Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
1. Which one of the following offers CPUs as integrated memory or peripheral interfaces?
a) Microcontroller
b) Microprocessor
c) Embedded system
d) Memory system
View Answer
Answer: a
Explanation: Microcontrollers are the CPUs which have integrated memory and peripherals
but microprocessor possesses external chips for memory.
==================================================================
2. What is CISC?
a) Computing instruction set complex
b) Complex instruction set computing
c) Complementary instruction set computing
d) Complex instruction set complementary
View Answer
Answer: b
Explanation: It is complementary to RISC architecture and has complex instruction set
compared to RISC architecture.
==================================================================
==================================================================
==================================================================
5. Which of the following are external pins whose logic state can be controlled by the
processor to either be a logic zero or logic one is known as
a) Analogue value
b) Display values
c) Binary values
d) Time derived digital outputs
View Answer
Answer: c
Explanation: Binary values possess logic zeros and logic ones.
==================================================================
6. Which signal is used to differentiates the access from a normal memory cycle?
a) HALT
b) RESET
c) MREQ
d) IORQ
View Answer
Answer: d
Explanation: The IORQ signal is used to differentiate the access from a normal memory
cycle. These input/output accesses are similar from a hardware perspective to a memory cycle
but only occur when an input/output port instruction is executed.
==================================================================
7. Which of the following is the area of memory that is used for storage?
a) Register
b) Stack
c) Accumulator
d) Memory
View Answer
Answer: b
Explanation: Stack can be used at the time of function call or it is a short time large scale
storage of data. Therefore, stack is the area within memory for storage.
==================================================================
8. How a stack is accessed?
a) Stack pointer
b) Stack address
c) Stack bus
d) Stack register
View Answer
Answer: a
Explanation: Stack pointer is a special register that indexes into the stack.
==================================================================
9. PUSH-POP mechanism is seen in
a) Stack pointer
b) Register
c) Memory
d) Index register
View Answer
Answer: a
Explanation: Stack pointer is used to store data like subroutine calls in which a push-pop
mechanism is followed. Data is pushed into the stack to store it and popped off to retrieve it.
==================================================================
==================================================================
11. How many bits are used for storing signed integers?
a) 2
b) 4
c) 8
d) 16
View Answer
Answer: d
Explanation: Signed integers in a coprocessor are stored as 16-bit word, 32-bit double word
or 64-bit quadword.
==================================================================
12. What are the two major sections in a coprocessor?
a) control unit and numeric control unit
b) integer unit and control unit
c) floating point unit and coprocessor unit
d) coprocessor unit and numeric control unit
View Answer
Answer: a
Explanation: Control unit interfaces the coprocessor with its main microprocessor whereas
numeric control unit can execute the coprocessor instructions.
==================================================================
==================================================================
14. How is memory accessed in RISC architecture?
a) load and store instruction
b) opcode instruction
c) memory instruction
d) bus instruction
View Answer
Answer: a
Explanation: The data of memory address is loaded into a register and manipulated, its
contents are written out to the main memory.
==================================================================
15. Which of the following statements are true for von Neumann architecture?
a) shared bus between the program memory and data memory
b) separate bus between the program memory and data memory
c) external bus for program memory and data memory
d) external bus for data memory only
View Answer
Answer: a
Explanation: von Neumann architecture shares bus between program memory and data
memory whereas Harvard architecture have a separate bus for program memory and data
memory.
==================================================================
16. Which of the following determines a high hit rate of the cache memory?
a) size of the cache
b) number of caches
c) size of the RAM
d) cache access
View Answer
Answer: a
Explanation: The size of the cache increases, a large amount of data can be stored, which can
access more data which in turn increases the hit rate of the cache memory.
==================================================================
==================================================================
==================================================================
==================================================================
==================================================================
21. Which of the following can improve the quality and the structure of a code?
a) polling
b) subroutine
c) sequential code
d) concurrent code
View Answer
Answer: b
Explanation: The subroutine can improve the quality and the structure of the code. By using
the polling method, as the complexity increases the software structure rapidly fall and it will
become inefficient. So the subroutine method is adopted.
==================================================================
==================================================================
==================================================================
24. Which pin provides the reference clock for the transfer of data?
a) SDA
b) SCL
c) SPDR
d) Interrupt pin
View Answer
Answer: b
Explanation: The SCL pin can provide the reference clock for the transmission of data but it
is not a free running clock.
==================================================================
==================================================================
26. Which of the following are interfaced as the outputs to the parallel ports?
a) keyboards
b) switches
c) LEDs
d) knobs
View Answer
Answer: c
Explanation: The keyboards, switches, and knobs are used as output whereas the LEDs are
used as the input port.
==================================================================
27. Which of the following are interfaced as the outputs to the parallel ports?
a) keyboards
b) switches
c) LEDs
d) knobs
View Answer
Answer: c
Explanation: The keyboards, switches, and knobs are used as output whereas the LEDs are
used as the input port.
==================================================================
28. Which of the following is necessary for the parallel input-output port?
a) inductor
b) pull-up resistor
c) push-up resistor
d) capacitor
View Answer
Answer: b
Explanation: The I/O port needs an external pull-up resistor. In some devices, it offers
internally. If it is not provided, it can cause incorrect data on reading the port and it prevents
the port from turning off an external device.
==================================================================
29. Which of the following ensures the recognition of the interrupt?
a) interrupt ready
b) interrupt acknowledge
c) interrupt terminal
d) interrupt start
View Answer
Answer: b
Explanation: The interrupt level remains asserted until its interrupt acknowledgement cycle
ensures the recognition of the interrupt.
==================================================================
30. Which of the following is raised to the interrupt level to prevent the multiple interrupt
request?
a) internal interrupt mask
b) external interrupt mask
c) non-maskable interrupt
d) software interrupt
View Answer
Answer: a
Explanation: The internal interrupt mask is raised to the interrupt level, in order to prevent the
multiple interrupt acknowledgements.
==================================================================
31. Which of the following provides time period for the context switch?
a) timer
b) counter
c) time slice
d) time machine
View Answer
Answer: c
Explanation: The time period required for each task for execution before it is stopped and
replaced during a context switch is known as the time slice.
==================================================================
32. Which of the following can periodically trigger the context switch?
a) software interrupt
b) hardware interrupt
c) peripheral
d) memory
View Answer
Answer: b
Explanation: The multitasking operating systems are associated with the multitasking kernel
which controls the time slicing mechanism. The time period required for each task for
execution before it is stopped and replaced during a context switch is known as the time slice.
These are periodically triggered by a hardware interrupt from the system timer.
==================================================================
33. The special tale in the multitasking operating system is also known as
a) task control block
b) task access block
c) task address block
d) task allocating block
View Answer
Answer: a
Explanation: When a context switch is performed, the current program or task is interrupted,
so the processor’s registers are saved in a special table which is known as task control block.
==================================================================
34. Which of the following stores all the task information that the system requires?
a) task access block
b) register
c) accumulator
d) task control block
View Answer
Answer: d
Explanation: The task control block stores all the task information that the system requires
and this is done when the context switch is performed so that the currently running program
is interrupted.
==================================================================
35. Which of the following contains all the task and their status?
a) register
b) ready list
c) access list
d) task list
View Answer
Answer: b
Explanation: The ‘ready’ list possesses all the information regarding a task, that is, all the
task and its corresponding status which is used by the scheduler to decide which task should
execute in the next time slice.
==================================================================
36. Which determines the sequence and the associated task’s priority?
a) scheduling algorithm
b) ready list
d) application register
View Answer
Answer: a
Explanation: The scheduling algorithm determines the sequence and an associated task’s
priority. It also determines the present status of the task.
==================================================================
==================================================================
38. Which of the following can carry information and control task?
a) semaphore
b) messages
c) flags
d) address message
View Answer
Answer: b
Explanation: The messages can carry information and it can also control the task regarding
the real-time operating systems. These are also known as events.
==================================================================
39. Which task swapping method does not require the time critical operations?
a) time slice
b) pre-emption
c) cooperative multitasking
d) schedule algorithm
View Answer
Answer: a
Explanation: Time-critical operations are not essential in the time slice mechanism. Time
slice mechanism describes the task switching in a particular time slot.
==================================================================
==================================================================
41. Which of the following determines the next task in the time slice method of task
swapping?
a) scheduling program
b) scheduling application
c) scheduling algorithm
d) scheduling task
View Answer
Answer: c
Explanation: The time slice mechanism can also be used a scheduling method in which the
task to run next is determined by the scheduling algorithm.
==================================================================
42. Which of the following can be used to distribute the time slice across all the task?
a) timer
b) counter
c) round-robin
d) task slicing
View Answer
Answer: c
Explanation: The time slice based system uses fairness scheduler or round robin to distribute
the time slices across all the tasks that need to run in a particular time slot.
==================================================================
==================================================================
44. Which task method follows a currently running task to be stopped by a higher priority
task?
a) scheduling algorithm
b) time slice
c) cooperative multitasking
d) pre-emption
View Answer
Answer: d
Explanation: The pre-emption is an alternative method of the time slice where the currently
running task can be stopped or preempted or switched out by a higher priority active task.
==================================================================
45. What does RMS stand for?
a) rate monotonic scheduling
b) rate machine scheduling
c) rate monotonic software
d) rate machine software
View Answer
Answer: a
Explanation: The rate monotonic scheduling is a method that is used to assign priority for a
pre-emptive system such that the correct execution can be guaranteed.
==================================================================
46. Which of the following task swapping method is a better choice in the embedded systems
design?
a) RMS
b) pre-emptive
c) cooperative multitasking
d) time slice
View Answer
Answer: b
Explanation: The pre-emptive method of task swapping is the first choice for embedded
system design because of its better system response.
==================================================================
==================================================================
==================================================================
==================================================================
==================================================================