed?
job queue
ready queue
execution queue
process queue
7) Which of the scheduling algorithms mentioned below works by allocating the CPU first to 1 point
the process that requests the CPU first?
priority scheduling
8) One of the following statements best describes the disadvantage of priority based 1 point
scheduling algorithm
May lead to some low priority process waiting indefinitely for the CPU
Regular Language
10)In the formal definition of a deterministic finite state machine the number of tuples required 1 point
is
reviewer3@nptel.iitm.ac.in ▼
Unit 2 -
Introduction and Modeling
Course
outline
Assignment-1
The due date for submitting this assignment has passed.
How to access As per our records you have not submitted this Due on 2018-08-15, 23:59 IST.
the portal assignment.
Funded by
The softwarePowered
that controls
by the engines of an aircraft
Advances in
Embedded 4) Consider an embedded system with an aperiodic control task which arrives at time instant 2 1 point
System
(from system start) and requires 4 time units to complete execution. The processor starts executing this
Hardware
Testing job 2 time units subsequent to its arrival. What is the response time for this job?
Advances in 2
Embedded
4
System
Hardware 6
Testing - II
8
Testing for
No, the answer is incorrect.
Embedded
Software Score: 0
Systems Accepted Answers:
6
5) Design a mealy-type FSM to check whether a given integer is divisible by 3. What is the 1 point
minimum number of states required for this design?
States
Transitions
FSM
FSMD
HCFSM
PSM
Concurrency
Precedence
Hierarchy
Abstraction
9) Accurate estimates on execution times are difficult to obtain in embedded systems due to: 1 point
External inputs/outputs
reviewer3@nptel.iitm.ac.in ▼
Unit 3 -
Modeling and Synthesis issues
Course
outline
Assignment-2
The due date for submitting this assignment has passed.
How to access As per our records you have not submitted this Due on 2018-08-22, 23:59 IST.
the portal assignment.
Introduction and 1) Consider the transition diagram of DES G1 and G2 shown in the figure. 2 points
Modeling
Modeling and
Synthesis
issues
Compute the synchronous parallel composition of G1 and G2. The total number of (reachable
Modeling / accessible) states in the composite model G1||G2 is:
Techniques – 2
6
Hardware/Software
Partitioning - 1 9
Hardware/Software 5
Partitioning - 2
4
Introduction to
Hardware No, the answer is incorrect.
Design
Score: 0
Quiz : Accepted Answers:
Assignment-2
5
Architectural 2) 2 points
Synthesis of
Hardwares
System-level
Design
Temporal Logic
Model Checking Consider the task graph shown above in which all edges are of unit cost. An initial hardware-software
partition for the task graph is also shown through the cut line. With this as an input, a correct
BDD and enumeration of the vertices on each side of the partition after the second iteration of the inner repeat
Symbolic Model
loop in the Kernighan-Lin (KL) algorithm is:
© 2014 NPTEL - Privacy & Terms - Honor Code - FAQs -
A project of In association with
Funded by
Advances in -2
Embedded
2
System
Hardware -1
Testing
1
Advances in
No, the answer is incorrect.
Embedded
System Score: 0
Hardware Accepted Answers:
Testing - II
-2
Testing for 4) RTL (Register Transfer Logic) design is obtained as an output of the_______phase 2 points
Embedded
Software
Architectural Synthesis
Systems
Logic Synthesis
Geometrical Synthesis
High-Level Synthesis
5) Registers are connected to functional units via______and functional units are connected 2 points
to registers via______
MUXs, DMUXs
DMUXs, MUXs
reviewer3@nptel.iitm.ac.in ▼
Unit 4 -
Architectural Synthesis of Hardwares
Course
outline
Assignment-3
The due date for submitting this assignment has passed.
How to access As per our records you have not submitted this Due on 2018-09-05, 23:59 IST.
the portal assignment.
Introduction and
Modeling
Modeling and
Synthesis
issues
Architectural
Synthesis of
Hardwares
Hardware
Architectural
Synthesis – 1
Hardware
Architectural
Synthesis – 2
Hardware
Architectural
Synthesis – 3
Hardware
Architectural
Synthesis – 4
Hardware
Architectural Consider the Operation Constraints Graph (OCG) shown in the figure above. Each addition
Synthesis – 5 operation takes unit time. The latency bound is 4. There are no resource constraints.
Hardware
Architectural 1) The correct ALAP schedule is: 1 point
Synthesis – 6
Quiz : © 2014C-step
NPTEL1:- 1, 2, 3, 4.
Privacy C-step- 2:
& Terms 5. C-step
Honor Code 3: 6. C-step
- FAQs - 4: 7
Assignment-3
A project of
C-step 1: 1. C-step 2: 2, 3, In
4. association
C-step 3: 5,with
6. C-step 4: 7
System-level No, the answer is incorrect.
Design
Score: 0
Funded by
Accepted Answers:
C-step 1: 1, 2. C-step by
Powered 2: 3, 4. C-step 3: 5, 6. C-step 4: 7
Temporal Logic
2) The mobility for each node (from 1 to 7) in OCG is: 1 point
Model Checking
0, 1, 0, 0, 0, 1, 0
BDD and
Symbolic Model 0, 1, 1, 0, 1, 0, 0
Checking
0, 0, 1, 0, 1, 0, 0
Introduction to 0, 0, 1, 0, 1, 1, 0
Digital Testing
No, the answer is incorrect.
Embedded Score: 0
System Accepted Answers:
Hardware
0, 0, 1, 0, 1, 0, 0
Testing
3) A valid list schedule for the OCG assuming only one adder resource is: 1 point
Embedded (Note: Assume the priority of a operation as (1 / (mobility + 1))).
System
Hardware
Testing - II 1, 2, 4, 6, 3, 5, 7
1, 2, 3, 4, 5, 6, 7
Advances in
Embedded 1, 2, 4, 3, 6, 5, 7
System
Hardware 1, 2, 3, 5, 4, 6, 7
Testing
No, the answer is incorrect.
Score: 0
Advances in
Embedded Accepted Answers:
System 1, 2, 4, 6, 3, 5, 7
Hardware
Testing - II 4) A new addition (+) operation having index-9 has been introduced to the OCG. This newly 1 point
included operation takes the output of operations 1 and 3 as input and floats its output on operation 7.
Testing for What will be minimum number of resources (i.e., adders) required to schedule this modified OCG with
Embedded a latency bound of 4.
Software
Systems
1
5) Consider the modified OCG discussed in Q4. Let binary decision variables of type x(i,j) 3 points
denote the assignment of operation-i at time step-j. x(i,j) is 1 if operation-i is scheduled at time step-j.
x(i,j) is 0 otherwise. There are two adders and latency bound is 5. Determine the correct inequality
representing the resource constraint at time step 2.
6) Consider the modified OCG discussed in Q4 and Q5. Determine the correct inequality 3 points
representing the dependency constraint between operations 9 and 3.
reviewer3@nptel.iitm.ac.in ▼
Unit 5 -
System-level Design
Course
outline
Assignment-4
The due date for submitting this assignment has passed.
How to access As per our records you have not submitted this Due on 2018-09-05, 23:59 IST.
the portal assignment.
Introduction and 1) Consider a set of 6 tasks, T1 (1, 5), T2 (2, 10), T3 (3, 15), T4 (3, 15), T5 (2, 5), and T6 (1, 2 points
Modeling 5), to be executed on two unit capacity processors using either Pfair or ERfair scheduling schemes.
Modeling and Notation: Tk (e, p) denotes a task Tk with execution time “e” and period “p”.
Synthesis
issues
What is the pseudo-deadline of second subtask of task T5 when scheduled using ERfair?
Architectural
Synthesis of 5
Hardwares
8
System-level 10
Design
7
System Level
Analysis
No, the answer is incorrect.
Score: 0
Uniprocessor
Scheduling – 1
Accepted Answers:
5
Uniprocessor
Scheduling – 2 2) Consider a set of 7 tasks, T1 (3, 10), T2 (10, 20), T3 (10, 20), T4 (6, 10), T5 (5, 10), T6 (8, 2 points
20), and T7 (2, 10) to be executed on three unit capacity processors using DPfair scheduling scheme.
Multiprocessor
Scheduling – 1
Notation: Tk (e, p) denotes a task Tk with execution time “e” and period “p”.
Multiprocessor
Scheduling – 2
What is the workload of task T6 for the first time-slice?
Quiz :
Assignment-4 5
Temporal Logic 6
3
Model Checking
4
BDD and
© 2014 NPTEL - Privacy & Terms - Honor Code - FAQs -
A project of In association with
Funded by
Embedded
System
Hardware
Testing - II
Advances in
Embedded
System
What is the response time of job J1, J2 and J3, respectively?
Hardware
Testing
Advances in 0, 4, 5
Embedded
System 10, 3, 10
Hardware 23, 3, 12
Testing - II
33, 28, 29
Testing for
Embedded No, the answer is incorrect.
Software Score: 0
Systems
Accepted Answers:
23, 3, 12
1 and 2
2 and 4
1 and 3
3 and 4
5) Consider a uniprocessor system processing three (implicit-deadline) periodic tasks T1, T2, 2 points
and T3, respectively. The task parameters are listed in the following table.
This task set is _________ under Rate-Monotonic (RM), and ___________ under Earliest-Deadline
First (EDF) algorithms?
Schedulable, Unschedulable
Schedulable, Schedulable
Unschedulable, Unschedulable
Unschedulable, Schedulable
reviewer3@nptel.iitm.ac.in ▼
Unit 6 -
Temporal Logic
Course
outline
Assignment-5
The due date for submitting this assignment has passed.
How to access As per our records you have not submitted this Due on 2018-09-12, 23:59 IST.
the portal assignment.
Temporal Logic 2) Which are the inputs to a particular model checking / verification tool? 1 point
Introduction
Model and Error Trace
and Basic
Operators of Specification and Error Trace
Temporal Logic
Model and Specification
Syntax and
Semantics of Model, Error Trace, and Specification
CTL
No, the answer is incorrect.
Quiz : Score: 0
Assignment-5
Accepted Answers:
Model Checking Model and Specification
3) Given a model M and for a temporal formula φ, where (M, Sj) |= φ, which of the following 1 point
BDD and
Symbolic Model is FALSE?
Checking
φ does not strictly hold statically in a model M.
Introduction to
φ holds for the state Sj in the model M.
© 2014 NPTEL - Privacy & Terms - Honor Code - FAQs -
A project of In association with
Funded by
Advances in If Q is TRUE in a state, then P is TRUE for all of its future states
Embedded
System Q is TRUE for all the future states
Hardware
Testing P and Q are TRUE for all the future state
Xp Λ XXp
Xp Λ !XXp
Xp V XXp
Q holds either in the present and previous states or in all the future states
XP V XXP <=> P is TRUE in the next state or the next but one.
10)Which of the following statements is a strict condition for a CTL formula? 1 point
AF EG p
A [p U A[q U r]]
EFGr
EGp V E(q U r)
AEFr
F [ r U q]
AG ¬(p Λ q)
A [p U q U r]
16)Which one of the following state transition diagrams represents the given Kripke structure 1 point
< S, ->, L > specified below?
Score: 0
Accepted Answers:
17) Which satisfaction relation(s) is/are true in the following Kripke 1 point
structure
Both b and c
18)For the following state transition diagram, which of the following options hold TRUE value 1 point
for the states {S0,S1,S2,S3}?
qVr
pΛq
pVr
pΛr
19) For the below diagram, which of the states have TRUE value for A (p U q)? 0 points
{ S0 }
{ S1 }
{ S0,S1 }
{ S 1, S 3, S 4, S 6 }
Score: 0
Accepted Answers:
{ S 1, S 3, S 4, S 6 }
reviewer3@nptel.iitm.ac.in ▼
Introduction and 1) Which of the following equivalences is wrong for the temporal operators? 1 point
Modeling
AFφ = ¬EG¬φ
Modeling and
¬AFφ = EG¬φ
Synthesis issues
EFφ = ¬AF¬φ
Architectural
Synthesis of ¬EFφ= AG¬φ
Hardwares
No, the answer is incorrect.
Score: 0
System-level Design
Accepted Answers:
Temporal Logic EFφ = ¬AF¬φ
Equivalence EX, AU
between CTL
formulas EX, AU, and EU
Embedded System AGφ, EGφ, AFφ, and EFφ can be written in terms of AUφ and EUφ
Hardware Testing
AXφ can be written with EGφ
Embedded System
EXφ, EGφ (AFφ) and E(φ U p) is an adequate set of operators
Hardware Testing - II
AXφ can be written with EXφ
Advances in
Embedded System No, the answer is incorrect.
Hardware Testing Score: 0
Accepted Answers:
Advances in
AXφ can be written with EGφ
Embedded System
Hardware Testing - II 4) If the future temporal operator (F) includes the present, then which of the following equivalences is true? 1 point
EFp = p V EX EFp
Powered by
5) Let p and q are atomic propositions. Which of the following pairs of CTL formulae is not equivalent? 1 point
8) What are the inputs and outputs for the labelling algorithm for model checking? 1 point
INPUTS = Set of states which satisfy φ and a CTL Formula φ. OUTPUT = A CTL Model M = (S, ->, L).
INPUTS = A CTL Model M = (S, ->, L) and a Set of states which satisfy φ. OUTPUT = CTL Formula φ.
INPUTS = A CTL Model M = (S, ->, L) and a CTL Formula φ. OUTPUT = Set of states which satisfy φ.
INPUTS = A CTL Model M = (S, ->, L). OUTPUT = A CTL Formula φ.
No, the answer is incorrect.
Score: 0
Accepted Answers:
INPUTS = A CTL Model M = (S, ->, L) and a CTL Formula φ. OUTPUT = Set of states which satisfy φ.
9) Which of the following is not a subformula of the CTL Formula AGp Λ AGq 1 point
AG p
pΛq
11)SATEX(p) is a function that determines the set of states satisfying EXp. In the given figure, SAT(p) = {S4, S6}. 1 point
What is SATEX(p)?
{S1, S3}
{S1}
12)SATAF(p) is a function that determines the set of states satisfying AFp. In the given figure, SAT(p) = {S4, S6}. 1 point
What is SATAF(p)?
{S0}
{S1, S3}
13)Let SATEU(p,q) be a function that determines the set of states satisfying E(p U q). In the given figure, SAT(p) = 1 point
{S1, S2} and SAT(q) = {S3}. Now, What is SATEU(p,q)?
{S3}
{S1, S2}
AF ( p ) = E[ T U p ]
AF (p ) = p V AXAF (p)
EF ( p ) = p V AXAF (p)
AF (p ) = p Λ AXAF (p)
15)Consider the mutual exclusion example with 4 processes, P1, P2, P3, and P4. The atomic propositions for Pi 1 point
are ni, ti and ci , where 1 = i = 4. What is the CTL formula to represent Safety property?
AG ¬((c1 Λ c2) V c3 V c4 )
AG ¬ (c1 Λ c2 Λ c3 Λ c4)
16)Consider the model M shown in the figure. p is an atomic proposition. Determine the set of states satisfying AXp 1 point
using model checking algorithm, where
S4, S7, S1
S1, S3, S7
S1, S3, S5
S3, S4, S7
17)Consider the model M shown in the figure. p and q are atomic propositions. Determine the set of states 1 point
satisfying E(pUq) using model checking algorithm.
S3, S4, S5
S1, S4
18)Consider the model M shown in the figure. p and q are atomic propositions. Determine the set of states 1 point
satisfying AF(¬p Λ q) using model checking algorithm.
S3
S3, S4, S1
S3, S4
S4
reviewer3@nptel.iitm.ac.in ▼
Unit 8 - BDD
and Symbolic Model Checking
Course
outline
Assignment-7
The due date for submitting this assignment has passed.
How to access As per our records you have not submitted this Due on 2018-09-19, 23:59 IST.
the portal assignment.
Introduction and 1) Binary Decision Diagram (BDD) construction of a Boolean expression is based on 1 point
Modeling _____________.
POS representation
Architectural
Synthesis of Both b & c
Hardwares
No, the answer is incorrect.
System-level Score: 0
Design
Accepted Answers:
Shannon expansion
Temporal Logic
2) How many nodes are required to create a Binary Decision Tree having 4 variables? 1 point
Model Checking
24
BDD and
Symbolic Model 25
Checking
25-1
Binary Decision
24-1
Diagram
No, the answer is incorrect.
Use of OBDDs
for State Score: 0
Transition Accepted Answers:
System
25-1
Symbolic Model
3) Find the number of terminal nodes of a Boolean function f(a,b,c)=a’b+abc+b’c’ in BDT and 1 point
Checking
BDD representation.
Quiz :
Assignment-7
BDT=5, BDD=5
Funded by
Accepted Answers:
Powered by
Embedded
BDT=8, BDD=2
System
Hardware
4) Which Boolean function is represented by the given ROBDD? 1 point
Testing - II
Advances in
Embedded
System
Hardware
Testing
Advances in
Embedded
System
Hardware
Testing - II
Testing for
Embedded
Software
Systems
f = b’+a’c’
f = a’+b’c’
f = a’b’+c’
f = a’+b’+c’
5) Which one is the ROBDD for the given Boolean expression f=abc+a’c’? Assume variable 1 point
ordering is <a,b,c>
6) Which among the following are false for the given BDD, where 0 points
path 1 : x-y-z-y-1
path 2 : x-y-z-y-0
7) What will be the optimal ordering of variables for the Boolean function f=ab+a’c+bc’d? 1 point
<a,b,c,d>
<a,c,d,b>
<a,b,d,c>
<a,c,b,d>
8) Let BX and BY are two ROBDDs representing Boolean function f(a,b,c)=a'b+ac+bc' with 1 point
variable ordering <a, b, c> and <c, a, b> respectively. The number of nodes in B X and BY are :
BX=5, BY=5
BX=5, BY=6
BX=6, BY=5
BX=6, BY=6
BX=6, BY=5
9) Consider the Boolean function of 2-bit comparator, f(a1,a2,b1,b2)= (a1 XNOR b1) . (a2 1 point
XNOR b2). Consider a ROBDD that represents f with variable ordering < a1, a2, b1, b2>. How many
nodes will this ROBDD have?
10
11
12
14
10)Consider the Boolean function f(a,b,c,d)= ab'c + ab + c'd+ bcd. Construct ROBDD B f to 1 point
represent f. Assume order of variables is <a, b, c, d>. The number of nodes in B f is:
11)Consider the boolean function in the question 10. Construct ROBDDs BX and BY to 1 point
represent restrict (0,c,Bf) and restrict(1,c,Bf), respectively. Assume order of variables is <a, b, c, d>.
The number of nodes in BX and BY are:
BX = 5, BY = 5
BX = 6, BY = 5
BX = 5, BY = 6
BX = 6, BY = 6
12)Consider the ROBDDs constructed in question 11 using the Boolean function given in 1 point
question 10. Construct ROBDD Bz to represent exists(c,Bf) using Bx and By. Assume order of variables
is <a, b, c, d>. The number of nodes in Bz are:
13)Let f(x, y) = x(y + x') be a Boolean function. What will be the restrictions of f with respect to 1 point
x, if x=0. and x=1 respectively?
0, xy
x', xy
0, y
x', x+y
Pre∀(X) = S- Pre∃(X)
Pre∀(X) = S- Pre∃(S-X)
Pre∃(X)= S-Pre∀(X-S)
Pre∃(X)= S-Pre∀(S-X)
15)What is Pre∃(X) for the given state transition diagram where S={x1,x2,y1,y2,y3,y4} and 1 point
X={y2,y3}?
{x2,y1,y2,y3}
{x2,x1,y1,y3}
{x2,y1,y3}
{y1,y3,y4}
16)What is Pre∀(X) for the state transition diagram shown in Question 15? 1 point
{x2,y1}
{x2,y1,y3}
{x1,x2,y3}
{x1,x2,y1,y3}
17)Which of the following symbolic model checking function returns Pre∃(Bφ), where Bφ is the 1 point
OBDD for set of states where φ is true?
EF(Bφ)
AF(Bφ)
AG(Bφ)
EX(Bφ)
reviewer3@nptel.iitm.ac.in ▼
Unit 9 - Introduction to
Digital Testing
2) Figure below illustrates the process of Embedded Systems Design and Test flow. What is the block marked 1 point
Model Checking
“1” in the figure?
BDD and Symbolic
Model Checking
Introduction to
Digital Testing
Introduction to
Digital VLSI Testing
Automatic Test
Pattern Generation
(ATPG)
Quiz :
Assignment-8
Embedded System
Hardware Testing
Embedded System
Hardware Testing - II
Test Response storage
Advances in Integration
Embedded System
Hardware Testing Test Response compressor
Powered by
None
Digital
Analog
5) For an n-input circuit, ____ test patterns are needed for functional testing. 1 point
2n
n2
2n
6) A circuit with n nets can have ___ possible stuck-at faults under single stuck-at fault model. 1 point
2n
n2
infinite
2n
7) How many test patterns are needed to test the circuit given in the figure below? Assume that structural 0 points
testing with single stuck at fault model is used.
25
60
192
160
8) Functional and structural testing of the 32-Bit adder circuit shown below needs ____ and ____ test patterns, 1 point
respectively.
265, 23
2 * 65, 23
265, 2 * 3
65, 3
9) How many stuck-at faults are possible in the AND-gate shown below? 1 point
12
11
10
10)A net having fan-out to k gates will have ___ stuck at fault locations 1 point
k+1
k-1
2k
None
Few faults are “easy to test” and most others are “difficult to test”
Most faults are “easy to test” and few are “difficult to test”
12)The test patterns for “easy to test faults” are derived by ____ 1 point
13)The test patterns for “difficult to test faults” are derived by ____ 1 point
14)Let us consider a 2-input AND gates shown in figure below where the inputs are marked using notations 1 point
from Roth’s 5-valued algebra. What is the output notation at the ? marked net i.e., output of gate G1?
15)Consider figure of Question 14. What is the output notation at the ? marked net i.e., output of gate G2? 1 point
D̅
D
17)If one wants to take the path “e-f-g-h” in the figure below for propagating the fault effect to the output h. The 1 point
signals labelled as 1, 2, 3 in the nets of the path are assigned in terms of Roth’s 5 valued algebra. The signal value of the
net labelled with 1 is _____.
reviewer3@nptel.iitm.ac.in ▼
Unit 10 -
Embedded System Hardware Testing
Course
outline
Assignment-9
The due date for submitting this assignment has passed. Due on 2018-10-03, 23:59 IST.
How to access As per our records you have not submitted this assignment.
the portal
1) To test the sequential circuits, the number of test patterns are required in time frame expansion 1 point
Introduction and method is:
Modeling
No. of primary inputs
Modeling and
Synthesis issues dseq+ 1
Scan Chain 3) With set/reset flip-flops, how many patterns are required to test a fault in sequential circuits? 1 point
based
Sequential
1
Circuit Testing
(Contd. from dseq + 1
Previous
Module) 2
Software- dseq
Hardware
Funded by
Quiz : Powered by
A requirement of a package of thousands of I/O pins, which makes it impractical.
Assignment-9
A shift register is used and loads itself with the pattern required for setting the flip-flops
Embedded
System Hardware Only 3 extra I/O lines are required for testing a fault
Testing - II
Both b & c are TRUE
test out
6) Which of the following is FALSE for Scan Chain based Testing? 1 point
The flip-flops in the circuit are converted under test itself to a shift register
In test mode, the flip-flops are decoupled from the circuit and they are connected in form of a shift
register
if there are nff flip-flops, then nff clock pulses are required to set/reset the flip-flops
Accepted Answers:
Minimizes test pattern generation time
9) For the sequential circuit shown below, Which of the following is TRUE? 1 point
reviewer3@nptel.iitm.ac.in ▼
Unit 11 -
Embedded System Hardware Testing - II
Course
outline
Assignment-10
The due date for submitting this assignment has passed.
How to access As per our records you have not submitted this Due on 2018-10-10, 23:59 IST.
the portal assignment.
Introduction and 1) The components of Scalable Core Test Architecture are: 1 point
Modeling
Test Access Mechnism
Modeling and
Synthesis Wrapper
issues
Source and Sink for test stimuli and responses
Model Checking Transports test responses from the CUT to the test sink.
Embedded INTEST
System
Hardware XTEST
Testing - II
BYPASS
Testing for © 2014 NPTEL - Privacy & Terms - Honor Code - FAQs -
All the above
embedded
A project of In association with
cores
No, the answer is incorrect.
Memory Testing Score: 0
6) The state transition diagram shown in the below figure corresponds to which fault in a 1 point
memory?
Accepted Answers:
Down transition fault in a memory cell
7) From the context of memory testing, the types of faults considered in address decoder are: 1 point
Testing memory
OR Bridging faults
Both b & c
reviewer3@nptel.iitm.ac.in ▼
Unit 12 -
Advances in Embedded System Hardware Testing
Course
outline
Assignment-11
The due date for submitting this assignment has passed.
How to access As per our records you have not submitted this Due on 2018-10-17, 23:59 IST.
the portal assignment.
Introduction and 1) Which of the following is TRUE about Delay faults? 1 point
Modeling
Stuck-at fault model generally do not verify the timing correctness
Modeling and
Synthesis Real time embedded systems require path delay fault models to test the delay faults
issues
For high speed circuits stuck-at fault model do not cover much delay faults.
Model Checking Clock period > the propagation delay of all paths
Quiz :
Assignment-11
Advances in
Embedded
System
Hardware 1+x
Testing - II
1 + x + x4
Testing for
1 + x3 + x4
Embedded
Software 1 + x2 + x3
Systems
No, the answer is incorrect.
Score: 0
Accepted Answers:
1 + x3 + x4
5) Consider a circuit representation below of a 3-input Linear feedback shift register (LFSR). 1 point
What is the characteristic polynomial f(x) of the LFSR?
1+x
1 + x2 + x3
1 + x + x2
input capacitance
device characteristics
Accepted Answers:
All of the above
Test Controller
8) In BIST, which of the following component does the lossy compression of the outputs of the 1 point
CUT?
Input Mux
Comparator
Test Controller
9) ____of BIST generates the test patterns required to sensitize the faults and propagate the 1 point
effect to the outputs.
Comparator
Test Controller
reviewer3@nptel.iitm.ac.in ▼
Unit 14 -
Testing for Embedded Software Systems
Course
outline
Assignment-12
The due date for submitting this assignment has passed.
How to access As per our records you have not submitted this Due on 2018-10-24, 23:59 IST.
the portal assignment.
Introduction and 1) Which of the following (X,Y) belongs to Unordered Codes? 1 point
Modeling
X = 10001, Y = 10000
Modeling and
Synthesis X = 11001, Y = 11000
issues
X = 11000, Y = 00000
Temporal Logic 2) Which of the following codes can detect unidirectional errors? 1 point
X = 11000, Y = 10001
BDD and
Symbolic Model X = 10001, Y = 10000
Checking
X = 11001, Y = 11000
Introduction to
Digital Testing No, the answer is incorrect.
Score: 0
Embedded Accepted Answers:
System X = 11000, Y = 10001
Hardware
Testing 3) Which of the following is TRUE about online BIST? 1 point
Embedded Not an efficient technique for OLT because present day circuits have parallelism and
System
pipelining techniques for high utilization of its modules
Hardware
Testing - II Test length has to be minimum, so as to fit within the idle time available
© 2014 NPTEL - Privacy & Terms - Honor Code - FAQs -
A project of In association with
Funded by
6) Which of the following is correct about the current software/hardware design process? 1 point
Valid and complete software requirements are easy to state and implement in code
Hardware and software cannot be acquired separately and independently, with their
successful and easy integration
7) Which of the following is TRUE about the duplication schemes for online testing? 1 point
The circuit duplication is for crosschecking the output responses for Similarity
The hardware overhead for duplication schemes for On-line Testing does not exceed 100%
CLB
I/O Pins
Interconnect Networks
3. Which of the following processes the source code before it goes to the compiler?
a) compiler
b) simulator
c) pre-processor
d) emulator
6.. Time duration required for scheduling dispatcher to stop one process and start
another is known as ____________
a) process latency
b) dispatch latency
c) execution latency
d) interrupt latency
9. Time required to synchronous switch from the context of one thread to the context of
another thread is called?
a) threads fly-back time
b) jitter
c) context switch time
d) none of the mentioned
a)fetch
b)throughput
c)decode
d)execute
5.Which one of the following is a real time operating system?
a) RTLinux
b) VxWorks
c) Windows CE
d) Android
9. The switching of the CPU from one process or thread to another is called
____________
a) process switch
b) task switch
c) context switch
d) none of the mentioned
a) I only
b) I and III only
c) II and III only
d) I, II and III
11.The Assemblers have the following major tasks
c) handle pseudo-ops
a) HLL
c) Assembly
d) encryption
Unit-4 PART-A
UNIT-5 PART-A
a) I only
b) I and III only
c) II and III only
d) I, II and III
2. VxWorks is centered around ____________
a) wind microkernel
b) linux kernel
c) unix kernel
d) ATMEL
3. If a process fails, most operating system write the error information to a ______
a) log file
b) another running process
c) new file
d) memory
4. Which facility dynamically adds probes to a running system, both in user processes
and in the kernel?
a) DTrace
b) DLocate
c) DMap
d) DAdd
5. Which system call can be used by a parent process to determine the termination of
child process?
a) wait
b) exit
c) fork
d) get
6. The address of the next instruction to be executed by the current process is provided
by the __________
a) CPU registers
b) Program counter
c) Process stack
d) Pipe
1. What are the essential tight constraint/s related to the design metrics of an
embedded system?
a. Single-functioned Characteristic
b. Tightly-constraint Characteristics
c. Reactive time Characteristics
3. Which of the following is the design in which both the hardware and software are
considered during the design?
a) platform based design
b) memory based design
c) software code design
d) hardware code design
5. Which level simulates the algorithms that are not used within the embedded
systems?
a) gate level
b) circuit level
c) switch level
d) algorithmic level
UNIT-5 PART-B
1.In Operating Systems, which of the following is/are CPU scheduling algorithms?
a) Round Robin
b) Shortest Job First
c) Priority
d) CACHE
2. Which one of the following error will be handle by the operating system?
a) power failure
b) lack of paper in printer
c) connection failure in the network
d) booting
a. Only C
b. C & D
c. A, B & D
d. A, B & C
ANSWER: (d) A, B & C
7) Which timer/s possess an ability to prevent an endless loop hanging condition of PIC along with its
own on-chip RC oscillator by contributing to its reliable operation?
a. Power-Up Timer (PWRT)
b. Oscillator Start-Up Timer (OST)
c. Watchdog Timer (WDT)
d. All of the above
ANSWER: (c) Watchdog Timer (WDT)
8) Which among the CPU registers of PIC 16C6X/7X is not 8-bit wide?
a. Status Register
b. Program Counter Latch (PCLATH) Register
c. Program Counter Low Byte (PCL) Register
d. File Selection Register (FSR)
ANSWER: (b) Program Counter Latch (PCLATH) Register
9) Which register/s is/are mandatory to get loaded at the beginning before loading or transferring the
contents to corresponding destination registers?
a. W
b. INDF
c. PCL
d. All of the above
ANSWER: (a) W
10) How many RPO status bits are required for the selection of two register banks?
a. 1
b. 2
c. 8
d. 16
ANSWER: (a) 1
11) The RPO status register bit has the potential to determine the effective address of______
a. Direct Addressing Mode
b. Indirect Addressing Mode
c. Immediate Addressing Mode
d. Indc. Watchdog Timer (WDT) exed Addressing Mode
ANSWER: (a) Direct Addressing Mode
12) Which status bits exhibit carry from lower 4 bits during 8-bit addition and are especially beneficial
for BCD addition?
a. Carry bit (C)
b. Digits Carry bit (DC)
c. Both a & b
d. None of the above
ANSWER: (b) Digits Carry bit (DC)
13) Which statement is precise in relation to FSR, INDF and indirect addressing mode?
a. Address byte must be written in FSR before executing INDF instruction in indirect addressing mode
b. Address byte must be written in FSR after executing INDF instruction in indirect addressing mode
c. Address byte must be written in FSR at the same time during the execution of INDF instruction in indirect
addressing mode
d. Address byte must be always written in FSR as it is independent of any instruction in indirect addressing
mode
a. Only A
b. Only B
c. Only A & B
d. A & D
ANSWER: (a) Only A
14) Which among the below stated registers specify the address reachability within 7 bits of address
independent of RP0 status bit register?
a. PCL
b. FSR
c. INTCON
d. All of the above
ANSWER: (d) All of the above
15) Where do the contents of PCLATH get transferred in the higher location of program counter while
writing in PCL (Program Counter Latch)?
a. 11th bit
b. 12th bit
c. 13th bit
d. 14th bit
ANSWER: (c) 13th bit
16) Which condition/s of MCLR (master clear) pin allow to reset the PIC?
a. High
b. Low
c. Moderate
d. All of the above
ANSWER:(b) Low
17) Generation of Power-on-reset pulse can occur only after __________
a. the detection of increment in VDD from 1.5 V to 2.1 V
b. the detection of decrement in VDD from 2.1 V to 1.5 V
c. the detection of variable time delay on power up mode
d. the detection of current limiting factor
ANSWER: (a) the detection of increment in VDD from 1.5 V to 2.1 V
18) What is the rate of power up delay provided by an oscillator start-up timer while operating at XT,
LP and HS oscillator modes?
a. 512 cycles
b. 1024 cycles
c. 2048 cycles
d. 4096 cycles
ANSWER: (b) 1024 cycles
19) Which kind of mode is favourable for MCLR pin for indulging in reset operations?
a. Normal mode
b. Sleep mode
c. Power-down mode
d. Any flexible mode
ANSWER: (b) Sleep mode
20) What is the purpose of using the start-up timers in an oscillator circuit of PIC?
a. For ensuring the inception and stabilization of an oscillator in a proper manner
b. For detecting the rise in VDD
c. For enabling or disabling the power-up timers
d. For generating the fixed delay of 72ms on power-up timers
ANSWER: (a) For ensuring the inception and stabilization of an oscillator in a proper manner
21) Which program location is allocated to the program counter by the reset function in Power-on-Reset
(POR) action modes?
a. Initial address
b. Middle address
c. Final address
d. At any address reliable for reset operations
ANSWER: (a) Initial address
22) When does it become very essential to use the external RC components for the reset circuits?
a. Only if initialization is necessary for RAM locations
b. Only if VDD power-up slope is insufficient at a requisite level
c. Only if voltage drop exceeds beyond the limit
d. Only if current limiting factor increases rapidly
ANSWER: (b) Only if VDD power-up slope is insufficient at a requisite level
23) Which among the below mentioned PICs do not support the Brown-Out-Reset (BOR) feature?
a. PIC 16C66
B. PIC 16C74
C. PIC 16C61
D. PIC 16C71
a. A & B
b. C & D
c. A & C
d. B & D
ANSWER: (b) C & D
24) Which crucial feature/function of Brown-Out-Reset (BOR) makes the PIC to be completely unique
and distinct from other microcontrollers?
a. It can reset the PIC automatically in running condition
b. It can reset the PIC even when the supply voltage increases above 4V
c. It can reset the PIC without enabling the power-up timer
d. All of the above
ANSWER: (a) It can reset the PIC automatically in running condition
25) What happens when the supply voltage falls below 4V during the power-up timer delay of 72ms in
PIC?
a. CPU resets PIC once again in BOR mode
b. BOR reset mode gets disabled
c. PIC does not remain in BOR mode until the voltage increases irrespective of stability
d. Power-up timer kills 72ms more again
ANSWER: (a) CPU resets PIC once again in BOR mode
26) What output is generated by OSC2 pin in PIC oscillator comprising RC components for
sychronizing the peripherals with PIC microcontroller?
a. (1/2) x frequency of OSC1
b. (1/4) x frequency of OSC1
c. (1/8) x frequency of OSC1
d. (1/16) x frequency of OSC1
ANSWER:(c) (1/8) x frequency of OSC1
27) Which form of clocking mechanism is highly efficient and reliable for crystal or ceramic clock
sources for operating at the range of 5- 200 kHz in PIC?
a. RC
b. LP (Low-Power Clocking)
c. XT
d. HS (High Speed)
ANSWER: (b) LP (Low-Power Clocking)
28) Which significant feature/s of crystal source contribute/s to its maximum predilection and utility as
compared to other clock sources?
a. High accuracy
b. Proficiency in time generation
c. Applicability in real-time operations
d. All of the above
ANSWER: (a) All of the above
29) What is the executable frequency range of High speed (HS) clocking method by using cystal/
ceramic/ resonator or any other external clock source?
a. 0-4 MHz
b. 5-200 KHz
c. 100kHz- 4 MHZ
d. 4-20 MHz
ANSWER: (d) 4-20 MHz
30) How many bits are required for addressing 2K & 4K program memories of PIC 16C61 respectively?
a. 4 & 8 bits
b. 8 & 16 bits
c. 11 & 12 bits
d. 12 & 16 bits
ANSWER: (c) 11 & 12 bits
31) What location is attributed to ‘goto Mainline’ instruction in the program memory of PIC 16C61?
a. 000H
b. 004H
c. 001H
d. 011H
ANSWER: (a) 000H
32) When do the special address 004H get automatically loaded into the program counter?
a. After the execution of RESET action in program counter
b. After the execution of ‘goto Mainline ‘ instruction in the program memory
c. At the occurrence of interrupt into the program counter
d. At the clearance of program counter with no value
ANSWER: (c) At the occurrence of interrupt into the program counter
33) How many bits are utilized by the instruction of direct addressing mode in order to address the
register files in PIC?
a. 2
b. 5
c. 7
d. 8
ANSWER:(c) 7
34) Which registers are adopted by CPU and peripheral modules so as to control and handle the
operation of device inhibited in RFS?
a. General Purpose Register
b. Special Purpose Register
c. Special Function Registers
d. All of the above
ANSWER: (c) Special Function Registers
35) Which among the below specified registors are addressable only from bank1 of RFS?
a. PORTA (05H)
b. PORTB (06H)
c. FSR (04H)
d. ADCON0 (07H)
ANSWER: (a) PORTA (05H)
36) Which register acts as an input-output control as well as data direction register for PORTA in bank
2 of RFS?
a. INDF (80H)
b. TRISB (85H)
c. TRISA (85H)
d. PCLATH (8A)
ANSWER: (c) TRISA (85H)
37) Which bank of RFS has a provision of addressing the status register?
a. Only Bank 1
b. Only Bank 2
c. Either Bank 1 or Bank 2
d. Neither Bank 1 nor Bank 2
ANSWER: (c) Either Bank 1 or Bank 2
38) Which bit of OPTION register has a potential to decide the falling or rising edge sensitivity for the
external interrupt INT?
a. RBPU
b. INTEDG
c. PSA
d. RTS
ANSWER: (b) INTEDG
39) Where are the prescalar assignments applied with a usage of PSA bit?
a. Only RTCC
b. Only Watchdog timer
c. Either RTCC or Watchdog timer
d. Neither RTCC nor Watchdog timer
ANSWER: (c) Either RTCC or Watchdog timer
40) Where is the exact specified location of an interrupt flag associated with analog-to-digital converter?
a. INTCON
b. ADCON0
c. ADRES
d. PCLATH
ANSWER: (b) ADCON0
41) Which bit permits to enable (if set) or disable (if cleared) all the interrupts in an INTCON register?
a. GIE
b. ADIE
c. RBIE
d. TOIE
ANSWER: (a) GIE
42) When does it become possible for a bit to get accessed from bank ‘0’ in the direct addressing mode of
PICs?
a. Only when RPO bit is set ‘zero’
b. Only when RPO bit is set ‘1’
c. Only when RPO bit is utilized along with 7 lower bits of instruction code
d. Cannot Predict
ANSWER: (a) Only when RPO bit is set ‘zero’
43) When does it become feasible for portB pins (RB4 to RB7) to support its unique feature of ‘interrupt
on change’?
a. By configuring all the pins (RB4-RB7) as inputs
b. By configuring all the pins (RB4-RB7) as outputs
c. By configuring any one of the pins as inputs
d. By configuring any one of the pins as outputs
ANSWER: (a) By configuring all the pins (RB4-RB7) as inputs
44) Which digital operations are performed over the detected mismatch outputs with an intention to
generate a single output RB port change output?
a. OR
b. AND
c. EX-OR
d. NAND
ANSWER: (a) OR
45) What is the purpose of acquiring two different bits from INTCON register for performing any
interrupt operation in PIC 16C61 / 71?
a. One for enabling & one for disabling the interrupt
b. One for enabling the interrupt & one for its occurrence detection
c. One for setting or clearing the RBIE bit
d. None of the above
ANSWER: (b) One for enabling the interrupt & one for its occurrence detection
46) Which among the below specified combination of interrupts belong to the category of the PIC 16C61
/ 71?
a. External, Timer/Counter & serial Port Interrupts
b. Internal, External & Timer/Counter Interrupts
c. External, Timer 0 & Port B Interrupts
d. Internal, External, Timer 0 & PortA Interrupts
ANSWER: (c) External, Timer 0 & Port B Interrupts
47) Which condition results in setting the GIE bit of INTCON automatically?
a. Execution of retfie instruction at the beginning of ISR
b. Execution of retfie instruction at the end of ISR
c. Execution of retfie instruction along with interrupt enable bit
d. Execution of retfie instruction along with interrupt disable bit
ANSWER: (b) Execution of retfie instruction at the end of ISR
48) What kind of external edge-sensitive interrupt is generated due to transition effect at pin RBO/INT?
a. INT
b. RBO
c. INTF
d. All of the above
ANSWER:(a) INT
49) Which bit-register pair plays a significant role in configuring the rising or falling edge triggering
levels in external interrupts of PIC 16C61/71?
a. INTF bit – INTCON register
b. INTEDG bit – OPTION register
c. INT bit -INTCON register
d. INTE bit – OPTION register
ANSWER: (b) INTEDG bit – OPTION register
50) Consider the following statements. Which of them is /are incorrect?
a. By enabling INTE bit of an external interrupt can wake up the processor before entering into sleep mode.
b. INTF bit is set in INTCON only when a valid interrupt signal arrives at INT pin.
c. During the occurrence of interrupt, GIE bit is set in order to prevent any further interrupts.
d. goto instruction written in program memory cannot direct the program control to ISR.
a. A & B
b. C & D
c. Only A
d. Only C
ANSWER: (b) C & D
51) What is the purpose of setting TOIE bit in INTCON along with GIE bit?
a. For setting the TOIF flag in INTCON due to generation of Timer 0 overflow interrupt
b. For setting the TOIE flag in INTCON due to generation of Timer 0 overflow interrupt
c. For setting the RBIF flag in INTCON due to generation of PORTB change interrupt
d. None of the above
ANSWER: (a) For setting the TOIF flag in INTCON due to generation of Timer 0 overflow interrupt
52) Where do the conversion interrupt flag (ADIF) end after an accomplishment of analog-to-digital
(ADC) conversion process?
a. INTCON
b. ADCON0
c. OPTION
d. None of the above
ANSWER: (b) ADCON0
53) How much time is required for conversion per channel if PIC 16C71 possesses four analog channels,
each comprising of 8-bits?
a. 10 μs
b. 15 μs
c. 20 μs
d. 30 μs
ANSWER: (c) 20 μs
54) How much delay is required to synchronize the external clock at TOCKI in Timer ‘0’ of PIC 16C61?
a. 2-cycles
b. 4-cycles
c. 6-cycles
d. 8-cycles
ANSWER: (a) 2-cycles
55) Which command enables the PIC to enter into the power down mode during the operation of
watchdog timer (WDT)?
a. SLEEP
b. RESET
c. STATUS
d. CLR
ANSWER: (a) SLEEP
56) Which channel would be selected if the values of channel bits CHS0 & CHS1 are ‘1’ & ‘0’
respectively in ADC Status Register?
a. AIN0
b. AIN1
c. AIN2
d. AIN3
ANSWER: (c) AIN2
57) Which bit is mandatory to get initiated or set for executing the process of analog to digital
conversion in ADCON0?
a. ADIF
b. ADON
c. Go/!Done
d. ADSC1
ANSWER: (c) Go/!Done
58) What would be the value of ADC clock source, if both the ADC clock bits are selected to be ‘1’?
a. FOSC/2
b. FOSC/8
c. FOSC/32
d. FRC
ANSWER: (d) FRC
59) The functionalities associated with the pins RA0- RA3 in ADCON1 are manipulated by __________
a. PCFG1 & PCG0
b. VREF
c. ADON
d. All of the above
ANSWER: (a) PCFG1 & PCG0
60) Which among the below mentioned aspect issues are supported by capture/compare/PWM modules
corresponding to time in PIC 16F877?
a. Control
b. Measurement
c. Generation of pulse signal
d. All of the above
ANSWER: (d) All of the above
61) Which register is suitable for the corresponding count, if the measurement of pulse width is less than
65,535 μs along with the frequency of 4 MHz?
a. 4-bit register
b. 8-bit register
c. 16-bit register
d. 32-bit register
ANSWER: (c) 16-bit register
UNIT-5 -MCQ
Identify which of the below is not the addressing mode of ARM
processor? A. Immediate addressing
B. Implied addressing
C. Register addressing
D. Base plus index addressing
ANSWER: B
Which of the below mentioned code is not the condition code flag of ARM
processor? A. N
B. C
C. Z
D. OV
ANSWER: D
ANSWER: B
In ARM processor, when two 32 bit integers are multiplied, the result obtained is
______ A. 24 bit
B. 25 bit
C. 27 bit
D. 28 bit
ANSWER: B
ANSWER: B
Identify the instruction which transfers data to multiple registers at a time in ARM
processor. A. LDIMR r2, { r1, r3, r5 }
B. LDA r2, { r1, r3, r5 }
C. LDMIA r1, { r0, r2, r5 }
D. LDM r1, { r0, r2, r5 }
ANSWER: C
Which instruction of ARM processor did not give any carry at the output of arithmetic
operation?
A. BVS
B. BGT
C. BCC
D. BCS
ANSWER: C
ANSWER: A
The register used to store the condition code bits in ARM processor is _________
A. APSR
B. CPSR
C. PC
D. r12
ANSWER: B
In ARM Processor, the result of product of two register content can be added to another register
content is done by the instruction ________
A. MUL
B. MULA
C. MLA
D. MUA
ANSWER: C
ANSWER: C
A. Two byte
B. Four Byte
C. Eight Byte
D. Six Byte
ANSWER: B
A. 2^8
B. 2^16
C. 2^32
D. 2^64
ANSWER : C
__________ is the address that the computer acquires from the current instruction
being executed.
A. Simple Address
B. Complex Address
C. Non-Effective address
D. Effective address
ANSWER: D
The instructions which are used to load or store multiple operands are called as __________ A.
Banked instructions
B. Lump transfer instructions
C. Block transfer instructions
D. DMA instructions
ANSWER :C
What are the profiles for ARM architecture?
A. A, R
B. A, M
C. A, R, M
D. R ,M
ANSWER: C
The Thumb instruction set is a--------of the ARM instruction set and the instruction operate on
restricted view of the ARM register
A.Subset
B.Null set
C.Set
D.Semi set
ANSWER: A
A.Hardware
B.Software
C.Embedded
D.AMBA
ANSWER: C
A. ASSIGN
B. RN
C. PSLOAD
D. ADR
ANSWER : B
A. BEQ
B. ASSIGN
C. PSLOAD
D. ADR
ANSWER : A
Which of the following is true?
A. instructions are generally used to perform memory transfer
operations. B. The LDM instruction is used to load data into multiple
locations.
C. The MLA instruction is used perform addition and multiplication
together. D. All of the above
ANSWER: D
A. 8
B. 16
C. 24
D. 32
ANSWER : C
The Thumb instruction set is a subset of the most commonly used ----ARM instructions.
A.32 bit
B.24 bit
C.16 bit
D. 4 bit
ANSWER: A
In ARM processor, when two 32 bit integers are multiplied, the result obtained is ______
A. 24 bit
B. 25 bit
C. 27 bit
D. 28 bit
ANSWER: B
The Advanced Peripheral Bus offers a simpler interface for------- performance peripherals.
A. Low
B. High
C. Unity
D. Zero
ANSWER :A
With 32-bit memory, the ARM code is -------faster than the Thumb code
A.40%
B.45%
C.55%
D.80%
ANSWER :A
Which of the following register in ARM7 is used to point to the location of currently executing
instruction in a program?
A.R1
B. R5
C. R15
D. R8
ANSWER : C
Which of the following statements are true with respect to pipelining. I. Pipelining is an
implementation technique whereby multiple instructions are overlapped in execution. It is
not visible to the programmer
II. II. Each step is called a pipe stage or pipe segment
III. III. Pipeline machine cycle is the time required to move an instruction one step down the
pipeline
A. All are true
B.I and III are true
C. II and III are true
D. None of them are true
ANSWER : A
The fastest data access is provided using _______.
A. Caches
B.DRAM’s
C. SRAM’s
D. Registers
ANSWER : D
UNIT 4-MCQ
How many clock pulses are confined by each machine cycle of Peripheral-Interface Controllers?
a. 4
b. 8
c. 12
d. 16
ANSWER: (a) 4
Which flags are more likely to get affected in status registers by Arithmetic and Logical Unit (ALU)
of PIC 16 CXX on the basis of instructions execution?
a. Carry (C) Flags
b. Zero (Z) Flags
c. Digit Carry (DC) Flags
d. All of the above
ANSWER: (d) All of the above
What is the execution speed of instructions in PIC especially while operating at the maximum value
of clock rate?
a. 0.1 μs
b. 0.2 μs
c. 0.4 μs
d. 0.8 μs
ANSWER: (b) 0.2 μs
Which operational feature of PIC allows it to reset especially when the power supply drops the
voltage below 4V?
a. Built-in Power-on-reset
b. Brown-out reset
c. Both a & b
d. None of the above
ANSWER: (b)Brown-out reset
Which among the below stated reasons is/are responsible for the selection of PIC
implementation/design on the basis of Harvard architecture instead of Von-Newman architecture?
a. Improvement in bandwidth
b. Instruction fetching becomes possible over a single instruction cycle
c. Independent bus access provision to data memory even while accessing the program
memory d. All of the above
ANSWER: (d) All of the above
Which among the below specified major functionalities is/are associated with the programmable
timers of PIC?
a. Excogitation of Inputs
b. Handling of Outputs
c. Interpretation of internal timing for program execution
d. Provision of OTP for large and small production runsa. Only C
b. C & D
c. A, B & D
d. A, B & C
Which among the CPU registers of PIC 16C6X/7X is not 8-bit wide?
a. Status Register
b. Program Counter Latch (PCLATH) Register
c. Program Counter Low Byte (PCL) Register
d. File Selection Register (FSR)
ANSWER: (b) Program Counter Latch (PCLATH) Register
Which register/s is/are mandatory to get loaded at the beginning before loading or transferring the
contents to corresponding destination registers?
a. W
b. INDF
c. PCL
d. All of the above
ANSWER: (a) W
How many RPO status bits are required for the selection of two register banks?
a. 1
b. 2
c. 8
d. 16
ANSWER: (a) 1
The RPO status register bit has the potential to determine the effective address of______
Which status bits exhibit carry from lower 4 bits during 8-bit addition and are especially beneficial for
BCD addition?
a. Carry bit (C)
b. Digits Carry bit (DC)
c. Both a & b
d. None of the above
ANSWER: (b) Digits Carry bit (DC)
In PIC microcontroller, which instruction will wait for watchdog timer or external signal to begin
program execution again?
a.nop
b. sleep
c. resume
d. clrwdt
ANSWER: (b) Sleep
Which statement is precise in relation to FSR, INDF and indirect addressing mode? a. Address
byte must be written in FSR before executing INDF instruction in indirect addressing mode
b. Address byte must be written in FSR after executing INDF instruction in indirect addressing mode
c. Address byte must be written in FSR at the same time during the execution of INDF instruction in
indirect addressing mode
d. Address byte must be always written in FSR as it is independent of any instruction in indirect
addressing mode
a. Only A
b. Only B
c. Only A & B
d. A & D
ANSWER: (a) Only A
Which among the below stated registers specify the address reachability within 7 bits of address
independent of RP0 status bit register?
a. PCL
b. FSR
c. INTCON
d. All of the above
ANSWER: (d) All of the above
Where do the contents of PCLATH get transferred in the higher location of program counter while
writing in PCL (Program Counter Latch)?
a. 11th bit
b. 12th bit
c. 13th bit
d. 14th bit
ANSWER: (c) 13th bit
Which condition/s of MCLR (master clear) pin allow to reset the PIC?
a. High
b. Low
c. Moderate
d. All of the above
ANSWER:(b) Low
What is the rate of power up delay provided by an oscillator start-up timer while operating at XT, LP
and HS oscillator modes?
a. 512 cycles
b. 1024 cycles
c. 2048 cycles
d. 4096 cycles
ANSWER: (b) 1024 cycles
Which kind of mode is favourable for MCLR pin for indulging in reset operations?
a. Normal mode
b. Sleep mode
c. Power-down mode
d. Any flexible mode
ANSWER: (b) Sleep mode
What is the purpose of using the start-up timers in an oscillator circuit of PIC? a.
For ensuring the inception and stabilization of an oscillator in a proper manner
b. For detecting the rise in VDD
c. For enabling or disabling the power-up timers
d. For generating the fixed delay of 72ms on power-up timers
ANSWER: (a) For ensuring the inception and stabilization of an oscillator in a proper manner
Which program location is allocated to the program counter by the reset function in Power-on-Reset
(POR) action modes?
a. Initial address
b. Middle address
c. Final address
d. At any address reliable for reset operations
ANSWER: (a) Initial address
When does it become very essential to use the external RC components for the reset circuits?
a. Only if initialization is necessary for RAM locations
b. Only if VDD power-up slope is insufficient at a requisite level
c. Only if voltage drop exceeds beyond the limit
d. Only if current limiting factor increases rapidly
ANSWER: (b) Only if VDD power-up slope is insufficient at a requisite level
Which among the below mentioned PICs do not support the Brown-Out-Reset (BOR) feature?
a. PIC 16C66
B. PIC 16C74
C. PIC 16C61
D. PIC 16C71
a. A & B
b. C & D
c. A & C
d. B & D
ANSWER: (b) C & D
Which crucial feature/function of Brown-Out-Reset (BOR) makes the PIC to be completely unique
and distinct from other microcontrollers?a. It can reset the PIC automatically in running condition
b. It can reset the PIC even when the supply voltage increases above 4V
c. It can reset the PIC without enabling the power-up timer
d. All of the above
ANSWER: (a) It can reset the PIC automatically in running condition
What happens when the supply voltage falls below 4V during the power-up timer delay of 72ms in
PIC?
a. CPU resets PIC once again in BOR mode
b. BOR reset mode gets disabled
c. PIC does not remain in BOR mode until the voltage increases irrespective of stability
d. Power-up timer kills 72ms more again
ANSWER: (a) CPU resets PIC once again in BOR mode
What output is generated by OSC2 pin in PIC oscillator comprising RC components for sychronizing
the peripherals with PIC microcontroller?
a. (1/2) x frequency of OSC1
b. (1/4) x frequency of OSC1
c. (1/8) x frequency of OSC1
d. (1/16) x frequency of OSC1
ANSWER:(c) (1/8) x frequency of OSC1
Which form of clocking mechanism is highly efficient and reliable for crystal or ceramic clock
sources for operating at the range of 5- 200 kHz in PIC?
a. RC
b. LP (Low-Power Clocking)
c. XT
d. HS (High Speed)
ANSWER: (b) LP (Low-Power Clocking)
Which significant feature/s of crystal source contribute/s to its maximum predilection and utility as
compared to other clock sources?
a. High accuracy
b. Proficiency in time generation
c. Applicability in real-time operations
d. All of the above
ANSWER: (a) All of the above
What is the executable frequency range of High speed (HS) clocking method by using cystal/ ceramic/
resonator or any other external clock source?
a. 0-4 MHz
b. 5-200 KHz
c. 100kHz- 4 MHZ
d. 4-20 MHz
ANSWER: (d) 4-20 MHz
How many bits are required for addressing 2K & 4K program memories of PIC 16C61
respectively? a. 4 & 8 bits
b. 8 & 16 bits
c. 11 & 12 bits
d. 12 & 16 bits
ANSWER: (c) 11 & 12 bits
What location is attributed to ‘goto Mainline’ instruction in the program memory of PIC 16C61?
a. 000H
b. 004H
c. 001H
d. 011H
ANSWER: (a) 000H
When do the special address 004H get automatically loaded into the program counter?
a. After the execution of RESET action in program counter
b. After the execution of ‘goto Mainline ‘ instruction in the program
memory c. At the occurrence of interrupt into the program counter
d. At the clearance of program counter with no value
ANSWER: (c) At the occurrence of interrupt into the program counter
How many bits are utilized by the instruction of direct addressing mode in order to address the
register files in PIC?
a. 2
b. 5
c. 7
d. 8
ANSWER:(c) 7
Which registers are adopted by CPU and peripheral modules so as to control and handle the operation
of device inhibited in RFS?
a. General Purpose Register
b. Special Purpose Register
c. Special Function Registers
d. All of the above
ANSWER: (c) Special Function Registers
Which among the below specified registors are addressable only from bank1 of RFS?
a. PORTA (05H)
b. PORTB (06H)
c. FSR (04H)
d. ADCON0 (07H)
ANSWER: (a) PORTA (05H)
Which register acts as an input-output control as well as data direction register for PORTA in bank 2
of RFS?
a. INDF (80H)
b. TRISB (85H)
c. TRISA (85H)
d. PCLATH (8A)
ANSWER: (c) TRISA (85H)
Which bit of OPTION register has a potential to decide the falling or rising edge sensitivity for the
external interrupt INT?
a. RBPU
b. INTEDG
c. PSA
d. RTS
ANSWER: (b) INTEDG
Where are the prescalar assignments applied with a usage of PSA bit?
a. Only RTCC
b. Only Watchdog timer
c. Either RTCC or Watchdog timer
d. Neither RTCC nor Watchdog timer
ANSWER: (c) Either RTCC or Watchdog timer
Where is the exact specified location of an interrupt flag associated with analog-to-digital converter?
a. INTCON
b. ADCON0
c. ADRES
d. PCLATH
ANSWER: (b) ADCON0
Which bit permits to enable (if set) or disable (if cleared) all the interrupts in an INTCON register?
a. GIE
b. ADIE
c. RBIE
d. TOIE
ANSWER: (a) GIE
When does it become possible for a bit to get accessed from bank ‘0’ in the direct addressing mode of
PICs?
a. Only when RPO bit is set ‘zero’
b. Only when RPO bit is set ‘1’
c. Only when RPO bit is utilized along with 7 lower bits of instruction code
d. Cannot Predict
ANSWER: (a) Only when RPO bit is set ‘zero’
The number of instruction set that the PIC microcontroller has is ________
a.35
b. 34
c. 31
d. 45
ANSWER: (a) 35
In the PIC microcontroller, the register bank which has 32 bytes of special purpose registers is
______ a. Bank 0 &1
b. Bank 1 & 2
c. Bank 0 & 2
d. Bank 0, 1 & 2
ANSWER: (a) Bank 0&1
In PIC microcontroller, The W register serves the purpose similar to ________ of 8085
microprocessors.
a.Program counter
b. Instruction register
c. Accumulator
d. ISR
ANSWER:(a) Accumulator
In PIC microcontroller, the watchdog timer can be cleared using the instruction _________
a. clcwd
b. clrwdt
c. clrwd
d .wdtclr
ANSWER :(a) clrwdt
In PIC microcontroller, if there is any carry from lower nibble to higher nibble ________ bit of
STATUS register becomes set.
a.AC
b. CY
c. DC
d. OV
ANSWER:(c) DC
The instruction of PIC16Cxx that tests the ‘b’ bit of ‘f’ register, where b = 0 to 7 and skip when it
clear is ________
a.btfss
b. btfsc
c. btccc
d. btsss
ANSWER: (b) btfsc
Identify the correct instruction of PIC which AND literal value into W from the following
a.andlw
b. andwf
c. andff
d. andwl
ANSWER : (a) andlw
Which digital operations are performed over the detected mismatch outputs with an intention to
generate a single output RB port change output?
a. OR
b. AND
c. EX-OR
d. NAND
ANSWER: (a) OR
What is the purpose of acquiring two different bits from INTCON register for performing any
interrupt operation in PIC 16C61 / 71?
a. One for enabling & one for disabling the interrupt
b. One for enabling the interrupt & one for its occurrence detection
c. One for setting or clearing the RBIE bit
d. None of the above
ANSWER: (b) One for enabling the interrupt & one for its occurrence detection
Which among the below specified combination of interrupts belong to the category of the PIC 16C61
/ 71?
a. External, Timer/Counter & serial Port Interrupts
b. Internal, External & Timer/Counter Interrupts
c. External, Timer 0 & Port B Interrupts
d. Internal, External, Timer 0 & PortA Interrupts
ANSWER: (c) External, Timer 0 & Port B Interrupts
Which condition results in setting the GIE bit of INTCON automatically?
a. Execution of retfie instruction at the beginning of ISR
b. Execution of retfie instruction at the end of ISR
c. Execution of retfie instruction along with interrupt enable bit
d. Execution of retfie instruction along with interrupt disable bit
ANSWER: (b) Execution of retfie instruction at the end of ISR
What kind of external edge-sensitive interrupt is generated due to transition effect at pin RBO/INT?
a. INT
b. RBO
c. INTF
d. All of the above
ANSWER:(a) INT
Which bit-register pair plays a significant role in configuring the rising or falling edge triggering
levels in external interrupts of PIC 16C61/71?
a. INTF bit – INTCON register
b. INTEDG bit – OPTION register
c. INT bit -INTCON register
d. INTE bit – OPTION register
ANSWER: (b) INTEDG bit – OPTION register
a. A & B
b. C & D
c. Only A
d. Only C
ANSWER: (b) C & D
What is the purpose of setting TOIE bit in INTCON along with GIE bit?
a. For setting the TOIF flag in INTCON due to generation of Timer 0 overflow interrupt
b. For setting the TOIE flag in INTCON due to generation of Timer 0 overflow interrupt
c. For setting the RBIF flag in INTCON due to generation of PORTB change interrupt
d. None of the above
ANSWER: (a) For setting the TOIF flag in INTCON due to generation of Timer 0 overflow interrupt
Where do the conversion interrupt flag (ADIF) end after an accomplishment of analog-to-digital
(ADC) conversion process?
a. INTCON
b. ADCON0
c. OPTION
d. None of the above
ANSWER: (b) ADCON0
How much time is required for conversion per channel if PIC 16C71 possesses four analog channels,
each comprising of 8-bits?
a. 10 μs
b. 15 μs
c. 20 μs
d. 30 μs
ANSWER: (c) 20 μs
When two stator electromagnets are energized at a time, the mode is called
_________ a.Full Drive
b. Wave Drive
c. Half Drive
d.Quarter Drive
ANSWER : (a) Full Drive
In wave drive operation of stepper motor, ________ is less when compared to full step
drive. a.current
b. voltage
c. torque
d. speed
ANSWER: (c) torque
What are the special features available in PIC microcontroller for speed control of DC
motor? a.PWM generation and analog channel
b. PWM generation and ADC
c. ADC and analog channel
d. PWM generation and DAC
ANSWER : (a) PWM generation and analog signal
Which command enables the PIC to enter into the power down mode during the operation of
watchdog timer (WDT)?
a. SLEEP
b. RESET
c. STATUS
d. CLR
ANSWER: (a) SLEEP
Which channel would be selected if the values of channel bits CHS0 & CHS1 are ‘1’ & ‘0’
respectively in ADC Status Register?
a. AIN0
b. AIN1
c. AIN2
d. AIN3
ANSWER: (c) AIN2
Which bit is mandatory to get initiated or set for executing the process of analog to digital conversion
in ADCON0?
a. ADIF
b. ADON
c. Go/!Done
d. ADSC1
ANSWER: (c) Go/!Done
What would be the value of ADC clock source, if both the ADC clock bits are selected to be ‘1’?
a. FOSC/2
b. FOSC/8
c. FOSC/32
d. FRC
ANSWER: (d) FRC
The functionalities associated with the pins RA0- RA3 in ADCON1 are manipulated by __________
a. PCFG1 & PCG0
b. VREF
c. ADON
d. All of the above
ANSWER: (a) PCFG1 & PCG0
Which among the below mentioned aspect issues are supported by capture/compare/PWM modules
corresponding to time in PIC 16F877?
a. Control
b. Measurement
c. Generation of pulse signal
d. All of the above
ANSWER: (d) All of the above
Which register is suitable for the corresponding count, if the measurement of pulse width is less than
65,535 μs along with the frequency of 4 MHz?
a. 4-bit register
b. 8-bit register
c. 16-bit register
d. 32-bit register
ANSWER: (c) 16-bit register
In PIC microcontroller, the program counter comprises of _____ bit PCL and ______ bit PCLATH.
a.4, 8
b. 8, 5
c. 5, 8
d.8, 4
ANSWER: (b) 8,5
1. In real time operating system ____________
a) all processes have the same priority
b) a task must be serviced by its deadline period
c) process scheduling can be done only once
d) kernel is not required
View Answer
Answer: b
Explanation: None.
2. Hard real time operating system has ______________ jitter than a soft real time
operating system.
a) less
b) more
c) equal
d) none of the mentioned
View Answer
Answer: a
Explanation: Jitter is the undesired deviation from the true periodicity.
3. For real time operating systems, interrupt latency should be ____________
a) minimal
b) maximum
c) zero
d) dependent on the scheduling
View Answer
Answer: a
Explanation: Interrupt latency is the time duration between the generation of interrupt
and execution of its service.
4. In rate monotonic scheduling ____________
a) shorter duration job has higher priority
b) longer duration job has higher priority
c) priority does not depend on the duration of the job
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
5. In which scheduling certain amount of CPU time is allocated to each process?
a) earliest deadline first scheduling
b) proportional share scheduling
c) equal share scheduling
d) none of the mentioned
View Answer
Answer: b
Explanation: None.
advertisement
6. T shares of time are allocated among all processes out of N shares in __________
scheduling algorithm.
a) rate monotonic
b) proportional share
c) earliest deadline first
d) none of the mentioned
View Answer
Answer: b
Explanation: None.
7. If there are a total of T = 100 shares to be divided among three processes, A, B and
C. A is assigned 50 shares, B is assigned 15 shares and C is assigned 20 shares.
A will have ______ percent of the total processor time.
a) 20
b) 15
c) 50
d) none of the mentioned
View Answer
Answer: c
Explanation: None.
8. If there are a total of T = 100 shares to be divided among three processes, A, B and
C. A is assigned 50 shares, B is assigned 15 shares and C is assigned 20 shares.
B will have ______ percent of the total processor time.
a) 20
b) 15
c) 50
d) none of the mentioned
View Answer
Answer: b
Explanation: None.
9. If there are a total of T = 100 shares to be divided among three processes, A, B and
C. A is assigned 50 shares, B is assigned 15 shares and C is assigned 20 shares.
C will have ______ percent of the total processor time.
a) 20
b) 15
c) 50
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
10. If there are a total of T = 100 shares to be divided among three processes, A, B and
C. A is assigned 50 shares, B is assigned 15 shares and C is assigned 20 shares.
If a new process D requested 30 shares, the admission controller would __________
a) allocate 30 shares to it
b) deny entry to D in the system
c) all of the mentioned
d) none of the mentioned
View Answer
Answer: b
Explanation: None.
1. To schedule the processes, they are considered _________
a) infinitely long
b) periodic
c) heavy weight
d) light weight
View Answer
Answer: b
Explanation: None.
2. If the period of a process is ‘p’, then what is the rate of the task?
a) p2
b) 2*p
c) 1/p
d) p
View Answer
Answer: c
Explanation: None.
3. The scheduler admits a process using __________
a) two phase locking protocol
b) admission control algorithm
c) busy wait polling
d) none of the mentioned
View Answer
Answer: c
Explanation: None.
4. The ____________ scheduling algorithm schedules periodic tasks using a static
priority policy with preemption.
a) earliest deadline first
b) rate monotonic
c) first cum first served
d) priority
View Answer
Answer: b
Explanation: None.
5. Rate monotonic scheduling assumes that the __________
a) processing time of a periodic process is same for each CPU burst
b) processing time of a periodic process is different for each CPU burst
c) periods of all processes is the same
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
advertisement
Pause
Unmute
Loaded: 81.28%
Fullscreen
Process P0
while(true)
{
wait(S0);
print '0';
release(S1);
release(S2);
}
Process P1
wait(S1);
release(S0);
Process P2
wait(S2);
release(S0);
repeat
P(mutex)
{Critical Section}
V(mutex)
forever
The code for P10 is identical except that it uses V(mutex) instead of P(mutex). What is
the largest number of processes that can be inside the critical section at any moment
(the mutex being initialized to 1)?
a) 1
b) 2
c) 3
d) None of the mentioned
View Answer
Answer: c
Explanation: Any one of the 9 processes can get into critical section after executing
P(mutex) which decrements the mutex value to 0. At this time P10 can enter critical
section by incrementing the value to 1. Now any of the 9 processes can enter the critical
section by again decrementing the mutex value to 0. None of the remaining processes
can get into their critical sections.
13. Two processes, P1 and P2, need to access a critical section of code. Consider the
following synchronization construct used by the processes.
Process P1 :
while(true)
{
w1 = true;
while(w2 == true);
Critical section
w1 = false;
}
Remainder Section
Process P2 :
while(true)
{
w2 = true;
while(w1 == true);
Critical section
w2 = false;
}
Remainder Section
Here, w1 and w2 have shared variables, which are initialized to false. Which one of the
following statements is TRUE about the above construct?
a) It does not ensure mutual exclusion
b) It does not ensure bounded waiting
c) It requires that processes enter the critical section in strict alternation
d) It does not prevent deadlocks but ensures mutual exclusion
View Answer
Answer: d
Explanation: None
1. What will happen if a non-recursive mutex is locked more than once?
a) Starvation
b) Deadlock
c) Aging
d) Signaling
View Answer
Answer: b
Explanation: If a thread which had already locked a mutex, tries to lock the mutex again,
it will enter into the waiting list of that mutex, which results in a deadlock. It is because
no other thread can unlock the mutex.
2. What is a semaphore?
a) is a binary mutex
b) must be accessed from only one process
c) can be accessed from multiple processes
d) none of the mentioned
View Answer
Answer: c
Explanation: None.
3. What are the two kinds of semaphores?
a) mutex & counting
b) binary & counting
c) counting & decimal
d) decimal & binary
View Answer
Answer: b
Explanation: None.
4. What is a mutex?
a) is a binary mutex
b) must be accessed from only one process
c) can be accessed from multiple processes
d) none of the mentioned
View Answer
Answer: b
Explanation: None.
5. At a particular time of computation the value of a counting semaphore is 7.Then 20 P
operations and 15 V operations were completed on this semaphore. The resulting value
of the semaphore is? (GATE 1987)
a) 42
b) 2
c) 7
d) 12
View Answer
Answer: b
Explanation: P represents Wait and V represents Signal. P operation will decrease the
value by 1 every time and V operation will increase the value by 1 every time.
advertisement
Process A
int Y;
A1: Y = X*2;
A2: X = Y;
Process B
int Z;
B1: Z = X+1;
B2: X = Z;
Process A
int Y;
A1: Y = X*2;
A2: X = Y;
signal(T);
Process B
int Z;
B1: wait(T);
B2: Z = X+1;
X = Z;
Cancel
6. A deadlock free solution to the dining philosophers problem ____________
a) necessarily eliminates the possibility of starvation
b) does not necessarily eliminate the possibility of starvation
c) eliminates any possibility of any kind of problem further
d) none of the mentioned
View Answer
Answer: b
Explanation: None.
7. All processes share a semaphore variable mutex, initialized to 1. Each process must
execute wait(mutex) before entering the critical section and signal(mutex) afterward.
Suppose a process executes in the following manner.
signal(mutex);
.....
critical section
.....
wait(mutex);
In this situation :
a) a deadlock will occur
b) processes will starve to enter critical section
c) several processes maybe executing in their critical section
d) all of the mentioned
View Answer
Answer: c
Explanation: None.
8. All processes share a semaphore variable mutex, initialized to 1. Each process must
execute wait(mutex) before entering the critical section and signal(mutex) afterward.
Suppose a process executes in the following manner.
wait(mutex);
.....
critical section
.....
wait(mutex);
Method used by P1 :
while(S1==S2);
Critical section
S1 = S2;
Method used by P2 :
while(S1!=S2);
Critical section
S2 = not(S1);
Suppose the period of a process is ‘p’, then the rate of the task is?
(A). p2
(B). 2*p
(C). 1/p
(D). p
(E). None of these
MCQ Answer: C
T shares of time are allocated among all processes out of N shares in which of
the following scheduling algorithm?
(A). rate monotonic
(B). proportional share
(C). the earliest deadline first
(D). None of these
(E). None of these
MCQ Answer: B
There are two processes processes1 and processes2, whose periods are 50
and 100 respectively. P1 is allotted higher priority than P2. The processing
times are t1 = 20 for P1 and t2 = 35 for P2. Is it feasible to schedule these tasks
so that these tasks fulfill their deadline using Rate monotonic scheduling?
(A). yes
(B). no
(C). maybe
(D). None of these
(E). None of these
MCQ Answer: A
a. Distributed
b. Network
c. Real time
d. Online
a. Multitasking
b. Batch
c. Online
d. Real-time
a. Shortest-job First.
b. Elevator.
c. Round-Robin.
d. First-Come-First-Serve.
7. Hard real time operating system has ___ jitter than a soft real time operating system.
a. less
b. more
c. equal
Answer: (a).less
a. minimal
b. maximum
c. zero
d. dependent on the scheduling
Answer: (a).minimal
10. In which scheduling certain amount of CPU time is allocated to each process?
Explanation: There are primarily two types of real time embedded systems i.e. hard and
soft.
3. Which system makes sure that all critical processes are completed
within the given time frame?
A. hard
B. soft
C. simple
D. complex
View Answer
Ans : A
Explanation: Hard Real Time Embedded System : This type of system makes sure that
all critical processes are completed within the given time frame.
Explanation: All of the above are Applications of Real Time Embedded Systems.
Explanation: Soft real time systems are used in various areas such as multimedia,
scientific projects etc.
Explanation: Timing constraints can be broken down into two categories: event response
and task scheduling.
7. Hard real time operating system has ______________ jitter than a soft
real time operating system
A. less
B. more
C. equal
D. Can not say
View Answer
Ans : A
Explanation: Interrupt latency is the time duration between the generation of interrupt
and execution of its service.
9. Latency is defined as the?
A. response time plus the detection time
B. detection time minus response time
C. detection time plus response time
D. response time minus the detection time
View Answer
Ans : D
Explanation: Latency is defined as the response time minus the detection time.
Explanation: True, Every real-time system has a set of timing constraints that it has been
designed to meet. If a system doesn't have timing constraints, it is not real-time.
. Which module gives control of the CPU to the process selected by the short-term
scheduler?
a) dispatcher
b) interrupt
c) scheduler
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
2. The processes that are residing in main memory and are ready and waiting to execute
are kept on a list called _____________
a) job queue
b) ready queue
c) execution queue
d) process queue
View Answer
Answer: b
Explanation: None.
3. The interval from the time of submission of a process to the time of completion is
termed as ____________
a) waiting time
b) turnaround time
c) response time
d) throughput
View Answer
Answer: b
Explanation: None.
4. Which scheduling algorithm allocates the CPU first to the process that requests the
CPU first?
a) first-come, first-served scheduling
b) shortest job scheduling
c) priority scheduling
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
5. In priority scheduling algorithm ____________
a) CPU is allocated to the process with highest priority
b) CPU is allocated to the process with lowest priority
c) Equal priority processes can not be scheduled
d) None of the mentioned
View Answer
Answer: a
Explanation: None.
6. In priority scheduling algorithm, when a process arrives at the ready queue, its priority
is compared with the priority of ____________
a) all process
b) currently running process
c) parent process
d) init process
View Answer
Answer: b
Explanation: None.
7. Which algorithm is defined in Time quantum?
a) shortest job scheduling algorithm
b) round robin scheduling algorithm
c) priority scheduling algorithm
d) multilevel queue scheduling algorithm
View Answer
Answer: b
Explanation: None.
8. Process are classified into different groups in ____________
a) shortest job scheduling algorithm
b) round robin scheduling algorithm
c) priority scheduling algorithm
d) multilevel queue scheduling algorithm
View Answer
Answer: d
Explanation: None.
9. In multilevel feedback scheduling algorithm ____________
a) a process can move to a different classified ready queue
b) classification of ready queue is permanent
c) processes are not classified into groups
d) none of the mentioned
View Answer
Answer: a
Explanation: None.
10. Which one of the following can not be scheduled by the kernel?
a) kernel level thread
b) user level thread
c) process
d) none of the mentioned
View Answer
Answer: b
Explanation: User level threads are managed by thread library and the kernel is unaware
of them.
1. CPU scheduling is the basis of ___________
a) multiprocessor systems
b) multiprogramming operating systems
c) larger memory sized systems
d) none of the mentioned
View Answer
Answer: b
Explanation: None.
2. With multiprogramming ______ is used productively.
a) time
b) space
c) money
d) all of the mentioned
View Answer
Answer: a
Explanation: None.
3. What are the two steps of a process execution?
a) I/O & OS Burst
b) CPU & I/O Burst
c) Memory & I/O Burst
d) OS & Memory Burst
View Answer
Answer: b
Explanation: None.
4. An I/O bound program will typically have ____________
a) a few very short CPU bursts
b) many very short I/O bursts
c) many very short CPU bursts
d) a few very short I/O bursts
View Answer
Answer: c
Explanation: None.
5. A process is selected from the ______ queue by the ________ scheduler, to be
executed.
a) blocked, short term
b) wait, long term
c) ready, short term
d) ready, long term
View Answer
Answer: c
Explanation: None.
advertisement
a) I only
b) I and III only
c) II and III only
d) I, II and III
View Answer
Answer: d
Explanation: I) Shortest remaining time first scheduling is a preemptive version of
shortest job scheduling. It may cause starvation as shorter processes may keep coming
and a long CPU burst process never gets CPU.
II) Preemption may cause starvation. If priority based scheduling with preemption is
used, then a low priority process may never get CPU.
III) Round Robin Scheduling improves response time as all processes get CPU after a
specified time.
1. Which is the most optimal scheduling algorithm?
a) FCFS – First come First served
b) SJF – Shortest Job First
c) RR – Round Robin
d) None of the mentioned
View Answer
Answer: b
Explanation: None.
2. The real difficulty with SJF in short term scheduling is ____________
a) it is too good an algorithm
b) knowing the length of the next CPU request
c) it is too complex to understand
d) none of the mentioned
View Answer
Answer: b
Explanation: None.
3. The FCFS algorithm is particularly troublesome for ____________
a) time sharing systems
b) multiprogramming systems
c) multiprocessor systems
d) operating systems
View Answer
Answer: b
Explanation: In a time sharing system, each user needs to get a share of the CPU at
regular intervals.
4. Consider the following set of processes, the length of the CPU burst time given in
milliseconds.
Process Burst time
P1 6
P2 8
P3 7
P4 3
Assuming the above process being scheduled with the SJF scheduling algorithm.
a) The waiting time for process P1 is 3ms
b) The waiting time for process P1 is 0ms
c) The waiting time for process P1 is 16ms
d) The waiting time for process P1 is 9ms
View Answer
Answer: a
Explanation: None.
advertisement
a) i only
b) i and iii only
c) ii and iii only
d) i, ii and iii
View Answer
Answer: d
Explanation: None.
11. Which of the following scheduling algorithms gives minimum average waiting time?
a) FCFS
b) SJF
c) Round – robin
d) Priority
View Answer
Answer: b
Explanation: None
https://examradar.com/operating-system-scheduling-algorithms-mcqs-type-questions-
answers/
Round-robin scheduling
A. allows interactive tasks quicker access to the processor
B. is quite complex to implement
C. gives each task the same chance at the processor
D. allows processor-bound tasks more time in the processor
E. None of the above
Answer: Option C
1. which of the following can not be scheduled by the kernel?
A. process
B. user-level thread
C. kernel-level thread
D. none of the mentioned
Answer - Click Here:
B
2. if _______ rule sequences the jobs Orders are processed in the sequence they
arrive
A. first come, first served
B. critical ratios
C. earliest due date
D. lack time remaining
Answer - Click Here:
A
3. scheduling algorithm In multilevel feedback
A. processes are not classified into groups
B. a process can move to a different classified ready queue…
C. classification of the ready queue is permanent
D. none of the mentioned
Answer - Click Here:
B
4. Select one which algorithms tend to minimize the process flow time?
A. First come First served
B. Earliest Deadline First
C. Shortest Job First
D. Longest Job First
Answer - Click Here:
C
5. The process can be classified into many groups in
A. shortest job scheduling algorithm
B. multilevel queue scheduling algorithm
C. round-robin scheduling algorithm
D. priority scheduling algorithm
Answer - Click Here:
B
6. The turnaround time for short jobs during multiprogramming is usually Shortened
and that for long jobs is slightly ___________
A. Shortened
B. Unchanged
C. Lengthened
D. Shortened
Answer - Click Here:
C
7. Time quantum can be said
A. multilevel queue scheduling algorithm
B. round-robin scheduling algorithm
C. shortest job scheduling algorithm
D. priority scheduling algorithm
Answer - Click Here:
B
8. Selects the statements which are true according to GATE 2010.
i. starvation may be caused by Shortest remaining time first scheduling
ii. starvation may be caused by Preemptive scheduling
iii. in terms of response time, Round robin is better than FCFS
A. all the given option
B. i only
C. ii and iii only
D. i and iii only
Answer - Click Here:
A
9. At the ready queue when a process arrives In priority scheduling algorithm, the
priority of this process is compared with the priority of?
A. currently running process
B. parent process
C. all process
D. init process
Answer - Click Here:
A
10. The FIFO algorithm said :
A. executes the job first that needs a minimal processor
B. the job first executes that comes last in the queue
C. the job first executes that has maximum processor needs
D. the job first executes that came in first in the queue
Answer - Click Here:
D
11. A program that is bound by CPU might have
A. Cpu bursts many short
B. Cpu bursts a few short
C. Cpu bursts a few longer
D. None of the above
Answer - Click Here:
C
12. scheduling algorithms that work on complex :
A. uses few resources
B. uses most resources
C. are suitable for large computers
D. all of the mentioned
Answer - Click Here:
C
13. scheduling algorithm which allocates the CPU first to the process which requests
the CPU first?
A. FCFS scheduling
B. priority scheduling
C. shortest job scheduling
D. none of the mentioned
Answer - Click Here:
A
14. In an operating system, the portion of the process scheduler that forward
processes is concerned with :
A. running processes are assigning to blocked queue
B. ready processes are assigning to CPU
C. ready processes are assigning to the waiting queue
D. all of the mentioned
Answer - Click Here:
B
15. From the time of submission of a process to the time of completion, The interval
is termed as
A. waiting time
B. turnaround time
C. response time
D. throughput
Answer - Click Here:
B
15. From the time of submission of a process to the time of completion, The interval
is termed as
A. waiting time
B. turnaround time
C. response time
D. throughput
Answer - Click Here:
B
16. under the category of_______ Round-robin scheduling falls :
A. Preemptive scheduling
B. Nonpreemptive scheduling
C. All of the mentioned
D. None of the mentioned
Answer - Click Here:
A
17. The processes that are inhabited in main memory and are ready and waiting to
execute and remained on a list called
A. process queue
B. execution queue
C. job queue
D. ready queue
Answer - Click Here:
18. control of the CPU to the process selected by the short-term scheduler is
assigned by the module ________.
A. interrupt
B. scheduler
C. dispatcher
D. none of the mentioned
Answer - Click Here:
C
b. Preemptive scheduling
a. using very large time slices converts it into First come First served scheduling algorithm
b. using very small time slices converts it into First come First served scheduling algorithm
d. using very small time slices converts it into Shortest Job First algorithm
Answer: (a).using very large time slices converts it into First come First served scheduling algorithm
73. The portion of the process scheduler in an operating system that dispatches processes is concerned with
d. All of these
Answer: (b).first executes the job that came in first in the queue
76. The strategy of making processes that are logically runnable to be temporarily suspended is called :
b. Preemptive scheduling
c. Both a and b
d. None of these
78. There are 10 different processes running on a workstation. Idle processes are waiting for an input event in
scheduled with the Round-Robin timesharing method. Which out of the following quantum times is the bes
processes have a short runtime, e.g. less than 10ms ?
a. tQ = 15ms
b. tQ = 40ms
c. tQ = 45ms
d. tQ = 50ms
79. Which of the following algorithms tends to minimize the process flow time ?
a. I only
d. I, II and III
A.
FIFO
B. Shortest job first
C. Shortest remaining
D. Longest time first
- Answer&Explanation
Answer:Option A
Explanation :
Hide Answer
A.
when the page is not in the memory
B. when the page is in the memory
C. when the process enters the blocked state
D. when the process is in the ready state
- Answer&Explanation
Answer:Option A
Explanation :
Hide Answer
Hide Answer
4. What is a shell ?
A. is a hardware component
B.
It is a command interpreter
C. It is a part in compiler
D. It is a tool in CPU scheduling
- Answer&Explanation
Answer:Option B
Explanation :
Hide Answer
5. Routine is not loaded until it is called. All routines are kept on disk in
a relocatable load format. The main program is loaded into memory &
is executed. This type of loading is called... ?
A. Static loading
B. Dynamic loading
C.
Dynamic linking
D. Overlays
- Answer&Explanation
Answer:Option C
Explanation :
Hide Answer
A.
the processes waiting for I/O are found
B. the process which is running is found
C. the processes waiting for the processor are found
D. none of the above
- Answer&Explanation
Answer:Option A
Explanation :
Hide Answer
Hide Answer
Hide Answer
Hide Answer
10. The number of processes completed per unit time is known as.... ?
A. Output
B.
Throughput
C. Efficiency
D. Capacity
- Answer&Explanation
Answer:Option B
Explanation :
Hide Answer
A.
It takes page frames from other working sets
B. To increase the capacity of main memory
C. To speed up main memory read operation
D. None of above
- Answer&Explanation
Answer:Option A
Explanation :
Hide Answer
A.
All process waiting for the long process to complete
B. All process waiting for the small process to complete
C. Process in not present in main memory
D. None of above
- Answer&Explanation
Answer:Option A
Explanation :
Hide Answer
14. Which of the following algorithm suffers from the Belady's anomly ?
A.
FIFO
B. LIFO
C. Optimal Algorithm
D. None of above
- Answer&Explanation
Answer:Option A
Explanation :
Hide Answer
Hide Answer
16. Which of the following disk scheduling strategies is likely to give the
best throughput ?
A.
Farthest cylinder next
B. Nearest Cylinder next
C. FCFS
D. Elevator algorithm
- Answer&Explanation
Answer:Option A
Explanation :
Hide Answer
Hide Answer
Hide Answer
19. The part of machine level instruction, which tells the central
processor what has to be done, is
A.
Operation code
B. address
C. Locator
D. Flip flop
- Answer&Explanation
Answer:Option A
Explanation :
Hide Answer
A.
Debugging
B. bugging
C. Rectifying
D. modifying
- Answer&Explanation
Answer:Option A
Explanation :
Hide Answer
Hide Answer
A.
FIFO
B. Shortest job first
C. Shortes remaining
D. Longest time first
- Answer&Explanation
Answer:Option A
Explanation :
Hide Answer
Hide Answer
A.
Privileged
B. Ready
C. Running
D. Blocked
- Answer&Explanation
Answer:Option A
Explanation :
Hide Answer
Hide Answer
26. The mechanism that bring a page into memory only when it is
needed is called _____________
A. Sagmentation
B. Fragmentation
C.
Demand Paging
D. Page and Replacement
- Answer&Explanation
Answer:Option C
Explanation :
Hide Answer
27. PCB =
A. Program Control Block
B.
Process Control Block
C. Process Communication Block
D. None
- Answer&Explanation
Answer:Option B
Explanation :
Hide Answer
A.
Non Preemptive Scheduling
B. Deadline Scheduling
C. Preemptive Scheduling
D. Fair share scheduling
- Answer&Explanation
Answer:Option A
Explanation :
No answer description available for this question.
Hide Answer
Hide Answer
A.
to prevent deadlock in operating systems
B. to detect deadlock in operating systems
C. to rectify a deadlocked state
D. None
- Answer&Explanation
Answer:Option A
Explanation :
1. Which mode of the Intel timer 8253 provides a software watchdog timer?
a) rate generator
b) hardware triggered strobe
c) square wave rate generator
d) software triggered strobe
View Answer
Answer: d
Explanation: The software triggered strobe can be used as a software-based watchdog
timer in which the output is connected to a non maskable interrupt.
2. Which of the following mode is similar to the mode 4 of the 8253 timer?
a) mode 5
b) mode 6
c) mode 0
d) mode 1
View Answer
Answer: a
Explanation: The mode 5 or the hardware triggered strobe is similar to the mode 4 or the
square wave rate generator expect that the retriggering is done by the external gate pin.
3. Which pin of 8253 is used for the generation of an external interrupt signal?
a) OUT pin
b) IN pin
c) Interrupt pin
d) Ready pin
View Answer
Answer: a
Explanation: The Intel 8253 timer has no interrupt pins. Therefore, the timer OUT pin is
used to generate an external interrupt signal.
4. Which timer architecture can provide a higher resolution than Intel 8253?
a) Intel 8253
b) Intel 8254
c) 8051 timer
d) MC68230
View Answer
Answer: d
Explanation: The Intel 8253 and 8254 have same pin configuration and functions. 8051
timer is a programmable timer in the 8051 microcontroller. The MC68230 timer
developed by Motorola can provide a powerful timer architecture which can provide
higher resolution than the Intel 8253.
advertisement
Factory Design Pattern
31. Which of the following provides time period for the context switch?
a. timer
b. counter
c. time slice
d. time machine
a. software interrupt
b. hardware interrupt
c. peripheral
d. memory
a. software interrupt
b. hardware interrupt
c. peripheral
d. memory
34. The special tale in the multitasking operating system is also known as
35. Which of the following stores all the task information that the system requires?
c. accumulator
36. Which of the following contains all the task and their status?
a. register
b. ready list
c. access list
d. task list
37. Which determines the sequence and the associated task’s priority?
a. scheduling algorithm
b. ready list
d. application register
a. operating system
b. applications
c. hardware
d. kernel
Answer: (d).kernel
39. Which can control the memory sharing between the tasks?
a. kernel
b. application
c. software
d. OS
Answer: (a).kernel
40. Which of the following can implement the message passing and control?
a. application software
b. operating system
c. software
d. kernel
a) 80387
b) 8087
c) 8089
d) 8088
View Answer
Answer: a
Explanation: 80386 have 80387 as a floating point arithmetic coprocessor which can perform
a) microprocessor
b) microcontroller
c) coprocessor
d) controller
View Answer
Answer: c
Explanation: The coprocessor can perform signal processing, floating point arithmetics,
encryption etc.
a) 8087
b) 8088
c) 8086
d) 8080
View Answer
Answer: a
Explanation: 8087 is the coprocessor for both 8086 and 8088. 8089 is also a coprocessor of 8086
and 80888.
a) 68001
b) 68011
c) 68881
d) 68010
View Answer
Answer: c
5. Which of the following processors can perform exponential, logarithmic and trigonometric
functions?
a) 8086
b) 8087
c) 8080
d) 8088
View Answer
Answer: b
Explanation: 8087 is a coprocessor which can perform all the mathematical functions including
8080 and 8088 are microprocessors which require the help of a coprocessor for floating point
arithmetic.
a) 4
b) 8
c) 16
d) 32
View Answer
Answer: b
Explanation: The 8087 coprocessor does not have a main register set but they have an 8-level
a) 8080
b) 8086
c) 8087
d) 8088
View Answer
Answer: c
Explanation: 8087 is a coprocessor which can handle infinity values with two types of closure
a) 80187
b) 80287
c) 80387
d) 8088
View Answer
Answer: b
Explanation: 80287 uses an affine closure for infinity values whereas 80387 and 80187 support
a) 8087
b) 80187
c) 80287
d) 80387
View Answer
Answer: c
Explanation: 80286 supports 80287 as its floating point coprocessor which helps in floating point
calculations.
a) 40 pin DIP
b) 20 pin DIP
c) 40 pins
d) 20 pins
View Answer
Answer: a
Explanation: All 8087 models have a 40 pin DIP which is operated in 5V.
a) 10 MHz
b) 5 MHz
c) 6 MHz
d) 4 MHz
View Answer
b) 2’s complement
c) decimal
d) gray
View Answer
Answer: b
Explanation: In a coprocessor, negative numbers are stored in 2’s complement with its leftmost
sign bit of 1 whereas positive numbers are stored in the form of true value with its leftmost sign
bit of 0.
13. How many bits are used for storing signed integers?
a) 2
b) 4
c) 8
d) 16
View Answer
Answer: d
Explanation: Signed integers in a coprocessor are stored as 16-bit word, 32-bit double word or
64-bit quadword.
a) 8087
b) 80287
c) 80387
d) 80486DX
View Answer
Answer: d
Explanation: 8087 is an external IC designed to operate with the 8088/8086 processor but
80486DX is an on-chip coprocessor that is, it does not require an extra integrated chip for
View Answer
Answer: a
Explanation: Control unit interfaces the coprocessor with its main microprocessor whereas
a) SPARC
b) 80386
c) MC68030
d) MC68020
View Answer
Answer: a
Explanation: SPARC and MIPS processors are the first generation processors of RISC
architecture.
View Answer
Answer: a
Explanation: 80% of instructions are generated and only 20% of the instruction set is executed
that is, by simplifying the instructions, the performance of the processor can be increased which
a) SPARC
b) MC68030
c) MC68030
d) 8086
View Answer
Answer: a
Explanation: SPARC have RISC architecture which has a simple instruction set but MC68020,
MC68030, 8086 have CISC architecture which is more complex than CISC.
a) Intel
b) IBM
c) Motorola
d) MIPS
View Answer
Answer: b
19. Which of the following processors execute its instruction in a single cycle?
a) 8086
b) 8088
c) 8087
d) MIPS R2000
View Answer
Answer: d
Explanation: MIPS R2000 possess RISC architecture in which the processor executes its
instruction in a single clock cycle and also synthesize complex operations from the same reduced
instruction set.
b) opcode instruction
c) memory instruction
d) bus instruction
View Answer
Answer: a
Explanation: The data of memory address is loaded into a register and manipulated, its contents
b) SSEM
c) PIC
d) CSIRAC
View Answer
Answer: c
Explanation: PIC follows Harvard architecture in which the external bus architecture consist of
separate buses for instruction and data whereas SSEM, EDSAC, CSIRAC are stored program
architecture.
22. Which of the following statements are true for von Neumann architecture?
View Answer
Answer: a
Explanation: von Neumann architecture shares bus between program memory and data memory
whereas Harvard architecture have a separate bus for program memory and data memory.
a) content-addressable memory
View Answer
Answer: a
a) TEXAS TMS320
b) 80386
c) 80286
d) 8086
View Answer
Answer: a
Explanation: It is a digital signal processor which have small and highly optimized audio or
a) Intel
b) Motorola
c) university of Berkeley
d) MIPS
View Answer
Answer: c
Explanation: The University of Berkeley and Stanford university provides the basic architecture
model of RISC.
b) Harvard
c) RISC
d) CISC
View Answer
Answer: a
Explanation: The von Neumann architecture is also known as von Neumann model or Princeton
architecture.
a) David Patterson
b) von Neumann
c) Michael J Flynn
d) Harvard
View Answer
Answer: a
Explanation: David Patterson of Berkeley university coined the term RISC whereas Michael J
a) AVR
b) Zilog80
c) 8051
d) Motorola 6800
View Answer
Answer: a
Explanation: AVR is an 8-bit RISC architecture developed by Atmel. Zilog80, 8051, Motorola
a) AVR
b) Atmel
c) Blackfin
d) Zilog Z80
View Answer
Answer: d
Explanation: Zilog80 have CISC architecture whereas AVR, Atmel and blackfin possess RISC
architecture
a) Flash memory
b) PROM
c) EPROM
d) ROM
View Answer
Answer: d
Explanation: The basic non-volatile memory is ROM or mask ROM, and the content of ROM is
fixed in the chip which is useful in firmware programs for booting up the system.
a) Dr.FujioMasuoka
b) John Ellis
c) Josh Fisher
d) John Ruttenberg
View Answer
Answer: a
Explanation: Flash memory is invented by Dr. FujioMasuoka at Toshiba in the 1980s which are a
non-volatile memory.
a) RAM
b) Flash memory
c) Shifters
d) ROM
View Answer
Answer: c
Explanation: The memory arrays are basically divided into three which are random access
memory, serial access memory, and content address memory. Serial access memory is divided
b) ferrimagnetic memory
c) anti-magnetic memory
d) anti-ferromagnetic
View Answer
Answer: a
Explanation: The early form of non-volatile memory is known as magnetic core memory in
34. Which of the following memories has more speed in accessing data?
a) SRAM
b) DRAM
c) EPROM
d) EEPROM
View Answer
Answer: a
Explanation: SRAM have more speed than DRAM because it has 4 to 6 transistors arranged as
flip-flop logic gates, that is it can be flipped from one binary state to another but DRAM has a
a) DRAM
b) SRAM
c) EPROM
d) EEPROM
View Answer
Answer: a
Explanation: The signals in address bus are multiplexed with DRAM non-multiplexed with
SRAM.
36. How many main signals are used with memory chips?
a) 2
b) 4
c) 6
d) 8
View Answer
Answer: b
Explanation: The main signals associated with memory chips are four. These are the signals
associated with address bus, data bus, chip select signals, and control signals for read and write
operations.
View Answer
Answer: c
Explanation: Address bus is used to choose a particular location in the memory chip. Data bus is
used to provide data to and from the chip. Chip select signals are used to select a particular chip
within the memory.
38. Which are the two main types of processor connection to the motherboard?
View Answer
Answer: a
Explanation: The type of processor which connects to a socket on the bottom surface of the chip
that connects to the motherboard by Zero Insertion Force Socket. Intel 486 is an example of this
type of connection. The processor slot is one which is soldered into a card, which connects to a
a) microcontroller
b) microprocessor
c) coprocessor
d) FPGA
View Answer
Answer: d
Explanation: Field programmable gate arrays is a type of multi-core architecture whose hardware
a) Intel
b) IBM
c) Apple
d) NXP Semiconductor
View Answer
Answer: d
b) M68000
c) DSP56000
d) TMS 320
View Answer
Answer: b
Explanation: The M68000 family has a 16 Mbyte addressing range. The PowerPC family has a
larger 4 Gbyte range and the DSP56000 has a 128-kilo word address space.
42. Which of the following can destroy the accuracy in the algorithms?
a) delays
b) error signal
c) interrupt
d) mmu
View Answer
Answer: a
Explanation: The delays occurring in the memory management unit can destroy the accuracy in
the algorithms and in order to avoid this, the linear addressing range should be increased.
43. How many numbers of ways are possible for allocating the memory to the modular blocks?
a) 1
b) 2
c) 3
d) 4
View Answer
Answer: c
Explanation: Most of the systems have a multitasking operating system in which the software
consist of modular blocks of codes which run under the control of the operating system. There
are three ways for allocating memory to these blocks. The first way distributes the block in a
predefined way. The second way for allocating memory includes relocation or position
independency in the software and the other way of allocating memory to the block is the address
44. Which of the following is replaced with the absolute addressing mode?
a) relative addressing mode
View Answer
Answer: a
Explanation: The memory allocation of the modular blocks can be done by the writing the
software program in relocatable or position independent manner which can execute anywhere in
the memory map, but relocatable code must have the same address between its data and code
segments. This is used to avoid the use of absolute addressing modes which is replaced by the
a) address translation
b) large storage
View Answer
Answer: a
Explanation: The memory management unit handles with physical addresses. Therefore, the
a) memory
b) DRAM
c) SRAM
d) Memory partitioning
View Answer
Answer: d
Explanation: The memory partitioning provides stability to the multitasking system so that the
errors within one task will not corrupt the other tasks.
a) M68000
b) 80386
c) 8086
d) 80286
View Answer
Answer: a
Explanation: The M68000 uses memory partitioning by the use of function code or by the
48. What can be done for the fine grain protection of the processor?
d) remains unchanged
View Answer
Answer: a
Explanation: The finer grain protection of memory management is achieved by the addition of
extra description bit to an address to declare its status. The memory management unit can detect
an error if the task attempts to access memory that has not been allocated to it or a certain kind of
mismatch occurs.
49. Which of the following technique is used by the UNIX operating system?
d) translational address
View Answer
Answer: c
Explanation: In the workstation and in the UNIX operating system virtual memory technique is
frequently used in which the main memory is divided into different segments and pages. These
pages will have a virtual address which can increase the address spacing.
50. Which of the following consist two lines of legs on both sides of a plastic or ceramic body?
a) SIMM
b) DIMM
c) Zig-zag
d) Dual in-line
View Answer
Answer: d
Explanation: The dual-in-line package consists of two lines of legs on both sides of the plastic or
51. Which of the following can transfer multiple bits of data simultaneously?
a) serial port
b) sequential port
c) concurrent unit
d) parallel port
View Answer
Answer: d
Explanation: The parallel port can transfer multiple bits of data simultaneously. It provides the
input or output binary data with a single bit allocated to each pin within the port.
52. Which of the following are interfaced as inputs to the parallel ports?
a) LEDs
b) switch
c) alphanumeric display
View Answer
Answer: b
Explanation: The LEDs, alphanumeric displays, seven segment displays are interfaced for the
53. Which of the following are interfaced as the outputs to the parallel ports?
a) keyboards
b) switches
c) LEDs
d) knobs
View Answer
Answer: c
Explanation: The keyboards, switches, and knobs are used as output whereas the LEDs are used
54. How many registers are there to control the parallel port in the basic form?
a) 1
b) 3
c) 2
d) 5
View Answer
Answer: c
Explanation: The basic operation of the parallel port dealt with two types of registers which are
a) output port
b) input port
c) parallel port
d) output-input port
View Answer
Answer: a
Explanation: The progression in the parallel ports provides a third register or an individual
control bit which can make the pin in a high impedance state. An output port which can do this is
also known as tri-state, that is, logic high, logic low and a high impedance state.
View Answer
Answer: b
Explanation: The implementation of parallel port uses a couple of buffers which are enabled by
the data direction register by setting the corresponding bit of the register.
View Answer
Answer: c
Explanation: The register which offers high impedance is the individual control bit or the third
register which can be implemented by switching off both the buffers and putting their
b) parallel port
c) DMA port
d) memory port
View Answer
Answer: a
Explanation: The multifunction I/O port can also be used a chip select for the memory design.
The function that the pin performs is set up internally through the use of a function register
which internally configures how the external pins are connected internally.
59. Which of the following is necessary for the parallel input-output port?
a) inductor
b) pull-up resistor
c) push-up resistor
d) capacitor
View Answer
Answer: b
Explanation: The I/O port needs an external pull-up resistor. In some devices, it offers internally.
If it is not provided, it can cause incorrect data on reading the port and it prevents the port from
c) DMA port
d) output port
View Answer
Answer: a
Explanation: The multifunction I/O ports can be described as the general-purpose and it can be
View Answer
Answer: a
Explanation: The UART or universal asynchronous receiver transmitter is used for the data
a) counter
b) timer
c) clock
d) first bit
View Answer
Answer: c
Explanation: The data can be detected by the local clock reference which is generated from the
a) READY
b) START
c) STOP
d) TXD
View Answer
Answer: d
Explanation: The TXD signal goes to logic one, when no data is transmitted. When data
a) bit rate
b) baud rate
c) speed rate
d) voltage rate
View Answer
Answer: b
Explanation: The timing is defined by the baud rate in which both the transmitter and receiver
are used. The baud rate is supplied by the counter or an external timer called baud rate generator
b) external timer
c) peripheral
d) internal timer
View Answer
Answer: b
Explanation: The baud rate is supplied by the counter or an external timer called baud rate
a) 8253
b) 8254
c) 8259
d) 8250
View Answer
Answer: d
Explanation: The Intel 8253, 8254 and 8259 are timers whereas Intel 8250 is a UART which is
commonly used.
67. Which company developed 16450?
a) Philips
b) Intel
c) National semiconductor
d) IBM
View Answer
Answer: c
Explanation: The Intel 8250 is replaced by the 16450 and 16550 which are developed by the
National Semiconductors. 16450 is a chip which can combines all the PC’s input output devices
a) address signal
View Answer
Answer: b
Explanation: The ADS is address strobe signal and is working as active low in 8250 UART. The
ADS signal is used to latch the address and chip select signals while a processor access.
69. Which of the following signals are active low in the 8250 UART?
a) BAUDOUT
b) DDIS
c) INTR
d) MR
View Answer
Answer: a
Explanation: The BAUDOUT signal is active low whereas DDIS, INTR and MR are active high
in the 8250 UART. BAUDOUT is the clock signal from the transmitter part of the UART. DDIS
signal goes low when the CPU is reading data from the UART. INTR is the interrupt pin. MR is
70. Which of the signal can control bus arbitration logic in 8250?
a) MR
b) DDIS
c) INTR
d) RCLK
View Answer
Answer: b
Explanation: DDIS signal goes low when the CPU is reading data from the UART and it also
71. Which of the following can be used for long distance communication?
a) I2C
b) Parallel port
c) SPI
d) RS232
View Answer
Answer: d
Explanation: A slightly different serial port called RS232 is used for long distance
communication, otherwise the clock may get skewed. The low voltage signal also affect the long
distance communication.
72. Which of the following can affect the long distance communication?
a) clock
b) resistor
c) inductor
d) capacitor
View Answer
Answer: a
Explanation: For small distance communication, the clock signal which allows a synchronous
transmission of data is more than enough, and the low voltage signal of TTL or CMOS is
sufficient for the operation. But for long distance communication, the clock signal may get
skewed and the low voltage can be affected by the cable capacitance. So for long distance
d) COM3
View Answer
Answer: c
Explanation: The IBM PC has one or two serial ports called the COM1 and the COM2, which
are used for the data transmission between the PC and many other peripheral units like printer,
modem etc.
a) RS232
b) Parallel port
c) Counter
d) Timer
View Answer
Answer: a
Explanation: In RS232, several lines are used for transmitting and receiving data and these also
a) SPI
b) RS232
c) Parallel port
d) I2C
View Answer
Answer: b
Explanation: The data is transmitted asynchronously in RS232 which enhance long distance
communication, whereas SPI, I2C offers short distance communication, and therefore, they are
a) 1
b) 3
c) 2
d) 4
View Answer
Answer: c
Explanation: The serial interface is divided into two, physical interface and the electrical
interface.
a) UART
b) SPI
c) Physical interface
d) Electrical interface
View Answer
Answer: d
Explanation: The RS232 is also known as the physical interface and it is also known as EIA232.
a) 12V
b) 5V
c) 3.3V
d) 2.2V
View Answer
Answer: b
Explanation: The MC1489 is a interface chip which can take a 5V and generate internally the
a) SPI
b) I2C
c) Serial port
d) RS232
View Answer
Answer: d
Explanation: The RS232 is a physical interface. It does not follow the serial protocol.
80. Which of the following is an ideal interface for LCD controllers?
a) SPI
b) parallel port
c) Serial port
d) M-Bus
View Answer
Answer: d
Explanation: M-Bus or Motorola Bus is an ideal interface for LCD controllers, A/D converters,
EEPROMs and many other components which can benefit faster transmission.
c) kernel
d) applications
View Answer
Answer: b
Explanation: The multitasking operating system works by dividing the processor’s time into
different discrete time slots, that is, each application requires a defined number of time slots to
82. Which of the following decides which task can have the next time slot?
b) applications
c) kernel
d) software
View Answer
Answer: c
Explanation: The operating system kernel decides which task can have the next time slot. So
instead of the task executing continuously until completion, the execution of the processor is
83. Which of the following controls the time slicing mechanism in a multitasking operating
system?
a) kernel
c) multitasking kernel
d) application manager
View Answer
Answer: c
Explanation: The multitasking operating systems are associated with the multitasking kernel
84. Which of the following provides time period for the context switch?
a) timer
b) counter
c) time slice
d) time machine
View Answer
Answer: c
Explanation: The time period required for each task for execution before it is stopped and
85. Which of the following can periodically trigger the context switch?
a) software interrupt
b) hardware interrupt
c) peripheral
d) memory
View Answer
Answer: b
Explanation: The time period required for each task for execution before it is stopped and
replaced during a context switch is known as the time slice. These are periodically triggered by a
a) software interrupt
b) hardware interrupt
c) peripheral
d) memory
View Answer
Answer: b
Explanation: The multitasking operating systems deals with the multitasking kernel which
controls the time slicing mechanism and the time period required for each task for execution
before it is stopped and replaced during a context switch is known as the time slice which are
periodically triggered by a hardware interrupt from the system timer. This hardware interrupt
provides the system clock in which several interrupts are executed and counted before a context
switch is performed.
87. The special tale in the multitasking operating system is also known as
View Answer
Answer: a
Explanation: When a context switch is performed, the current program or task is interrupted, so
the processor’s registers are saved in a special table which is known as task control block.
88. Which of the following stores all the task information that the system requires?
b) register
c) accumulator
View Answer
Answer: d
Explanation: The task control block stores all the task information that the system requires and
this is done when the context switch is performed so that the currently running program is
interrupted.
89. Which of the following contains all the task and their status?
a) register
b) ready list
c) access list
d) task list
View Answer
Answer: b
Explanation: The ‘ready’ list possesses all the information regarding a task, that is, all the task
and its corresponding status which is used by the scheduler to decide which task should execute
90. Which determines the sequence and the associated task’s priority?
a) scheduling algorithm
b) ready list
d) application register
View Answer
Answer: a
Explanation: The scheduling algorithm determines the sequence and an associated task’s priority.
91. Which of the following can be used to refer to entities within the RTOS?
a) threads
b) kernels
c) system
d) applications
View Answer
Answer: a
Explanation: The threads and processes can be used to refer to entities within the RTOS. They
provide an interchangeable replacement for the task. They have a slight difference in their
function.
92. Which of the following defines the set of instructions loaded into the memory?
a) process
b) task
c) thread
d) system hardware
View Answer
Answer: b
Explanation: The task can be defined by the set of instructions which is loaded into the memory
a) thread
b) process
c) task
d) kernel
View Answer
Answer: a
Explanation: Threads uses a shared memory space and it uses the memory space of the process.
a) process
b) thread
c) task
d) kernel
View Answer
Answer: a
Explanation: The program in execution is known as the process. The process does not share the
memory space but the threads have a shared memory address. When the CPU switches from
95. Which of the following can own and control the resources ?
a) thread
b) task
c) system
d) peripheral
View Answer
Answer: b
Explanation: The task and process have several characteristics and one such is that the task or
process can own or control resources and it has threads of execution which are the paths through
the code.
96. Which can be supported if the task or process maintains a separate data area for each thread?
c) multiple threads
d) dual threads
View Answer
Answer: c
Explanation: The multiple threads can be supported only if the process or task can maintain a
a) process
b) thread
c) kernel
d) operating system
View Answer
Answer: a
Explanation: The process has threads of execution which are the paths through the code.
a) task
b) process
c) thread
d) kernel
View Answer
Answer: c
Explanation: The threads are a part of the process, that is, it uses a shared memory of the process
and therefore said that its resources are inherited from the parent process or task.
99. Which term is used to encompass more than a simple context switch?
a) process
c) thread
d) multithread
View Answer
Answer: a
Explanation: The process includes the additional information which is used to encompass more
than a simple context switch. This is similar to the task switching, that is why it is said that
100. Which can be considered as the lower level in the multitasking operating system?
a) process
b) task
c) threads
d) multi threads
View Answer
Answer: c
Explanation: In the multitasking operating system, the process and tasks form the higher level
whereas the thread is the lower level. But in a simple operating system, there is no difference
101. Which of the following are the pin efficient method of communicating between other
devices?
a) serial port
b) parallel port
c) peripheral port
d) memory port
View Answer
Answer: a
Explanation: The serial ports are considered to be the pin efficient method of communication
102. Which of the following depends the number of bits that are transferred?
a) wait statement
b) ready statement
c) time
d) counter
View Answer
Answer: c
Explanation: The time taken for the data transmission within the system depends on the clock
103. Which of the following is the most commonly used buffer in the serial porting?
a) LIFO
b) FIFO
c) FILO
d) LILO
View Answer
Answer: b
Explanation: Most of the serial ports uses a FIFO buffer so that the data is not lost. The FIFO
buffer is read to receive the data, that is, first in first out.
View Answer
Answer: b
Explanation: The serial parallel interface bus is a commonly used interface which involves
master slave mechanism. The shift registers are worked as master and the slave devices are
105. Which allows the full duplex synchronous communication between the master and the
slave?
a) SPI
b) serial port
c) I2C
d) parallel port
View Answer
Answer: a
Explanation: The serial peripheral interface allows the full duplex synchronous communication
between the master and the slave devices. MC68HC05 developed by Motorola uses SPI for
a) 8086
b) 8253
c) 8254
d) MC68HC11
View Answer
Answer: d
Explanation: The MC68HC05 and MC68HC11 microcontrollers uses the serial peripheral
107. In which register does the data is written in the master device?
a) index register
b) accumulator
c) SPDR
d) status register
View Answer
Answer: c
Explanation: The serial peripheral interface follows a master slave mechanism in which the data
is written to the SPDR register in the master device and clocked out into the slave device SPDR
a) wait statement
b) ready statement
c) interrupt
d) remains unchanged
View Answer
Answer: c
Explanation: The interrupts are locally generated when 8-bits are transferred so that the data can
be read before the next byte is clocked through.
109. Which signal is used to select the slave in the serial peripheral interfacing?
a) slave select
b) master select
c) interrupt
d) clock signal
View Answer
Answer: a
Explanation: The slave select signal selects which slave is to receive data from the master.
110. How much time period is necessary for the slave to receive the interrupt and transfer the
data?
View Answer
Answer: b
Explanation: The SPI uses an eight clock time period for the slave to receive the interrupt and
111. Which of the following allows a lower priority task to run despite the higher priority task is
a) message queue
b) message passing
c) semaphore
d) priority inversion
View Answer
Answer: d
Explanation: The priority inversion mechanism where the lower priority task can continue to run
despite there being a higher priority task active and waiting to preempt.
a) disable interrupt
b) enable interrupts
c) remains unchanged
d) ready state
View Answer
Answer: a
Explanation: In the interrupt service routine, all the other interrupts are disabled till the routine
completes which can cause a problem if another interrupt is received and held pending. This can
a) memory
b) input
c) ISR
d) register
View Answer
Answer: c
Explanation: The ISR can send the message for the tasks and it is a part of RTOS kernel.
b) data bus
c) address bus
d) VMEbus
View Answer
Answer: d
Explanation: The VMEbus is an interconnection bus which is used in the industrial control and
a) kernel
b) operating system
c) VMEbus
d) data bus
View Answer
Answer: c
Explanation: The VMEbus supports seven interrupt priority level which allows the prioritisation
of the resources
116. Which allows the parallel development of the hardware and software in the simulation?
c) cpu simulator
d) onboard simulator
View Answer
Answer: a
Explanation: The high-level language simulation allows a parallel development of the software
and the hardware and when two parts are integrated, that will work. It can simulate I/O using the
keyboard as the inputs or task which passes input data for other modules.
a) data entity
b) data entry
c) data table
d) data book
View Answer
Answer: c
Explanation: In the high-level language simulation, many techniques are used to simulate the
system and one such is the data table which contains the data sequences which are used to test
the software.
118. Which allows the UNIX software to be ported using a simple recompilation?
a) pSOS+
c) pSOS+m
d) pOS+kernel
View Answer
Answer: b
Explanation: The most of the operating system supports or provide the UNIX-compatible library
which supports the UNIX software to be ported using a simple recompilation.
119. Which of the following can simulate the processor, memory, and peripherals?
a) input simulator
b) peripheral simulator
c) memory simulator
d) cpu simulator
View Answer
Answer: d
Explanation: The CPU simulator can simulate the memory, processor, and the peripherals and
allow the low-level assembler code and the small HLL programs to be tested without the actual
hardware.
120. How many categories are there for the low-level simulation?
a) 2
b) 3
c) 4
d) 5
View Answer
Answer: a
Explanation: There are two categories for the low-level simulation. The first category simulates
the memory system, programming model and can offer simple debugging tools whereas the
second category simulation provides timing information based on the number of clocks.
121. Which of the following can simulate the LCD controllers and parallel ports?
a) memory simulator
b) sds
c) input simulator
d) output tools
View Answer
Answer: b
Explanation: There are certain tools which provide powerful tools for simulation and one such is
the SDS which can simulate the processor, memory systems, integrated processor, onboard
a) high-level simulator
b) low-level simulator
c) onboard debugger
d) cpu simulator
View Answer
Answer: c
debugging the software. It usually handles EPROMs which are plugged into the board or a set of
123. Which of the following has the ability to download code using a serial port?
a) cpu simulator
c) onboard debugger
View Answer
Answer: c
Explanation: The onboard debugger has the ability to download code from a floppy disk or by
124. What does the processor fetches from the EPROM if the board is powered?
a) reset vector
b) ready vector
c) start vector
d) acknowledge vector
View Answer
Answer: a
Explanation: The processor fetches its reset vector from the table which is stored in the EPROM
when the board is powered and then starts the initialize the board.
125. Which of the following device can transfer the vector table from the EPROM?
a) ROM
b) RAM
c) CPU
d) peripheral
View Answer
Answer: b
Explanation: When the board gets powered up, the reset vector from the table stored in the
EPROM makes the initialisation of the board and is transferred to the RAM from the EPROM
through the hardware where the EPROM memory address is temporarily altered.
126. Which of the following allows the reuse of the software and the hardware components?
b) memory design
c) peripheral design
d) input design
View Answer
Answer: a
Explanation: The platform design allows the reuse of the software and the hardware components
in order to cope with the increasing complexity in the design of embedded systems.
127. Which of the following is the design in which both the hardware and software are
c) software/hardware codesign
d) peripheral design
View Answer
Answer: c
Explanation: The software/hardware codesign is the one which having both hardware and
software design concerns. This will help in the right combination of the hardware and the
View Answer
Answer: b
Explanation: The platform-based design helps in the reuse of both the hardware and the software
components. The application programming interface helps in extending the platform towards the
software applications.
129. Which activity is concerned with identifying the task at the final embedded systems?
a) high-level transformation
b) compilation
c) scheduling
View Answer
Answer: d
Explanation: There are many design activities associated with the platforms in the embedded
system and one such is the task-level concurrency management which helps in identifying the
a) compilation
b) scheduling
c) high-level transformation
d) hardware/software partitioning
View Answer
Answer: c
Explanation: The high-level transformation are responsible for the high optimizing
transformations, that is, the loops can be interchanged so that the accesses to array components
131. Which design activity helps in the transformation of the floating point arithmetic to a fixed
point arithmetic?
a) high-level transformation
b) scheduling
c) compilation
d) task-level concurrency management
View Answer
Answer: a
Explanation: The high-level transformation are responsible for the high optimizing
transformations, that is, for the loop interchanging and the transformation of the floating point
arithmetic to the fixed point arithmetic can be done by the high-level transformation.
a) scheduling
b) high-level transformation
c) hardware/software partitioning
d) compilation
View Answer
Answer: c
133. Which of the following is approximated during hardware/software partitioning, during tasklevel
concurrency management?
a) scheduling
b) compilation
d) high-level transformation
View Answer
Answer: a
Explanation: The scheduling is performed in several contexts. It should be approximated with the
other design activities like the compilation, hardware/software partitioning, and task-level
concurrency management. The scheduling should be precise for the final code.
134. Which of the following is a process of analyzing the set of possible designs?
b) scheduling
c) compilation
d) hardware/software partitioning
View Answer
Answer: a
Explanation: The design space exploration is the process of analyzing the set of designs and the
d) processor design
View Answer
Answer: b
Explanation: The platform is an abstraction layer which covers many possible refinements to a
Ans: d
Ans: a
Ans: b
Ans: a
Ans: b
Ans: a
Ans: a
Ans: a
Ans: b
10. The ___ state means that this task has not got to do right now, even if the CPU is available.
Ans: c
11. A _____ function may not use the hardware in a monatomic way.
Ans: c
Ans: b
13. A ____ RTOS will stop a lower-priority task as soon as the higher-priority task unblocks.
Ans: a
14. A_____ RTOS will only take the microprocessor away from the lower-priority task when that
task blocks.
a. preemptive b. non preemptive c. interpret d. exception
Ans: b
15. A function that works properly even if it is called by more than one task is called a ____
function.
Ans: c
16. The ____ state means that the microprocessor is executing the instructions that make up this.
Ans: a
17. The ___ state means that some other task is in the running state but that this task
the things that it could do if the microprocessor becomes available.
Ans: b
18. A semaphore that does not specify the order in which processes are removed from the queue
is _
Ans: d
19. The process that has been blocked the longest is released from the queue
Ans: b
20. Semaphores
Ans: c
Ans: c
Ans: b
23. For both counting semaphores and binary semaphores, a _____ is used to hold processes
waiting on the semaphores.
Ans: b
Ans: a
Ans: c
Ans: d
27. A semaphore count of negative n means (s= -n) that the queue contains waiting process.
a. n+1 b. n c. n-1 d. 0
Ans: b
Ans: d
29. In a time sharing operating system, when the time slot given to a process is completed ,
the process goes from the RUNNING state of the
Ans: b
a. locked state b. unlocked state c. either in locked state or unlocked state d. neither in locked
state nor unlocked state
Ans: c
Which task method follows a currently running task to be stopped by a higher priority task?
a.
b.
c.
d.
Answer: (d).pre-emption
a. time slice
b. scheduling algorithm
c. pre-emption
d. cooperative multitasking
54. Which of the following task swapping method is a better choice in the embedded systems design?
a. RMS
b. pre-emptive
c. cooperative multitasking
d. time slice
Answer: (b).pre-emptive
55. Which of the following allows a lower priority task to run despite the higher priority task is active and waitin
a. message queue
b. message passing
c. semaphore
d. priority inversion
a. disable interrupt
b. enable interrupts
c. remains unchanged
d. ready state
a. memory
b. input
c. ISR
d. register
View Answer Report Discuss Too Difficult!
Answer: (c).ISR
b. data bus
c. address bus
d. VMEbus
Answer: (d).VMEbus
a. kernel
b. operating system
c. VMEbus
d. data bus
Answer: (c).VMEbus
a. centralised interrupt
c. distributed handling
d. shared handling
3. When other tasks can run, the kernel can switch control to the user-supplied
routine instead of to the idle task. (True or False)
Ans. False
4. When a task is first created and made ready to run, the kernel puts it into the ___.
Ans. ready state
5. ___ occurs when higher priority tasks use all of the CPU execution time and lower
priority tasks do not get to run.
Ans. CPU starvation
6. On a single-processor system, only one task can run at a time. (Yes or No)
Ans. Yes
10. The ___ tracks the number of times a semaphore has been acquired or released
by maintaining a token count.
Ans. Kernel
11. The ___ is the part of the scheduler that performs context switching and changes
the flow of execution.
Ans. dispatcher
14. What happens when a higher priority task is blocked and is waiting for a resource
being used by a lower priority task?
Ans. Priority inversion occurs
15. ___ specify the initial semaphore state and the task-waiting order.
Ans. Binary
16. To clear all tasks waiting on a semaphore task-waiting list, some kernels support
a ___ operation.
Ans. Flush
17. Two tasks can communicate for the purpose of synchronization without
exchanging data. (True or False)
Ans. True
21. Which scheduling provides each task with an equal share of the CPU execution
time?
Ans. Round-robin
22. ___ are concurrent and independent threads of execution that can compete for
CPU execution time.
Ans. Tasks
23. Different kernels store message queues in different locations in memory. (True or
False)
Ans. True
28. An event register can count the occurrences of the same event while it is
pending. (True or False)
Ans. False
29. A ___ is a software interrupt that is generated when an event has occurred.
Ans. Signal
30. The number and type of signals defined is both system-dependent and ___
dependent.
Ans. RTOS
32. A task must first acquire the ___ before evaluating the predicate.
Ans. mutex
36. ___ are the portions of the program code that handle the interrupt requests.
Ans. Interrupt Service Routines (ISR)
37. The time required for the CPU to return to the interrupted code /highest priority
task is called ___.
Ans. interrupt recovery time
38. An embedded system with a single CPU can run only one process at an instance.
(True/False)
Ans. True
40. In embedded systems code must be stored in ___ and data in ___.
Ans. ROM, RAM
41. ___ is a real-time operating system made and sold by Wind River Systems of
Alameda, California, USA.
Ans. VxWorks
42. ___ is based on the idea of running most of the OS in the form of a number of
small tasks, known as servers.
Ans. QNX
44. Heap memory is typically used by the kernel for dynamic memory allocation of
data space for tasks. (True/False)
Ans. False
45. Fundamental to the operation of most pre-emptive RTOSs is the concept of a tick
timer or heartbeat. (True/False)
Ans. True
48. The RISC architecture follows the philosophy that ___ instruction should be
performed every clock cycle.
Ans. One
49. ___ is a von Neumann architecture machine, while ___ uses Harvard architecture.
Ans. ARM7, ARM9
50. SHARC is a high-performance floating-point and fixed-point DSP from Analog
Devices. (True/False)
Ans. True
53. The I²C reference design has a ___ address space with 16 reserved addresses.
Ans. 7-bit
54. The transmission starts when SDL is pulled low while SCL remains high. (True or
False)
Ans. True
56. CAN is a synchronous bus – all transmitters must send at the same time for bus
arbitration to work.
(True or False)
Ans. True
57. When all nodes are transmitting 1s, the bus is said to be in the ___ state.
Ans. recessive
58. Using ___ devices, high baud rates and high busloads with many messages can be
handled.
Ans. Full CAN
60. A node that transmits data among different types of networks is known as a ___.
Ans. Router
61. 68. The canonical example of a pipelined processor is a ___ processor, with five
stages.
Ans. RISC
1. Which of the following are the proposals for multiprocessor thread scheduling and
processor assignment?
i) Load Sharing ii) Gang Scheduling iii) Dynamic Scheduling iv) Load Scheduling
A) i, ii and iii only
B) ii, iii and iv only
C) i, iii and iv only
D) All i, ii, iii and iv
4. In …………………. approach, the scheduling routine of the operating system is run of that
processor to select the next thread.
A) Load Sharing
B) Gang Scheduling
C) Dynamic Scheduling
D) Load Scheduling
Ads by optAd360
5. Which of the following is/are the advantages of load sharing.
i) Preempted threads are unlikely to resume execution on the same processor.
ii) The central queue occupies a region of memory that must be accessed in a manner that
enforces mutual exclusion.
iii) If all threads are treated as a common pool of threads, it is unlikely that all of the
threads of a program will gain access to processors at the same time.
A) i and ii only
B) ii and iii only
C) i and iiii only
D) All i, ii and iii
7. An ……………. has a deadline by which it must finish or start, or if may have a constraint
on both and finish time.
A) hard real-time task
B) soft real-time task
C) aperiodic task
D) periodic task
10. …………………. is concerned with how long operating system delays before
acknowledging an interrupt.
A) Determinism
B) Responsiveness
C) Reasonableness
D) Operatives
11. State whether the following statements are True or False for the features of the real-
time operating system.
i) fast process or thread switch
13. The result of the ……………… in real-time scheduling is a schedule that determines, at
run time, when a task must begin execution.
A) Static table-driven approaches
B) Dynamic best effort approaches
C) Static priority-driven preemptive approaches
D) Dynamic planning based approaches
15. In …………….. feasibility is determined at run time rather than offline prior to the start
of execution.
A) Static table-driven approaches
B) Dynamic best effort approaches
C) Static priority-driven preemptive approaches
D) Dynamic planning based approaches
16. In …………….. of real-time scheduling, the system tries to meet all deadlines and aborts
any started process whose deadline is missed.
A) Static table-driven approaches
B) Dynamic best effort approaches
C) Static priority-driven preemptive approaches
D) Dynamic planning based approaches
17. ………………. is applicable to tasks that are periodic. Input to the analysis consists of the
periodic ending deadline and relative priority of each task.
A) Static table-driven scheduling
B) Dynamic best-effort scheduling
C) Static priority-driven preemptive scheduling
D) Dynamic planning based scheduling
Ads by optAd360
A) Static table-driven scheduling
B) Dynamic best-effort scheduling
C) Static priority-driven preemptive scheduling
D) Dynamic planning based scheduling
19. With ……………… after a task arrives, but before its execution begins, an attempt is
made to create a schedule that contains the previously scheduled tasks as well as the new
arrival.
A) Static table-driven scheduling
B) Dynamic best-effort scheduling
C) Static priority-driven preemptive scheduling
D) Dynamic planning based scheduling
20. …………………. is the approach used by many real-time systems that are currently
commercially available.
A) Static table driven scheduling
B) Dynamic best-effort scheduling
C) Static priority-driven preemptive scheduling
D) Dynamic planning based scheduling
1. What are the services operating System provides to both the users
and to the programs?
A. File System manipulation
B. Error Detection
C. Program execution
D. Resource Allocation
View Answer
Ans : C
Explanation: An Operating System provides services to both the users and to the
programs. It provides programs an environment to execute and It provides users the
services to execute the programs in a convenient manner.
Explanation: Examples of storage media include magnetic tape, magnetic disk and
optical disk drives like CD, DVD.
Explanation: Operating system provides the access to the required I/O device when
required.
Explanation: Computers can store files on the disk (secondary storage), for long-term
storage purpose. Examples of storage media include magnetic tape, magnetic disk and
optical disk drives like CD, DVD.
Explanation: the major activities of an operating system with respect to protection : The
OS ensures that all access to system resources is controlled.
a) test pattern
b) debugger pattern
c) bit pattern
d) byte pattern
View Answer
Answer: a
Explanation: While testing any devices or embedded systems, we apply some selected inputs which
is known as the test pattern and observe the output. This output is compared with the expected
output. The test patterns are normally applied to the already manufactured systems.
a) bit pattern
b) parity pattern
c) test pattern
d) byte pattern
View Answer
Answer: c
Explanation: For testing any devices or embedded systems, we use some sort of selected inputs
which is known as the test pattern and observe the output and is compared with the expected
output. These test patterns are normally applied to the manufactured systems.
a) alpha-numeric pattern
b) test pattern
c) bit pattern
d) parity pattern
View Answer
Answer: b
Explanation: The test pattern generation is normally based on the fault models and this model is also
known as the stuck-at model. The test pattern is based on a certain assumption, that is why it is
called the stuck-at model.
4. Which is also called stuck-at model?
a) byte pattern
b) parity pattern
c) bit pattern
d) test pattern
View Answer
Answer: d
Explanation: The test pattern generation is basically based on the fault models and this type of
model is also known as the stuck-at model. These test patterns are based on a certain assumption,
hence it is known as the stuck-at model.
a) fault coverage
b) test pattern
d) number of errors
View Answer
Answer: a
Explanation: The quality of the test pattern can be evaluated on the basis of the fault coverage. It is
the percentage of potential faults that can be found for a given test pattern set, that is fault
coverage equals the number of detectable faults for a given test pattern set divided by the number
of faults possible due to the fault model.
6. What is DfT?
View Answer
Answer: c
Explanation: The design of testability or DfT is the process of designing for the better testability.
b) JTAG
c) FSM
d) CRC
View Answer
Answer: b
Explanation: The JTAG is a technique for connecting scan chains of several chips and is also known as
boundary scan.
View Answer
Answer: a
Explanation: The BILBO or the built-in logic block observer is proposed as a circuit combining, test
response compaction, test pattern generation, and serial input/output capabilities.
9. What is CRC?
View Answer
Answer: d
Explanation: The CRC or the cyclic redundancy check is the error detecting code which is commonly
used in the storage device and the digital networks.
View Answer
Answer: b
Explanation: The FSM is the finite state machine. It will be having a finite number of states and is
used to design both the sequential logic circuit and the computer programs. It can be used for
testing the scan design in the testing techniques.
11. Which of the following have flip-flops which are connected to form shift registers?
a) scan design
b) test pattern
c) bit pattern
d) CRC
View Answer
Answer: a
Explanation: All the flip-flop storing states are connected to form a shift register in the scan design. It
is a kind of test path.
1. Which allows the parallel development of the hardware and software in the simulation?
c) cpu simulator
d) onboard simulator
View Answer
Answer: a
Explanation: The high-level language simulation allows parallel development of the software and the
hardware and when two parts are integrated, that will work. It can simulate I/O using the keyboard
as the inputs or task which passes input data for other modules.
a) data entity
b) data entry
c) data table
d) data book
View Answer
Answer: c
Explanation: In the high-level language simulation, many techniques are used to simulate the system
and one such is the data table which contains the data sequences which are used to test the
software.
a) pSOS+
c) pSOS+m
d) pOS+kernel
View Answer
Answer: b
Explanation: The most of the operating system support or provide the UNIX-compatible library which
supports the UNIX software to be ported using a simple recompilation.
4. Which of the following can simulate the processor, memory, and peripherals?
a) input simulator
b) peripheral simulator
c) memory simulator
d) cpu simulator
View Answer
Answer: d
Explanation: The CPU simulator can simulate the memory, processor, and the peripherals and allow
the low-level assembler code and the small HLL programs to be tested without the actual hardware.
a) 2
b) 3
c) 4
d) 5
View Answer
Answer: a
Explanation: There are two categories for the low-level simulation. The first category simulates the
memory system, programming model and can offer simple debugging tools whereas the second
category simulation provides timing information based on the number of clocks.
6. Which of the following can simulate the LCD controllers and parallel ports?
a) memory simulator
b) sds
c) input simulator
d) output tools
View Answer
Answer: b
Explanation: There are certain tools which provide powerful tools for simulation and one such is the
SDS which can simulate the processor, memory systems, integrated processor, onboard peripherals
such as LCD controllers and parallel ports.
a) high-level simulator
b) low-level simulator
c) onboard debugger
d) cpu simulator
View Answer
Answer: c
Explanation: The onboard debugger provides a very low-level method of simulating or debugging the
software. It usually handles EPROMs which are plugged into the board or a set of application codes
by providing a serial connection to communicate with the PC or workstation.
8. Which of the following has the ability to download code using a serial port?
a) cpu simulator
c) onboard debugger
Answer: c
Explanation: The onboard debugger has the ability to download code from a floppy disk or by using a
serial port.
9. What does the processor fetch from the EPROM if the board is powered?
a) reset vector
b) ready vector
c) start vector
d) acknowledge vector
View Answer
Answer: a
Explanation: The processor fetches its reset vector from the table which is stored in the EPROM
when the board is powered and then starts the initialize the board.
10. Which of the following device can transfer the vector table from the EPROM?
a) ROM
b) RAM
c) CPU
d) peripheral
View Answer
Answer: b
Explanation: When the board gets powered up, the reset vector from the table stored in the EPROM
makes the initialisation of the board and is transferred to the RAM from the EPROM through the
hardware where the EPROM memory address is temporarily altered.
11. Which of the following is used to determine the number of memory access in an onboard
debugger?
a) timer
b) counter
c) input
d) memory
View Answer
Answer: b
Explanation: The counter is used to determine a preset number of memory accesses, which is
assumed that the table has been transferred by the debugger and the EPROM address can be safely
be changed.
12. Which of the following has the ability to use the high-level language functions, instructions
instead of the normal address?
c) onboard debugging
d) symbolic debugging
View Answer
Answer: d
Explanation: The symbolic debugging has the ability to use high-level language functions,
instructions and the variables instead of the normal addresses and their contents.
13. Which of the following debugger works at the operating system level?
c) onboard debugging
d) symbolic debugging
View Answer
Answer: a
Explanation: The task level debugging has the ability to works at the operating level or at the
particular tasks whereas the low-level debugger cannot set for particular task functions or
operations, it can only set a breakpoint at the start of the routine which sends a message.
a) interrupt delay
b) interrupt time
c) interrupt latency
d) interrupt function
View Answer
Answer: c
Explanation: The interrupts are the most important function of the embedded system and are
responsible for many problems while debugging the system. The time taken to respond to an
interrupt is called the interrupt latency.
2. Into how many parts does the interrupt can split the software?
a) 2
b) 3
c) 4
d) 5
View Answer
Answer: a
Explanation: The software interrupt can split into two parts. These are foreground work and
background work.
a) wait statement
b) ready
c) interrupt
d) acknowledgement
View Answer
Answer: c
Explanation: The interrupt can make the software into two main parts and these are foreground
work and background work.
a) background
b) foreground
d) lateral ground
View Answer
Answer: a
Explanation: The interrupt mechanism is transparent to the background software, that is, the
background software is not aware of the existence of the foreground software.
a) background
b) foreground
c) lateral ground
View Answer
Answer: b
Explanation: In the foreground work, the tasks are performed in response to the interrupts but in
the background work, the tasks are performed while waiting for an interrupt.
6. In which of the following method does the code is written in a straight sequence?
a) method 1
b) timing method
c) sequence method
d) spaghetti method
View Answer
Answer: d
Explanation: In the spaghetti method, the code is written in a straight sequence in which the analysis
software goes and polls the port to see if there is data.
7. Which factor depends on the number of times of polling the port while executing the task?
a) data
c) data size
d) number of bits
View Answer
Answer: b
Explanation: The data transfer rate can determine the number of times the port is polled while
executing the task.
8. Which of the following can improve the quality and the structure of a code?
a) polling
b) subroutine
c) sequential code
d) concurrent code
View Answer
Answer: b
Explanation: The subroutine can improve the quality and the structure of the code. By using the
polling method, as the complexity increases the software structure rapidly fall and it will become
inefficient. So the subroutine method is adopted.
a) interrupts
b) software
c) DMA
d) memory
View Answer
Answer: a
Explanation: The interrupts are asynchronous to the operation and therefore can be used with
systems that are the event as opposed to the time driven.
a) memory
b) input
c) output
d) interrupts
View Answer
Answer: d
Explanation: The interrupts which are asynchronous can be used with systems that are the event as
opposed to the time driven.
11. What does ISR stand for?
View Answer
Answer: b
Explanation: The data transfer codes are written as part of the interrupt service routine which is
associated with the interrupt generation by the hardware.
a) interrupt
b) function
c) procedure
d) structure
View Answer
Answer: a
Explanation: When the port receives the data, it will generate an interrupt which in turn activates
the ISR.
b) sequential code
d) concurrent code
View Answer
Answer: c
Explanation: The data transfer codes are written as part of the interrupt service routine which is
associated with the interrupt generation by the hardware.
a) internal
b) external
c) software
d) hardware
View Answer
Answer: a
Explanation: The internal interrupts are generated by the serial and parallel ports which are on-chip
peripherals.
2. Which of the following is the common method for connecting the peripheral to the processor?
a) internal interrupts
b) external interrupts
c) software
d) exception
View Answer
Answer: b
Explanation: The common method for connecting the peripheral to the processor is the external
interrupts. The external interrupts are provided through the external pins which are connected to
the peripherals.
a) internal interrupt
b) external interrupts
c) exceptions
d) software mode
View Answer
Answer: c
Explanation: An exception is an event which changes the software flow to process the event. It
includes both internal and external interrupts which cause the processor to change to a service
routine.
a) 256
b) 128
c) 90
d) 70
View Answer
Answer: c
Explanation: The MC68000 have 256 table entries which describe 90 exceptions.
a) internal interrupt
b) external interrupt
c) software interrupt
View Answer
Answer: c
Explanation: The software interrupt can change the processor into a protected state by changing the
program flow.
a) instruction set
b) sequential code
c) concurrent code
d) porting
View Answer
Answer: a
Explanation: The software interrupts includes a set of instructions for handling interrupts. The
instruction set allows a currently executing program to change its flow.
advertisement
Answer: c
Explanation: The instruction set of software interrupts are provided by the special instruction set.
One such is the SWI which is commonly used in Z80.
a) PowerPC
b) MC68000
c) Z80
d) IBM PC
View Answer
Answer: c
Explanation: The PowerPC and MC68000 use TRAP instruction set for accessing software interrupt.
IBM PC uses 8086 NMI. Z80 uses SWI for accessing software interrupts.
a) internal interrupt
b) external interrupt
c) software interrupt
d) nmi
View Answer
Answer: c
Explanation: For using the software interrupt more effectively, the additional data are used, which
specifies the type of the request and data parameters are passed to the specific ISR. This additional
data are offered by certain registers.
a) Internal interrupt
b) TRAP
c) SWI
d) NMI
View Answer
Answer: b
Explanation: The MC68000 uses a software interrupt mechanism for accessing interrupts from the
peripheral in which the instruction are created using the TRAP mechanism.
11. Which of the following are accessible by the ISR in software interrupt mechanism?
a) register
b) interrupt
c) nmi
d) memory
View Answer
Answer: a
Explanation: The additional data are offered by certain registers and these additional data are used
to specify the type of the data parameter and the request with the specific ISR when running in the
software interrupt mode.
12. What allows the data protection in the software interrupt mechanism?
a) Different mode
b) Same mode
c) SWI
d) TRAP
View Answer
Answer: a
Explanation: The switching between user mode and supervisor mode provides protection for the
processor, that is, the different modes in the software interrupt allows the memory and the
associated code and data to be protected from each other.
a) non-machine interrupt
b) non-maskable interrupt
c) non-massive interrupt
d) non-memory interrupt
View Answer
Answer: b
Explanation: The NMI stand for the non-maskable interrupt in which the external interrupts cannot
be masked out.
a) SWI
b) TRAP
c) 80×86 NMI
d) Maskable interrupt
View Answer
Answer: c
Explanation: The most commonly used non-maskable interrupt is the 80×86 NMI, which is
implemented in the IBM PC.
15. Which can be used to pass the status information to the calling software in the software
interrupt mechanism?
a) register
b) memory
c) flag
d) nmi
View Answer
Answer: a
Explanation: In order to use the software interrupt more effectively, the additional data are used to
specify the type of the request and data parameters are passed to the specific ISR. This additional
data are offered by certain registers. These registers are accessible by the ISR and it can also be used
to pass the status information back to the calling software.
a) edge triggered
b) level-triggered
c) software interrupt
d) nmi
View Answer
Answer: a
Explanation: In the edge-triggered interrupt, the clock edge is used to generate an interrupt. The
transition is from a logical low to high or vice versa.
a) edge triggered
b) level-triggered
c) software interrupt
d) nmi
View Answer
Answer: b
Explanation: In the level-triggered interrupt, the trigger is completely dependent on the logic level.
The processors may require the level to be in a certain clock width so that the shorter pulses which
are shorter than the minimum pulse width are ignored.
3. At which point the processor will start to internally process the interrupt?
a) interrupt pointer
b) instruction pointer
c) instruction boundary
d) interrupt boundary
View Answer
Answer: c
Explanation: After the recognition of the interrupt, and finds that it is not an error condition with the
currently executing interrupt, then the interrupt will not be internally executed until the current
execution has completed. This point is known as the instruction boundary. At this point, the
processor will start to internally process the interrupt.
a) stack frame
b) register
c) internal register
d) flag register
View Answer
Answer: a
Explanation: The MC68000 and 80×86 family use stack frame for holding the data whereas RISC
processors use special internal registers.
a) flag register
b) accumulator
c) internal register
d) stack register
View Answer
Answer: c
Explanation: The RISC processors uses special internal registers to hold data whereas the 80×86 and
MC68000 family uses stack register to hold the data.
a) MC68000
b) PowerPC
c) ARM
d) DEC Alpha
View Answer
Answer: a
Explanation: The MC68000, Intel 80×86 and most of the b-bit controllers are based on the stack-
based processors whereas PowerPC, DEC alpha, and ARM are RISC families which have a special
internal register for holding the data.
d) internal register
View Answer
Answer: a
Explanation: Some of the processors use internal hardware stack which helps in reducing the
external memory cycle necessary to store the stack frame.
a) 2
b) 3
c) 4
d) 7
View Answer
Answer: d
Explanation: The MC68000 has an external stack for holding the data. The MC68000 family supports
a seven interrupt level which are encoded into three interrupt pins.
a) 2
b) 3
c) 4
d) 5
View Answer
Answer: b
Explanation: The MC68000 family supports a seven interrupt level which are encoded into three
interrupt pins. These interrupt pins are IP0, IP1, and IP2.
b) LS148 7-to-3
d) LS148 3-to-7
View Answer
Answer: b
Explanation: The LS148 7-to-3 priority encoder is used in MC68000. This converts the seven external
pins into a three-bit binary code.
11. Which of the following converts the seven external pins into a 3-bit binary code?
a) priority encoder
c) LS148 7-to-3
View Answer
a) interrupt ready
b) interrupt acknowledge
c) interrupt terminal
d) interrupt start
View Answer
Answer: b
Explanation: The interrupt level remains asserted until its interrupt acknowledgment cycle ensures
the recognition of the interrupt.
13. Which of the following is raised to the interrupt level to prevent the multiple interrupt request?
c) non-maskable interrupt
d) software interrupt
View Answer
Answer: a
Explanation: The internal interrupt mask is raised to the interrupt level, in order to prevent the
multiple interrupt acknowledgments.
a) in-circuit emulation
b) in-code EPROM
c) in-circuit EPOM
d) in-code emulation
View Answer
Answer: a
Explanation: The ICE or in-circuit emulation is one the traditional method used to emulate the
processor in the embedded system so that the software can be downloaded and can be debugged in
situ in the end application.
a) SDS
b) ICE
c) CPU simulator
View Answer
Answer: b
Explanation: The SDS is one of the simulation tool used in the embedded systems. CPU simulator and
the low-level simulator are the other kinds of the simulator used in the embedded system design.
3. Which of the following does not have the ability to get hundred individual signal cables into the
probe in the emulation technique?
a) OnCE
b) BDM
c) ICE
d) JTAG
View Answer
Answer: c
Explanation: The in-circuit emulation does not have the ability to get a hundred individual signal
cables into the probe. This problem comes under the physical limitation of the probe, that is as the
density of the processor increases the available sockets which provide good electrical contacts is
becoming harder which causes a restriction to the probe.
Answer: d
Explanation: The JTAG is a joint test action group which is an electronics industry association which
developed the interfacing port that is standardised for testing the devices.
5. Which of the following allows access to all the hardware within the system?
a) debugger
b) JTAG
c) onboard debugger
d) simulator
View Answer
Answer: b
Explanation: The JTAG can access all the hardware within the system. They provide a way of taking
over the pins of a device and allows the different bit patterns to be imposed on the pins which allow
other circuits to be tested with the imposed pins.
a) Simulator
b) JTAG
c) BDM
d) OnCE
View Answer
Answer: b
Explanation: The JTAG works by using a serial port and clocking data into a shift register and the
output of the shift register drives the pins under the control of the port.
a) on-chip emulation
b) off-chip emulation
c) one-chip emulation
d) once-chip emulation
View Answer
Answer: a
Explanation: The OnCE is an on-chip emulation which is a debugging facility used in the digital signal
processor chips.
a) JTAG
b) ICE
c) OnCE
d) BDM
View Answer
Answer: c
Explanation: The on-chip emulation provides a debugging facility in the DSP chips. The OnCE is
developed for Motorola’s DSP 56x0x family.
9. Which facility provides the provision of the debug ports in the ICE technique?
a) simulator
b) emulator
c) debug support
d) jtag
View Answer
Answer: c
Explanation: The debugging support to the processor enables the processor to be a single stepped
and breakpoint under remote control from a host or the workstation. This facility can provide the
provision of the debug ports.
a) parallel port
b) serial port
c) jtag
d) address register
View Answer
Answer: b
Explanation: The on-chip emulation can access additional registers by using a special serial port
within the device that provides control over the processor and access to its internal registers.
11. Which of the following emulators can provide its own in circuit emulation facility?
a) Simulator
b) Debugger
c) SDS
d) OnCE
View Answer
Answer: d
Explanation: Every system can provide its own in circuit emulation facilities by hooking the port to an
interface port in a workstation or in the PC while connecting the OnCE port to an external connector.
View Answer
Answer: a
Explanation: The BDM or background debug mode is similar to the on-chip emulator with a slight
difference. BDM is provided on the Motorola MC683xx series of processors and for the 8-bit
microcontroller like MC68HC12 etc.
a) JTAG
b) BDM
c) On-CE
d) SDS
View Answer
Answer: b
Explanation: The BDM or the background debug mode is provided on the Motorola MC683xx series
of processors and for several 8-bit microcontrollers. One such microcontroller is the MC68HC12.
14. Which of the following takes the processor, when the processor enters the BDM mode?
a) address code
b) high-level microcode
c) low-level microcode
d) data code
View Answer
Answer: c
Explanation: When the processor enters into the BDM mode, low-level microcode takes the
processor which allows the breakpoint to be set, registers to be accessed and so on.
15. Which of the following has the additional circuitry which supports the background debug mode?
a) memory
b) input
c) peripheral
d) processor
View Answer
Answer: d
Explanation: The processor has the additional circuitry which can provide special support for the
background debug mode and is under the control of the remote system connected to its BDM port.
1. Which of the following allows the reuse of the software and the hardware components?
b) memory design
c) peripheral design
d) input design
View Answer
Answer: a
Explanation: The platform design allows the reuse of the software and the hardware components in
order to cope with the increasing complexity in the design of embedded systems.
2. Which of the following is the design in which both the hardware and software are considered
during the design?
c) software/hardware codesign
d) peripheral design
View Answer
Answer: c
Explanation: The software/hardware codesign is the one which having both hardware and software
design concerns. This will help in the right combination of the hardware and the software for the
efficient product.
View Answer
Answer: b
Explanation: The platform-based design helps in the reuse of both the hardware and the software
components. The application programming interface helps in extending the platform towards
software applications.
4. Which activity is concerned with identifying the task at the final embedded systems?
a) high-level transformation
b) compilation
c) scheduling
View Answer
Answer: d
Explanation: There are many design activities associated with the platforms in the embedded system
and one such is the task-level concurrency management which helps in identifying the task that
needed to be present in the final embedded systems.
a) compilation
b) scheduling
c) high-level transformation
d) hardware/software partitioning
View Answer
Answer: c
Explanation: The high-level transformation is responsible for the high optimizing transformations,
that is, the loops can be interchanged so that the accesses to array components become more local.
Join Sanfoundry@YouTube
6. Which design activity helps in the transformation of the floating point arithmetic to fixed point
arithmetic?
a) high-level transformation
b) scheduling
c) compilation
View Answer
Answer: a
Explanation: The high-level transformation are responsible for the high optimizing transformations,
that is, for the loop interchanging and the transformation of the floating point arithmetic to the fixed
point arithmetic can be done by the high-level transformation.
a) scheduling
b) high-level transformation
c) hardware/software partitioning
d) compilation
View Answer
Answer: c
a) scheduling
b) compilation
d) high-level transformation
View Answer
Answer: a
Explanation: The scheduling is performed in several contexts. It should be approximated with the
other design activities like the compilation, hardware/software partitioning, and task-level
concurrency management. The scheduling should be precise for the final code.
b) scheduling
c) compilation
d) hardware/software partitioning
View Answer
Answer: a
Explanation: The design space exploration is the process of analyzing the set of designs and the
design which meet the specification is selected.
d) processor design
View Answer
Answer: b
Explanation: The platform is an abstraction layer which covers many possible refinements to a lower
level and is mainly follows a meet-in-the-middle approach.