You are on page 1of 10

B.

Tech III Year II Sem Department of Information Technology

INTRODUCTION TO EMBEDDED SYSTEMS


UNIT-1: INTRODUCTION TO EMBEDDED SYSTEMS
Multiple Choice Questions:

1. Embedded Systems application typically involve processing information as:


a. Block level
b. Logical Volumes
c. Distance
d. Signals
2. Embedded Systems communicate with the outside world through
a. Peripherals
b. Processors
c. OS
d. Microcontrollers
3. Which of the following are examples of peripherals?
a. Universal serial bus
b. Networks
c. Timers
d. All of the above
4. What does API stand for?
a. address programming interface
b. application programming interface
c. accessing peripheral through interface
d. address programming interface
5. What is/are the essential tight constraint/s related to the design metrics of an embedded system?
a. Ability to fit on a single chip
b. Low power consumption
c. Fast data processing for real-time operations
d. All of the above
6. The first recognised modern embedded system is
a. Apple computer
b. Calculator
c. Apollo Guidance Computer (AGC)
d. Radio navigation system
7. Which of the following is not true about embedded systems?
a. Built around specialised hardware
b. Always contain an operating system
c. Execution behaviour may be deterministic
d. None of the above
8. Which of the following is an (are) an intended purpose(s) of embedded systems?
a. Data collection
b. Data processing
c. Data communication
d. All of these

Vikas Kumar Tiwari, Assistant Professor, Dept. of ECE, VITS


9. A digital multi meter is an example of an embedded system for
a. Data communication
b. Monitoring
c. Control
d. All of these
10. Which of the following is (are) example(s) of embedded system for data communication?
a. Electronic toy car
b. Network router
c. Digital camera
d. Music player

Answers
1. D 2. A 3. D 4. B 5. A 6. C 7. D 8. D 9. B 10. B

Fill in the blanks:

11. Embedded are ___________ purpose systems


12. Digital camera is the example of ____________________ purpose of the embedded systems.
13. Embedded system is a ________________________ system.
14. Embedded system is applications and domain specific systems___________ (T/F).
15. Response is the measure of _____________ of the system.
16. _____________ is the measure of the output over a stated period of time.
17. Non-Functional requirements of embedded systems are called as ___________________.
18. Three measures of information security in embedded systems are confidentiality, integrity
and _____________.
19. Quality attributes are classified and ________________ and __________________.
20. NRE cost stands for ______________________

Answers
11. Special 12. Data collection/ 13. electronic/ 14. True 15. Quickness
storage/representation electro-mechanical
16. Throughput 17. Quality attributes 18. Availability 19. operational 20. nonrecurring
and non- engineering cost
operational

Vikas Kumar Tiwari, Assistant Professor, Dept. of ECE, VITS


UNIT-2: THE TYPICAL EMBEDDED SYSTEM
Multiple Choice Questions:
1. Little Endian processors
a. Store the lower-order byte of the data at the lowest address and the higher-order byte
of the data at the highest address of memory.
b. Store the higher-order byte of the data at the lowest address and the lower-order byte
of the data at the highest address of memory.
c. Store both the lower-order byte and the higher-order byte at the same address of
memory.
d. None
2. The Instruction set of RISC processor is
a. Simple and lesser in number
b. Simple and larger in number
c. Complex and lesser in number
d. Complex and larger in number
3. Which of the following is true about RISC processors?
a. The instruction set in non-orthogonal
b. The number of general purpose registers is limited
c. Instruction are like macros in C language
d. Fixed length instructions
4. Which of the following processor architecture supports easier instruction pipelining?
a. Princeton
b. Von- Neumann
c. Harvard
d. Both a) and b)
5. Which of the following is one-time programmable memory?
a. SRAM
b. PROM
c. FLASH
d. NVRAM
6. Which of the following is true about optocouplers
a. Optocoupler acts as an input device only
b. Optocoupler acts as an output device only
c. Optocoupler can be used in both input and output circuitry
d. Optocoupler can neither be used as input nor as output device.
7. Which of the following is true about a unipolar stepper motor
a. Contains only a single winding per stator phase
b. Contains only a two windings per stator phase
c. Contains only a three windings per stator phase
d. Contains only a four windings per stator phase
8. What is the minimum number of I/O lines are required to interface a 16- Key matrix
keyboard?
a. 32
b. 16
c. 8
d. 4

Vikas Kumar Tiwari, Assistant Professor, Dept. of ECE, VITS


9. What is the optimal row-column configuration for a 24 Key matrix keyboard?
a. 12 x 2
b. 6 x 4
c. 8 x 3
d. 24 x 1
10. What is the maximum number of USB devices that can be connected to a USB host?
a. 63
b. 127
c. 255
d. unlimited

Answers
1. A 2. A 3. D 4. C 5. B 6. C 7. B 8. C 9. B 10. B

Fill in the blanks:


11. The minimum number of interfacing lines required for implementing I2C interface is ____.
12. The minimum number of interfacing lines required for implementing SPI interface is ____.
13. Theoretical maximum data rate supported by GPRS is _______ Kbps.
14. In Zigbee network, ______________ entity stores the information about the network.
15. GPRS divides the radio channel into ______ timeslots.
16. How many cells are present in 1KB RAM? ___________.
17. Non-volatile Ram is a Random Access Memory with battery backup.___________ (T/F)
18. Digital to Analog Converter (DAC) is normally used as an ____________ subsystem.
19. Wi-Fi and Bluetooth are examples for __________ communication interface.
20. Dynamic RAM stores data in the form of ____________.

Answers
11. 2 (Two) 12. 4 (Four) 13. 171.2 14. ZigBee 15. 8 (Eight)
Coordinator
16. 8192 17. True 18. output 19. wireless 20. charge
memory cells

Vikas Kumar Tiwari, Assistant Professor, Dept. of ECE, VITS


UNIT-3: EMBEDDED FIRMWARE DESIGN AND DEVELOPMENT
Multiple Choice Questions:

1. Which of the following is a processor understandable language?


a. Assembly Language
b. Machine Language
c. Embedded C Language
d. High level Language
2. Assembly language is the human readable notation of?
a. Embedded „C‟ Language
b. High level Language
c. Machine Language
d. None
3. Translation of the assembly code to machine code is performed by the
a. Assembler
b. Complier
c. Linker
d. Locator
4. A cross-compiler converts an embedded „C‟ program to
a. The machine code corresponding to the processor of the PC used for application development
b. The machine code corresponding to the processor which is different from the processor of application development
c. The machine code corresponding to the Intel‟s processor.
d. The machine code corresponding to the AMD‟s processor.
5. Which of the following is string termination character?
a. „\n‟
b. „\t‟
c. „\0‟
d. „\a‟
6. What is the output of the following code
char str1[] = “Hello ”
char str2[] = “World!”;
strcpy(str1,str2);
printf(“%s\n”, str1);
a. Hello
b. Hello World!
c. Compile error
d. World!
7. What is the output of the following code
char str1[] = “Hello ”
char str2[] = “World!”;
str1 = str2;
printf(“%s\n”, str1);
a. Hello
b. Hello World!
c. Compile error
d. World!

Vikas Kumar Tiwari, Assistant Professor, Dept. of ECE, VITS


8. The default initialise for union with static storage is default for
a. The first member variable
b. The second member variable
c. The last member variable
d. The member variable with the highest storage requirement
9. Which of the following is the file inclusion pre-processor directive?
a. #define
b. #include
c. #ifdef
d. None
10. Which of the following memory management routine is used for changing the size of the allocted
bytes in a dynamically allocated memory block?
a. malloc()
b. realloc()
c. calloc()
d. free()

Answers
1. B 2. C 3. A 4. B 5. C 6. D 7. C 8. A 9. B 10. B

Fill in the blanks:

11. The ____________ memory function allocates a block of memory with specified size.
12. The preprocessor directives should not contain the character _______ as terminator.
13. Comparison of two strings using the equal to (=) operator is __________.
14. The function ___________ returns the number of characters present in the string excluding the string
terminator character '\0'.
15. The strcpy(str1,str2) function copies ____________.
16. Addition of two pointers is___________. Since pointers holds memory addresses, the addition of
memory address may result in the overflow.
17. The instruction unsigned char* const x; represents_________________________.
18. _____ is the pre-processing directive used for indicating the end of a block following #ifdef or #else.
19. _____ is the pre-processing directive used for coding macros.
20. ____________________ is the technique used for allocating memory on a need basis at run time.

Answers
11. malloc() 12. „;‟ (semicolon) 13. illegal 14. strlen 15. string 2
(str2) to string 1
(str1).
16. illegal 17. Constant pointer 18. #endif 19. #define 20. Dynamic
to data memory
allocation

Vikas Kumar Tiwari, Assistant Professor, Dept. of ECE, VITS


UNIT-4: RTOS BASED EMBEDDED SYSTEM DESIGN
Multiple Choice Questions:

1. Time required to synchronous switch from the context of one thread to the context of another
thread is called?
a. threads fly-back time
b. jitter
c. context switch time
d. none of the mentioned
2. Which one of the following is a real time operating system?
a. RTLinux
b. VxWorks
c. Windows CE
d. All of the mentioned
3. Which of the following schemes if deployed by an operating system, do NOT/does NOT
solve the deadlock problem?
a. Each task acquires all required resources as when they become available before using
any of them
b. Each task acquires resources only in the order of a pre-assigned priority value
c. Each task acquires, holds, and uses at most one resource at a time
d. If a required resource is unavailable, a task releases all the resources it is holding at
that point of time and waits for all its required resources to become available
4. In an Operating System, each process has its own _____________.
a. address space and global variables
b. open files
c. pending alarms, signals and signal handlers
d. all of the above
5. What is inter-process communication?
a. Communication within the process
b. Communication between two processes
c. Communication between two threads of same process
d. None of the above
6. Which of the following uses its own address space?
a. thread
b. process
c. task
d. kernel
7. Which of the following can own and control the resources?
a. thread
b. task
c. system
d. peripheral
8. Which can be considered as the lower level in the multitasking operating system?
a. process
b. task
c. threads
d. multi threads

Vikas Kumar Tiwari, Assistant Professor, Dept. of ECE, VITS


9. VxWorks is centered anound______________
a. Wind microkernel
b. Linux kernel
c. Unix kernel
d. Windows kernel
10. The problem of priority inversion can be solved by ____________
a. priority inheritance protocol
b. priority inversion protocol
c. both priority inheritance and inversion protocol
d. none of the mentioned

Answers
1. C 2. D 3. A 4. D 5. B 6. A 7. B 8. C 9. A 10. A

Fill in the blanks:


11. In real time operating system task must be serviced by its ____________ period.
12. Hard real time operating system has ______________ jitter than a soft real time operating
system.
13. For real time operating systems, interrupt latency should be ____________
14. Memory management technique in which the OS stores and retrieves data from secondary
storage for use in main memory is called ____________.
15. Run time mapping from virtual to physical address is done by _________________
16. _____________ possesses threads of execution.
17. _______________ is inherited from the parent task.
18. _____________ does not uses a shared memory.
19. The set of instructions loaded into the memory_______________.
20. Entities within the RTOS are referred as ______________

Answers
11. deadline 12. less 13. minimal 14. Paging 15. Memory
Management Unit

16. process 17. thread 18. process 19. task 20. thread

Vikas Kumar Tiwari, Assistant Professor, Dept. of ECE, VITS


UNIT-5: INTEGRATION AND TESTING OF EMBEDDED HARDWARE AND FIRMWARE
AND
THE EMBEDDED SYSTEM DEVELOPMENT ENVIRONMENT
Multiple Choice Questions:

1. Which among the following is the serial interface for connecting devices?
a. ISP
b. SPI
c. IAP
d. Bootloader
2. A program which takes control of the OS and application firmware embedding and copying of the OS
image to the RAM of the system for execution is:
a. ISP
b. SPI
c. IAP
d. Bootloader
3. Which among the following is the technique used by the firmware running on the target device or
modifying a selected portion of the code memory.
a. ISP
b. SPI
c. IAP
d. Bootloader
4. Which of the following intermediate file, generated during cross-compilation of an Embedded C file holds
the assembly code generated corresponding to the C source code?
a. List file
b. Pre-processor output file
c. Object file
d. Map file
5. Which of the following intermediate file, generated during cross-compilation of an Embedded C file holds
the information about the link/locate process for multiple object modules of the project?
a. List file
b. Pre-processor output file
c. Object file
d. Map file
6. Which of the following intermediate file, generated during cross-compilation of an Embedded C file holds
the machine code corresponding to the target processor?
a. List file
b. Pre-processor output file
c. Object file
d. Map file
7. The program that coverts machine codes into target processor specific Assembly code is known as:
a. Disassembler
b. Assembler
c. Cross-Compiler
d. Decompiler

Vikas Kumar Tiwari, Assistant Professor, Dept. of ECE, VITS


8. Which of the following is an example for on chip firmware debugging?
a. OnCE
b. BDM
c. Both a) and b)
d. None
9. Which of the following statements is true about simulator?
a. It is a hardware tool
b. It is a software tool
c. It requires target hardware for simulation
d. It is same as emulator
10. Which among the following is not an IDE?
a. MPLAB
b. Keil µvision
c. Codewarrior
d. JTAG

Answers
1. B 2. D 3. C 4. A 5. D 6. C 7. A 8. C 9. B 10. D

Fill in the blanks:


11. ISP stands for ___________________________________.
12. IDE stands for _________________________________.
13. ____________ is the program which contains the libraries for implementing ISP, which is
embedded into the memory at the time of chip fabrication.
14. ____________ Interface is used for hardware troubleshooting like boundary scan testing.
15. ICE stands for ________________________________.
16. ____________________ is the target hardware debug method for checking the
interconnections among the various chips of complex boards.
17. ___________binary executable file created from the source code.
18. ____________ program acts as a supervisor and controls the downloading of user code into
code memory.
19. BDSL stands for ____________________________.
20. ____________ module is an ICE device which contains the emulation control logic and
emulation chip in a single hardware unit and is designed for a particular family of device.

Answers
11. In System 12. Integrated 13. BootROM 14. JTAG 15. In Circuit
Programming Development Emulator
Environment
16. Boundary 17. HEX File 18. Monitor 19. Boundary 20. Debug
Scan Scan Board Module
Description (DBM)
Language

Vikas Kumar Tiwari, Assistant Professor, Dept. of ECE, VITS

You might also like