Embedded system Pune University MCQs

Embedded system Pune University MCQs

Embedded system Pune University MCQs 


This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Processor of Embedded System”.


1. Which one of the following offers CPUs as integrated memory or peripheral interfaces?

a) Microcontroller

b) Microprocessor

c) Embedded system

d) Memory system

Answer: a

Explanation: Microcontrollers are the CPUs which have integrated memory and peripherals but microprocessor possesses external chips for memory.

2. Which of the following offers external chips for memory and peripheral interface circuits?

a) Microcontroller

b) Microprocessor

c) Peripheral system

d) Embedded system

Answer: b

Explanation: Microcontrollers are the CPUs which have integrated memory and peripherals whereas microprocessor offers external chips for memory.

3. How many bits does an MC6800 family have?

a) 16

b) 32

c) 4

d) 8

Answer: d

Explanation: MC6800 is an 8-bit processor proposed by Motorola.

4. Which of the following is a 4-bit architecture?

a) MC6800

b) 8086

c) 80386

d) National COP series

Answer: d

Explanation: National COP series is a 4-bit processor whereas MC6800 is an 8-bit processor, 8086 is a 16-bit processor and 80386 is a 32-bit processor.

5. What is CISC?

a) Computing instruction set complex

b) Complex instruction set computing

c) Complimentary instruction set computing

d) Complex instruction set complementary

Answer: b

Explanation: It is complementary to RISC architecture and has complex instruction set compared to RISC architecture.

6. How is the protection and security for an embedded system made?

a) OTP

b) IPR

c) Memory disk security

d) Security chips

Answer: b

Explanation: Intellectual property right provides security and protection to embedded systems.

7. Which of the following possesses a CISC architecture?

a) MC68020

b) ARC

c) Atmel AVR

d) Blackfin

Answer: a

Explanation: MC68020 is having a CISC architecture. CISC architecture is used for code efficiency whereas RISC architecture is used for speeding up the processor. ARC, Atmel AVR, and Blackfin are RISC architectures.

8. Which of the following is a RISC architecture?

a) 80286

b) MIPS

c) Zilog Z80

d) 80386

Answer: b

Explanation: MIPS possess a RISC architecture whereas 80386, 80286 and Zilog Z80 are CISC architectures.

9. Which one of the following is board based system?

a) Data bus

b) Address bus

c) VMEbus

d) DMA bus

Answer: c

Explanation: VMEbus is Versa Module Europa Bus which is used as a board based system for easy manipulation. VMEbus is a computer bus standard developed for the Motorola MC6800 family and is mainly based on Eurocard sizes.

10. VME bus stands for

a) Versa module Europa bus

b) Versa module embedded bus

c) Vertical module embedded bus

d) Vertical module Europa bus

Answer: a

Explanation: A computer bus standard in Eurocard sizes mainly developed for Motorola MC6800 family and later on used in many applications and approved by IEEE.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Memory and Peripherals of Embedded System”.


1. It retains its content when power is removed. What type of memory is this?

a) Volatile memory

b) Nonvolatile memory

c) RAM

d) SRAM

Answer: b

Explanation: Nonvolatile devices are those which always retains it content even when any abrupt change occurs and nonvolatile memory are a kind of such devices. But RAM is a volatile memory which is primary storage that can only access its data only when the device is powered and SRAM is a type of RAM which is called Static RAM.

2. Name a volatile memory.

a) RAM

b) EPROM

c) ROM

d) EEPROM

Answer: a

Explanation: Volatile memory is those which can access data only when the device is powered.

3. Name a nonvolatile memory.

a) ROM

b) RAM

c) SRAM

d) DRAM

Answer: a

Explanation: Non-volatile memory is the one which retains its content even when the power is removed. This is done by an on-chip read only memory  or an external EPROM. The software that it contains the program which is capable of obtaining the full software from another source within or outside of the system. This initialisation routine is also referred to as a bootstrap program or routine.

4. The initial routine is often referred to as

a) Initial program

b) Bootstrap program

c) Final program

d) Initial embedded program

Answer: b

Explanation: ROM contains the program which is capable of obtaining the full software from another source within or outside of the system. This initialisation routine is also referred to as bootstrap program or routine.

5. What kind of socket does an external EPROM to plugged in for prototyping?

a) Piggyback

b) Single socket

c) Multi-socket

d) Piggyback reset socket

Answer: a

Explanation: Some controllers use a special package called piggyback socket on the top of the package to allow the EPROM for prototyping.

6. Which one of the following is UV erasable?

a) Flash memory

b) SRAM

c) EPROM

d) DRAM

Answer: c

Explanation: EPROM is an erasable program and it can be erased by ultraviolet radiations. SRAM and DRAM are volatile memories. Flash memory to is a volatile memory but it is not UV erasable.

7. What kind of memory does an OTP have?

a) SRAM

b) RAM

c) EPROM

d) DRAM

Answer: c

Explanation: OTP is one-time programming so it should possess a nonvolatile memory and EPROM is a nonvolatile memory whereas SRAM, DRAM and RAM are volatile memories.

8. Which type of memory is suitable for low volume production of embedded systems?

a) ROM

b) Volatile

c) Non-volatile

d) RAM

Answer: c

Explanation: The devices which use non-volatile memory allow the software to download and returned in the device. UV erasable EPROM is favorable but EEPROM is also gaining favor. Therefore, this type of memory is used in low volume production.

9. Which is the single device capable of providing prototyping support for a range of microcontroller?

a) ROM

b) Umbrella device

c) OTP

d) RAM

Answer: b

Explanation: Umbrella device is capable of providing prototyping support for a range of microcontrollers.

10. What type of memory is suitable for high volume production?

a) RAM

b) ROM

c) EPROM

d) EEPROM

Answer: b

Explanation: Read Only Memory is suitable for high volume production since it is a nonvolatile memory.

11. What type of memory is suitable for medium volume production?

a) Umbrella devices

b) OTP

c) ROM

d) RAM

Answer: b

Explanation: One-time programmable memory is also a nonvolatile memory so it is used for medium volume production.

12. How an embedded system communicate with the outside world?

a) Peripherals

b) Memory

c) Input

d) Output

Answer: a

Explanation: The system communicates with the outside world through peripherals.

13. How the input terminals are associated with external environments?

a) Actuators

b) Sensors

c) Inputs

d) Outputs

Answer: b

Explanation: Sensors measures the physical quantity and convert it into electrical means whereas actuators convert electrical quantity into physical quantity.

14. Which of the following are external pins whose logic state can be controlled by the processor to either be a logic zero or logic one is known as

a) Analogue value

b) Display values

c) Binary values

d) Time derived digital outputs

Answer: c

Explanation: Binary values possess logic zeros and logic ones.

15. What kind of visual panel is used for seven segmented display?

a) LED

b) LCD

c) Binary output

d) Analogue output

Answer: b

Explanation: None.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Micro-controller of Embedded Systems”.


1. Which one of the following is a microcontroller from Motorola?

a) MC68HC05

b) 4004

c) MIPS

d) 8080

Answer: a

Explanation: MC68HC05 is designed by Motorola but 4004 and 8080 are designed by Intel. MIPS is designed by MIPS technology.

2. Which is the first microcontroller?

a) 8051

b) Arm

c) TMS1000

d) Intel 4004

Answer: c

Explanation: TMS1000 is the first microcontroller which was done in April 1971 but Intel 4004 was designed in November 1971.

3. How many bits does MC68HC05 possess?

a) 4

b) 8

c) 16

d) 32

Answer: b

Explanation: MC68HC05 is a 8 bit controller.

4. What is the bit size of the program counter in MC68HC05?

a) 7

b) 9

c) 13

d) 17

Answer: c

Explanation: MC68HC05 have a 13-bit program counter.

5. Which of the following microcontroller is used in engine management system?

a) MC68HC05

b) MC68HC11

c) Intel 80286

d) Intel 8086

Answer: b

Explanation: MC68HC11 was originally designed in conjunction with General Motors for use within engine management systems. As a result, its initial versions had built-in EEPROM/OTP ROM, RAM, digital I/O, timers,8 channel 8 bit A/D converter, PWM generator, and synchronous and asynchronous communications channels .

6. Which is the concatenated register of MC68HC11?

a) D

b) X

c) IP

d) DI

Answer: a

Explanation: The MC68HC11 architecture is similar to that of the 6800 and has two 8 bit accumulators referred to as registers A and B.They are concatenated to provide a 16-bit double accumulator called register D.

7. What does CCR stand for?

a) Condition code register

b) Computing code register

c) Complex code register

d) Code control register

Answer: a

Explanation: Condition code register is a special register in the MC68HC11.

8. How many bytes of EPROM does MC68HC7054A possess?

a) 176 bytes

b) 240 bytes

c) 4144 bytes

d) 1024 bytes

Answer: c

Explanation: There are defined memory size for different processors and controllers. The MC68HC705A has 4144 bytes of EPROM.

9. Which of the following is an 8-bit command in MC68HC11?

a) Add

b) Shift

c) Multiply

d) Subtract

Answer: c

Explanation: Multiplying two 8 bit requires a 16-bit register.

10. In the below diagram, identify the register of MC68HC05

embedded-systems-questions-answers-microcontroller-basic-embedded-system-q10

a) CCR

b) PC

c) SP

d) IV

Answer: a

Explanation: MC68HC05 have different registers such as the accumulator, stack pointer, index register . Condition code register has to carry flag, zero flags, negative flag, interrupt flag, Half carry flag.

11. Which one of the following is an asynchronous communication channel?

a) SPI

b) MUDs

c) MOO

d) VOIP

Answer: a

Explanation: MOO, MUDs, and VOIP are apps for the online conference which is synchronous but SPI is an asynchronous communication channel.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Microprocessor of Embedded System”.


1. Which of the following microprocessor is designed by Zilog?

a) Z80

b) Zigbee

c) 80386

d) 8087

Answer: a

Explanation: Designed by Zilog in 1976. 80386 and 8087 are the processors designed by Intel and Zigbee is IEEE based which is used for high-level communication protocol.

2. Z80 is mainly based on

a) Intel 8080

b) MIPS

c) TIMS

d) 8051

Answer: a

Explanation: Its architecture is based on Intel 8080 but has an extended instruction set and hardware improvement.

3. Flag register of Z80 is also known as

a) Program status register

b) Program status address

c) Program status word

d) Program address register

Answer: c

Explanation: The flag register of Z80 contains status information such as carry, overflow, signed etc.

4. What are the two register sets used in Z80?

a) C’D’ and BC’

b) CD and BD

c) IV and MR

d) Main and alternate

Answer: d

Explanation: Z80 have two sets of registers which are the main registers and alternate registers.

5. How an alternate set of the register can be identified in Z80?

a) ‘Suffix

b) ‘Prefix

c) ,suffix

d) ,prefix

Answer: a

Explanation: In order to identify the main register and alternate register ‘ is used in the suffix.

6. What is the purpose of memory refresh register of Z80?

a) To control on-chip DRAM

b) To control on-chip SRAM

c) To control ROM

d) To clear cache

Answer: a

Explanation: In addition to the general purpose registers, a stack pointer, program counter, and two index registers are included in Z80. It was also used in many embedded designs because of its high-quality performance and for its in-built refresh circuitry for DRAMs.

7. What is the clock frequency of Z80?

a) 6 MHz

b) 8 MHz

c) 4 MHz

d) 2 MHz

Answer: c

Explanation: It is the maximum clock frequency or runs a time of the processor.

8. Which are the two additional registers of Z80?

a) Interrupt and NMI

b) NMI and PSW

c) Interrupt vector and memory refresh

d) NMI and memory refresh

Answer: c

Explanation: The Interrupt vector register is used in the interrupt handling. Mode 2 is used to point the required software routine to process the interrupt. In mode 1, the interrupt vector is supplied via the external data bus.

9. By which instruction does the switching of registers take place?

a) Instruction opcodes

b) AXX instruction

c) EXX instruction

d) Register instruction

Answer: c

Explanation: Only one set of registers can be used at one time and the switching of registers and data transfer is performed by the EXX instruction.

10. Which of the following can be a paired set of 16-bit register?

a) CD

b) HL

c) AB

d) EH

Answer: b

Explanation: Registers B, C, D, E, H and L are 8-bit general-purpose registers that can be concatenated to produce 16 registers known as BC, DE, and HL.

11. Which signal is used to differentiates the access from a normal memory cycle?

a) HALT

b) RESET

c) MREQ

d) IORQ

Answer: d

Explanation: The IORQ signal is used to differentiate the access from a normal memory cycle. These input/output accesses are similar from a hardware perspective to a memory cycle but only occur when an input/output port instruction is executed.

12. What is done in mode1 of Z80?

a) Interrupt vector is supplied via the external bus

b) Interrupt vector is supplied via the peripherals

c) NMI gets started

d) Interrupt gets acknowledge from peripheral

Answer: a

Explanation: In mode 1, the interrupt vector is supplied via the external data bus. The memory refresh register is used to control the on-chip DRAM refresh circuitry.

13. What does m1 signal in Z80 describes?

a) I/O operation status

b) Memory refresh output

c) Output pulse on instruction fetch cycle

d) Interrupt request input

Answer: c

Explanation: It is a signal which describes output pulse on the instruction fetch cycle. Interrupt request input, input/output operation status, memory refresh output are the other signals in Z80 for various operations.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “8 Bit Accumulator Processor of Embedded System”.


1. Which is the first device by Intel, that started the microprocessor revolution?

a) 8080

b) 8086

c) 8087

d) 8088

Answer: a

Explanation: 8086 was released in 1978 and 8088 was released in 1979. 8087 is a numeric coprocessor that was released in 1977. Furthermore, 8080 is a device designed by Intel in 1974.

2. Which is the first microprocessor by Motorola?

a) MC6800

b) MC68001

c) MIPS

d) PowerPC

Answer: a

Explanation: MC6800 is the first microprocessor by Motorola which started a revolution in the embedded systems.

3. Motorola MC6800 is a how many-bit processor?

a) 4

b) 8

c) 16

d) 32

Answer: b

Explanation: MC6800 is an 8-bit processor and having two 8 bit accumulator registers.

4. How many accumulators does an MC6800 have?

a) 1

b) 2

c) 3

d) 4

Answer: b

Explanation: MC6800 is having 2 accumulators both comprising of 8 bits.

5. How many bits does an accumulator register of MC6800 have?

a) 8

b) 16

c) 32

d) 4

Answer: a

Explanation: MC6800 possesses an 8-bit accumulator register since it is an 8-bit processor.

6. What is the purpose of an accumulator?

a) Storing data and performing logical operations

b) Storing data and performing arithmetic and logical operations

c) Storing addresses

d) Pointer

Answer: b

Explanation: Accumulator is used for all the arithmetic operations such as addition, subtraction, multiplication, as well as relational & logical operations.

7. Which of the following is the area of memory that is used for temporary storage?

a) Register

b) Stack

c) Accumulator

d) Hard Disk

Answer: b

Explanation: Stack can be used at the time of function call or it is a short time large-scale storage of data. Therefore, a stack is an area within memory for storage.

8. How a stack is accessed?

a) By using code segment pointer

b) By using data segment register

c) By using stack segment register

d) By using heap segment register

Answer: 3

Explanation: Stack segment register is a special register that indexes into the stack.

9. PUSH-POP mechanism is seen in _______

a) Stack pointer

b) Register

c) Memory

d) Index register

Answer: a

Explanation: Stack pointer is used to store data like subroutine calls in which a push-pop mechanism is followed. Data is pushed into the stack to store it and popped off to retrieve it.

10. What is the range of values an 8-bit register can store?

a) 128

b) 64

c) 256

d) 32

Answer: c

Explanation: 2 8 = 256. So, an 8-bit register can store 256 values .

11. What is the address range in 80286?

a) 1 Mbytes

b) 2 Mbytes

c) 16 Mbytes

d) 32 mbytes

Answer: c

Explanation: 80286 is a 16-bit processor. It has an address range of 16 Mbytes.

12. Which is the first 32-bit member of Intel?

a) 8086

b) 8088

c) 80286

d) 80386

Answer: d

Explanation: The first generation of Intel started with 80386 which had 32-bit registers.

13. What supports multitasking in 80386?

a) Read mode

b) External paging memory management unit

c) Paging and segmentation

d) On-chip paging memory management unit

Answer: d

Explanation: Because of the efficient paging mechanism of 80386 in the memory management unit, it supports multitasking which means different tasks can be done at a time, a kind of parallel execution.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Architecture of Embedded System”.


1. Which one of the following is the successor of 8086 and 8088 processor?

a) 80286

b) 80387

c) 8051

d) 8087

Answer: a

Explanation: 80286 is the successor of 8086 and 8088 because it possess a CPU based on 8086 and 8088. 8051 is a microcontroller designed by Intel which is commonly known as Intel MCS-51. 8087 is the first floating point coprocessor of 8086.

2. Which is the processor behind the IBM PC AT?

a) 80387

b) 8088

c) 80286

d) 8086

Answer: c

Explanation: The processor was successful in the PC market and it was a successful processor behind the IBM.

3. Which are the two modes of 80286?

a) Real mode and protected mode

b) Mode1 and mode2

c) Alternate and main

d) Mode A and mode B

Answer: a

Explanation: It possess two modes which are called real and protected modes. In real modes it adds some additional register in order to access a size greater than 16MB but still preserving its compatibility with 8086 and 8088.

4. Which register set of 80286 form the same register set of 8086 processor?

a) AH,AL

b) BX

c) BX,AX

d) EL

Answer: a

Explanation: The 16 bit register of 80286 can also act as 8 bit register by splitting into a higher register and lower register.

5. Which are the 4 general purposes 16 bit register in Intel 80286?

a) CS,DS,SS,ES

b) AX,BX,CX,DX

c) IP,FL,DI,SI

d) DI,SI,BP,SP

Answer: b

Explanation: Intel 80286 possess 4 general purpose registers and these are 16-bit in size. In addition to the general purpose register, there are four segmented registers, two index registers and a base pointer register.

6. Which are the 4 segmented registers in intel 80286?

a) AX,BX,CX,DX

b) AS,BS,CS,DS

c) SP,DI,SI,BP

d) IP,FL,SI,DI

Answer: b

Explanation: Intel 80286 possess 4 general purpose registers, 4 segmented registers, 2 index register and a base pointer register.

7. How is expanded memory accessed in 80286?

a) Paging

b) Interleaving

c) RAM

d) External storage

Answer: a

Explanation: The 80286 processor can access beyond 1MB by paging and special hardware to stimulate the missing address lines. This is called expanded memory.

8. When is the register set gets expanded in 80286?

a) In real mode

b) In expanded mode

c) In protected mode

d) Interrupt mode

Answer: c

Explanation: In protected mode, two additional register arises which is called index register and base pointer register which helps in expanding the register.

9. Which are the two register available in the protected mode of 80286?

a) General and segmented

b) General and pointer

c) Index and base pointer

d) Index and segmented

Answer: c

Explanation: In the protected mode of 80286, two additional register arises which is called index register and base pointer register.

10. What kind of support does 80286 access in protected mode?

a) Real mode

b) Address access

c) Data access

d) Virtual memory

Answer: d

Explanation: In the protected mode of 80286, two additional register arises which is called index register and base pointer register. This allows the 80286 to support virtual memory scheme.

11. Which of the following processor possess memory management?

a) 8086

b) 8088

c) 80286

d) 8051

Answer: c

Explanation: Because of the efficient paging mechanism, 80286 is one of the processors which allows the memory management unit. 8086 and 8088 does not allow paging mechanism. 8051 is a microcontroller which have an in-built memory and does not possess a paging mechanism.

12. What is the size of the address bus in 80286?

a) 20

b) 24

c) 16

d) 32

Answer: b

Explanation: The size of the address bus in 80286 is 24 bits and 20 bits in 8088 and 8086.

13. Which is the interrupt vector in 80286 which functions for stack fault?

a) 11

b) 12

c) 14

d) 16

Answer: b

Explanation: 12 is the interrupt vector indicating stack fault. It will be different for a different microprocessor.

14. Which is the interrupt vector that functions as invalid opcode?

a) 9

b) 8

c) 7

d) 6

Answer: d

Explanation: 6 is the interrupt vector indicating invalid opcode. It will be different for a different microprocessor.

15. Which of the following possess the same set of instructions?

a) 8088 and 80286

b) 8086 and 80286

c) 8051 and 8088

d) 8051 and 8086

Answer: b

Explanation: 80286 is based on the architecture of 8086. So both the processors have the same set of instructions with slight variations.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Coprocessor of Intel”.


1. Which of the following is a coprocessor of 80386?

a) 80387

b) 8087

c) 8089

d) 8088

Answer: a

Explanation: 80386 have 80387 as a floating point arithmetic coprocessor which can perform various floating point calculations.

2. Name the processor which helps in floating point calculations.

a) microprocessor

b) microcontroller

c) coprocessor

d) controller

Answer: c

Explanation: The coprocessor can perform signal processing, floating point arithmetics, encryption etc.

3. Which is the coprocessor of 8086?

a) 8087

b) 8088

c) 8086

d) 8080

Answer: a

Explanation: 8087 is the coprocessor for both 8086 and 8088. 8089 is also a coprocessor of 8086 and 80888.

4. Which of the following is a coprocessor of Motorola 68000 family?

a) 68001

b) 68011

c) 68881

d) 68010

Answer: c

Explanation: The 68881 coprocessor of Motorola provides floating point arithmetics.

5. Which of the following processors can perform exponential, logarithmic and trigonometric functions?

a) 8086

b) 8087

c) 8080

d) 8088

Answer: b

Explanation: 8087 is a coprocessor which can perform all the mathematical functions including addition, subtraction, multiplication, division, exponential, logarithmic, trigonometric etc. 8086, 8080 and 8088 are microprocessors which require the help of a coprocessor for floating point arithmetic.

6. How many stack register does an 8087 have?

a) 4

b) 8

c) 16

d) 32

Answer: b

Explanation: The 8087 coprocessor does not have a main register set but they have an 8-level deep stack register from st0 to st7.

7. Which of the following processor can handle infinity values?

a) 8080

b) 8086

c) 8087

d) 8088

Answer: c

Explanation: 8087 is a coprocessor which can handle infinity values with two types of closure known as affine closure and projective closure.

8. Which coprocessor supports affine closure?

a) 80187

b) 80287

c) 80387

d) 8088

Answer: b

Explanation: 80287 uses an affine closure for infinity values whereas 80387 and 80187 support projective closure for infinity values.

9. Which one is the floating point coprocessor of 80286?

a) 8087

b) 80187

c) 80287

d) 80387

Answer: c

Explanation: 80286 supports 80287 as its floating point coprocessor which helps in floating point calculations.

10. How many pins does 8087 have?

a) 40 pin DIP

b) 20 pin DIP

c) 40 pins

d) 20 pins

Answer: a

Explanation: All 8087 models have a 40 pin DIP which is operated in 5V.

11. What is the clock frequency of 8087?

a) 10 MHz

b) 5 MHz

c) 6 MHz

d) 4 MHz

Answer: b

Explanation: 8087 have 5 MHz as its clock frequency because the coprocessor must have the same clock frequency as that of the main processor.

12. How are negative numbers stored in a coprocessor?

a) 1’s complement

b) 2’s complement

c) decimal

d) gray

Answer: b

Explanation: In a coprocessor, negative numbers are stored in 2’s complement with its leftmost sign bit of 1 whereas positive numbers are stored in the form of true value with its leftmost sign bit of 0.

13. How many bits are used for storing signed integers?

a) 2

b) 4

c) 8

d) 16

Answer: d

Explanation: Signed integers in a coprocessor are stored as a 16-bit word, 32-bit double word or 64-bit quadword.

14. Which of the processor has an internal coprocessor?

a) 8087

b) 80287

c) 80387

d) 80486DX

Answer: d

Explanation: 8087 is an external IC designed to operate with the 8088/8086 processor but 80486DX is an on-chip coprocessor that is, it does not require an extra integrated chip for floating point arithmetics.

15. What are the two major sections in a coprocessor?

a) control unit and numeric control unit

b) integer unit and control unit

c) floating point unit and coprocessor unit

d) coprocessor unit and numeric control unit

Answer: a

Explanation: Control unit interfaces the coprocessor with its main microprocessor whereas numeric control unit can execute the coprocessor instructions.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Features of Intel”.


1. What are the three stages included in pipelining of 80386?

a) Fetch, decode, execute

b) Fetch, execute, decode

c) Execute, fetch, decode

d) Decode, execute, fetch

Answer: a

Explanation: The instruction can execute in a single cycle which is done by pipelining the instruction flow. The address calculations are performed as the instruction proceeds down the line. Pipelining may take several cycles, an instruction can potentially be started and completed on every clock edge, thus achieving the single cycle performance.

2. How instructions and data are accessed to pipeline stages of 80486 processor?

a) Through internal unified cache

b) Through external unified cache

c) Through external cache

d) Through multiple caches

Answer: a

Explanation: In order to have instruction and data to the pipeline, the 80486 has an internal unified cache to contain both data and instructions. This helps in the independency of the processor on external memory.

3. Which of the following processor possesses a similar instruction of 80486?

a) 8086

b) 80286

c) 80386

d) 8080

Answer: c

Explanation: The instruction set is same as that of 80386 but there are some additional instructions available when the processor is in protected mode.

4. What are the two external interrupt signals in 80386?

a) IV and NMI

b) NMI and INTR

c) INTR and IV

d) PC and NMI

Answer: b

Explanation: The 80386 has two external interrupt signals which allow external devices to interrupt the processor. The INTR input creates a maskable interrupt while the NMI creates a non-maskable interrupt.

5. How many bit vector number is used in an interrupt cycle of 80386?

a) 4

b) 8

c) 16

d) 32

Answer: b

Explanation: While an interrupt cycle is running, the processor possesses two interrupts to acknowledge bus cycles and reads an 8-bit vector number. This vector is then used to locate, within the vector table and it has the address of the corresponding interrupt service routine. NMI is automatically assigned as vector number 2.

6. In how many modes does 80386 can run?

a) 2

b) 4

c) 3

d) 5

Answer: c

Explanation: The 80386 can run in three different modes: the real mode, the protected mode, and a virtual mode. In real mode, the size of each segment is limited to 64 Kbytes and in protected mode, the largest segment size is increased to 4 Gbytes and the virtual mode is a special version of the protected mode.

7. How many bit flag register does 80386 have?

a) 8

b) 16

c) 32

d) 64

Answer: c

Explanation: The 32-bit flag register possesses the normal carry zero, auxiliary carry, parity, sign and overflow flags.

8. Which processor is the derivative of 80386DX?

a) 80387

b) 80386SX

c) 80386 DDX

d) 8087

Answer: b

Explanation: Derivative of the 80386DX called the 80386SX which provides the same architecture and lowers cost. To minimal the cost value, it uses an external 16-bit data bus and a 24-bit memory bus.

9. Which of the following is a portable device of Intel?

a) 80386DX

b) 8087

c) 80386SL

d) 80386SX

Answer: c

Explanation: Intel has 80386SL as the portable PCs which helps in controlling power and increases the power efficiency of the processor.

10. Which of the processor has a 5 stage pipeline?

a) 80386

b) 80486

c) 80286

d) 80386DX

Answer: b

Explanation: 80486 have a five stage pipeline ALU. These include fetch, decode, execute, memory access and write back. This helps in accessing instruction faster and thus makes the processor faster. 80386DX have a three-stage pipelining which only includes fetch, decode and execute.

11. Which of the following processor can execute two instructions per cycle?

a) 80486

b) 80386DX

c) Intel Pentium

d) 80386

Answer: c

Explanation: Intel Pentium have many advanced features one of which is, it can execute two instructions per cycle thus improving the speed of the processor whereas 80486, 80386 and 80386DX does not have this feature.

12. Which of the following processors have two five-stage pipelines?

a) 80486

b) 80386

c) Intel Pentium

d) 80386DX

Answer: c

Explanation: The intel Pentium possess two five-stage pipelines which allow the execution of two integer instruction jointly.

13. In which processor does the control register and system management mode register first appeared?

a) 80386

b) 80386SL

c) 80386DX

d) 80486

Answer: b

Explanation: The control register and system management mode register has first appeared in 80386SL and later on succeeded by other processors. These registers can provide intelligent power control.

14. Which is the next successor of Intel Pentium?

a) Pentium pro

b) P1

c) P2

d) P5

Answer: a

Explanation: Intel Pentium is succeeded by Pentium pro. P1, P2, and P5 are the other processors of Intel.

15. Which of the following processor allows a multiple branch prediction?

a) 80386

b) P1

c) Intel Pentium

d) Intel Pentium pro

Answer: d

Explanation: A branch instruction can change the program flow and multiple branch prediction allows the continuous execution of instructions based on assumptions. This can eliminate delay and thus speeds up the execution.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “RISC Processor”.


1. Which are the processors based on RISC?

a) SPARC

b) 80386

c) MC68030

d) MC68020

Answer: a

Explanation: SPARC and MIPS processors are the first generation processors of RISC architecture.

2. What is 80/20 rule?

a) 80% instruction is generated and 20% instruction is executed

b) 80% instruction is executed and 20% instruction is generated

c) 80%instruction is executed and 20% instruction is not executed

d) 80% instruction is generated and 20% instructions are not generated

Answer: a

Explanation: 80% of instructions are generated and only 20% of the instruction set is executed that is, by simplifying the instructions, the performance of the processor can be increased which lead to the formation of RISC that is reduced instruction set computing.

3. Which of the architecture is more complex?

a) SPARC

b) MC68030

c) MC68030

d) 8086

Answer: a

Explanation: SPARC have RISC architecture which has a simple instruction set but MC68020, MC68030, 8086 have CISC architecture which is more complex than CISC.

4. Which is the first company who defined RISC architecture?

a) Intel

b) IBM

c) Motorola

d) MIPS

Answer: b

Explanation: In 1970s IBM identified RISC architecture.

5. Which of the following processors execute its instruction in a single cycle?

a) 8086

b) 8088

c) 8087

d) MIPS R2000

Answer: d

Explanation: MIPS R2000 possess RISC architecture in which the processor executes its instruction in a single clock cycle and also synthesize complex operations from the same reduced instruction set.

6. How is memory accessed in RISC architecture?

a) load and store instruction

b) opcode instruction

c) memory instruction

d) bus instruction

Answer: a

Explanation: The data of memory address is loaded into a register and manipulated, its contents are written out to the main memory.

7. Which of the following has a Harvard architecture?

a) EDSAC

b) SSEM

c) PIC

d) CSIRAC

Answer: c

Explanation: PIC follows Harvard architecture in which the external bus architecture consist of separate buses for instruction and data whereas SSEM, EDSAC, CSIRAC are stored program architecture.

8. Which of the following statements are true for von Neumann architecture?

a) shared bus between the program memory and data memory

b) separate bus between the program memory and data memory

c) external bus for program memory and data memory

d) external bus for data memory only

Answer: a

Explanation: von Neumann architecture shares bus between program memory and data memory whereas Harvard architecture have a separate bus for program memory and data memory.

9. What is CAM stands for?

a) content-addressable memory

b) complex addressable memory

c) computing addressable memory

d) concurrently addressable memory

Answer: a

Explanation: Non-von Neumann architecture is based on content-addressable memory.

10. Which of the following processors uses Harvard architecture?

a) TEXAS TMS320

b) 80386

c) 80286

d) 8086

Answer: a

Explanation: It is a digital signal processor which have small and highly optimized audio or video processing signals. It possesses multiple parallel data bus.

11. Which company further developed the study of RISC architecture?

a) Intel

b) Motorola

c) university of Berkeley

d) MIPS

Answer: c

Explanation: The University of Berkeley and Stanford university provides the basic architecture model of RISC.

12. Princeton architecture is also known as

a) von Neumann architecture

b) Harvard

c) RISC

d) CISC

Answer: a

Explanation: The von Neumann architecture is also known as von Neumann model or Princeton architecture.

13. Who coined the term RISC?

a) David Patterson

b) von Neumann

c) Michael J Flynn

d) Harvard

Answer: a

Explanation: David Patterson of Berkeley university coined the term RISC whereas Michael J Flynn who first views RISC.

14. Which of the following is an 8-bit RISC Harvard architecture?

a) AVR

b) Zilog80

c) 8051

d) Motorola 6800

Answer: a

Explanation: AVR is an 8-bit RISC architecture developed by Atmel. Zilog80, 8051, Motorola 6800 are having CISC architectures.

15. Which of the following processors has CISC architecture?

a) AVR

b) Atmel

c) Blackfin

d) Zilog Z80

Answer: d

Explanation: Zilog80 have CISC architecture whereas AVR, Atmel and blackfin possess RISC architecture.

This set of Embedded Systems Interview Questions and Answers focuses on “Examples of Embedded System Digital Signal Processing”.


1. What are the factors of filters which are determined by the speed of the operation in a digital signal processor?

a) attenuation constant

b) frequency

c) bandwidth

d) phase

Answer: c

Explanation: The bandwidth of any filter depends on the speed of operations held in a digital signal processor.

2. How many tables does an FIR function of a digital signal processor possess?

a) 1

b) 2

c) 3

d) 4

Answer: b

Explanation: Digital signal processor function involves setting up of two tables and one is for sampled data and the other table is for filter coefficients which determine the filter response. It takes values from the table and performs programs.

3. Why is said that branch prediction is not applicable in a digital signal processor?

a) low bandwidth

b) high bandwidth

c) low frequency

d) high frequency

Answer: a

Explanation: Loop control timing varies depending on the branch predictions which in turn make bandwidth predictions difficult thereby lowering the bandwidth of the digital signal processor.

4. Which architecture can one overcome the low bandwidth issue in MC6800 family?

a) RISC

b) CISC

c) von Neumann

d) program stored

Answer: a

Explanation: RISC architecture can offer some improvement in the low bandwidth issue since it has the ability to perform operations in a single cycle.

5. Which architecture in digital signal processor reduces the execution time?

a) Harvard

b) CISC

c) program storage

d) von Neumann

Answer: a

Explanation: Harvard architecture in a digital signal processor allows continuous data fetching and performing the corresponding instructions.

6. Which of the following processors also can work as a digital signal processor?

a) 8086

b) 8088

c) 8080

d) ARM9E

Answer: d

Explanation: ARM9E can also have DSP level of performance without having a digital signal processor by its enhanced DSP instructions.

7. What types of modules are used in the digital signal processor to form the loop structure?

a) modulo-timer

b) modulo-counter

c) timer

d) external timer

Answer: b

Explanation: By using hardware multipliers, counters etc the entire hardware can be redesigned to perform some specific functions which are used in digital signal processors. One such is the modulo-counter to form the loop structure.

8. Name a processor which is used in digital audio appliances.

a) 8086

b) Motorola DSP56000

c) 80486

d) 8087

Answer: b

Explanation: Motorola DSP56000 is a powerful digital signal processor which is used in digital audio applications which have the capability of noise reduction and multi-band graphics whereas 8087 is a coprocessor and 80486 and 8086 are microprocessors.

9. How many bits does DSP56000 processor have?

a) 8

b) 16

c) 24

d) 32

Answer: c

Explanation: In order to increase the resolution, DSP56000 is a 24-bit data word processor.

10. How many buses did DSP56000 possess?

a) 2

b) 3

c) 4

d) 5

Answer: b

Explanation: It possess three separate external buses, one is for the program and the remaining two buses are for X and Y memories for data.

11. Which of the following architecture does DSP56000 possess?

a) Harvard

b) von Neumann

c) CISC

d) program-stored

Answer: a

Explanation: DSP56000 possess Harvard architecture since this architecture has a separate bus for program memory and data memory.

12. What does AAU stand for?

a) arithmetic address unit

b) address arithmetic unit

c) address access unit

d) arithmetic access unit

Answer: b

Explanation: DSP56000 possess two external bus switches in which one is for data and the other is for the address for communicating with the outside world and these two switches are reproduced by the internal data bus and AAU.

13. How many address register does the AAU of a DSP56000 have?

a) 8

b) 16

c) 24

d) 32

Answer: c

Explanation: AAU have 24 address registers in three banks of eight.

14. How many registers does a DSP56000 have?

a) 4

b) 5

c) 7

d) 6

Answer: c

Explanation: DSP56000 has six 24-bit registers for controlling the loop counts, operating mode, stack manipulation and condition codes.

15. Which of the following bits are used for sign extension in DSP56000?

a) upper 8 bits of the stack pointer

b) lower 8 bits of the stack pointer

c) lower 8 bits of the program counter

d) upper 8 bits of the program counter

Answer: d

Explanation: The DSP56000 have a 24-bit program counter in which the upper 8 bits are only used for sign extension.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “The Berkeley RISC Model and Digital Signal Processing”.


1. How many bit register set does RISC 1 model used?

a) 138*24

b) 138*32

c) 69*16

d) 69*32

Answer: b

Explanation: RISC 1 model is developed in the 1970s and uses a large register set of 138*32 bit. These are arranged in eight overlapping windows which have 24 registers each and these windows are split so that six registers can be used during function calls.

2. Which of the following processor commercializes the Berkeley RISC model?

a) SPARC

b) Stanford

c) RISC-1

d) RISC

Answer: a

Explanation: The Berkeley RISC design was developed between the year 1980 and 1984 and later on the RISC design were commercialized as SPARC processor.

3. How many transistors does RISC 1 possess?

a) 44000

b) 45000

c) 44500

d) 45500

Answer: c

Explanation: The final design of the RISC concept is called the RISC 1 which was published by ACM ISCA. It possesses 44500 transistors which can implement 31 instruction.

4. How many registers does RISC 1 model have?

a) 68

b) 58

c) 78

d) 88

Answer: c

Explanation: The RISC 1 model have 78 registers of size 32 bits.

5. Which of the architectures are made to speed up the processor?

a) CISC

b) RISC

c) program stored

d) von Neumann

Answer: b

Explanation: RISC architecture is made for speeding up the processor with limited execution time whereas CISC architecture is mainly for code efficiency.

6. How did 8086 pass its control to 8087?

a) BUSY instruction

b) ESCAPE instruction

c) CONTROL instruction

d) fetch 8087

Answer: b

Explanation: When 8086 comes across any floating point arithmetic operations, it executes ESCAPE instruction code in order to pass the control of bus and instruction op-code to 8087.

7. Which of the following processor supports MMX instructions?

a) 8080

b) 80486

c) Intel Pentium

d) 80386

Answer: c

Explanation: MMX instructions or multimedia extensions were introduced in Pentium processors to provide support for multimedia software running on a PC.

8. Which of the following processors has a speculative execution?

a) 80486

b) P1

c) Intel Pentium

d) Pentium pro

Answer: d

Explanation: Speculative execution is executed speculatively that is, following the predicted branch paths in the code until the true path is determined. If the processor executes correctly, then the performance is gained, if not, the results are discarded and the processor continues to execute until the correct path is identified.

9. How many bit accumulator does DSP56000 have?

a) 28

b) 56

c) 112

d) 14

Answer: b

Explanation: The ALU of DSP56000 have two 56-bit accumulator A and B each of which have a small register with it.

10. How many additional registers does DSP56000 have?

a) 2

b) 4

c) 6

d) 8

Answer: b

Explanation: In addition to the six registers of DSP56000, it has four 24-bit registers X1, X0, Y1, Y0 which can be concatenated to form 48 bit register X and Y.

11. What does MAC instruction of DSP56000 stand for?

a) multiply accumulator

b) multiple access

c) multiple accounting

d) multiply accumulator counter

Answer: a

Explanation: When MAC instruction is executed, the two of the 24-bit additional registers are multiplied together and then added or subtracted from A and B. It takes place in a single machine cycle of 75ns at 27MHz.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “The Sun SPARC RISC Model”.


1. What does SPARC stand for?

a) scalable processor architecture

b) speculating architecture

c) speculating processor

d) scaling Pentium architecture

Answer: a

Explanation: SPARC was designed for optimizing compilers and easily pipelined hardware implementations and it can license by anyone that is, having a nonproprietary architecture which is used to develop various microprocessors.

2. How many bits does SPARC have?

a) 8

b) 16

c) 32

d) 64

Answer: c

Explanation: It is a 32 bit RISC architecture having 32-bit wide register bank.

3. Which company developed SPARC?

a) intel

b) IBM

c) Motorola

d) sun microsystem

Answer: d

Explanation: SPARC is developed by Sun Microsystem but different manufacturers from other companies like Intel, Texas worked on it.

4. What improves the context switching and parameter passing?

a) register windowing

b) large register

c) stack register

d) program counter

Answer: a

Explanation: SPARC follows Berkeley architecture model and uses register windowing in order to improve the context switching and parameter passing. It also supports superscalar operations.

5. How many external interrupts does SPARC processor support?

a) 5

b) 10

c) 15

d) 20

Answer: c

Explanation: SPARC processor provides 15 external interrupts which are generated by the interrupt lines IRL0-IRL3.

6. Which level is an in-built nonmaskable interrupt in SPARC processor?

a) 15

b) 14

c) 13

d) 12

Answer: a

Explanation: The level 15 of the SPARC processor is assigned to be a nonmaskable interrupt and the remaining 14 levels are unmasked and if necessary they can be made maskable.

7. How many instructions does SPARC processor have?

a) 16

b) 32

c) 64

d) 128

Answer: c

Explanation: The instruction set of SPARC processor have 64 instructions which can be accessed by load and store operation with a RISC architecture.

8. What is generated by an external interrupt in SPARC?

a) internal trap

b) external trap

c) memory trap

d) interfaced trap

Answer: a

Explanation: In SPARC when an external interrupt is generated, an internal trap is created in the trap base register in which the current and next instructions are saved, the pipeline gets flushed and the processor turns into a supervisor mode.

9. When an external interrupt is generated, what type of mode does the processor supports?

a) real mode

b) virtual mode

c) protected mode

d) supervisor mode

Answer: d

Explanation: In SPARC when an external interrupt is called, it creates an internal trap in which the current and next instructions get saved and mode of the processor switches to supervisor mode.

10. Where is trap vector table located in SPARC processor?

a) program counter

b) Y register

c) status register

d) trap base register

Answer: d

Explanation: The trap vector table is located in the trap base register which supplies the address of the service routine. When it is completed REIT instructions are executed.

11. How many bits does SPARC-V9 processor have?

a) 16

b) 32

c) 64

d) 128

Answer: c

Explanation: There are three major versions of SPARC which are SPARC-V7, SPARC-V8 and SPARC-V9. The former two are 32 bits processor and the later is a 64-bit processor.

12. What are the three modules in the SPARC processor?

a) IU, FPU, CU

b) SP, DI, SI

c) AX, BX, CX

d) CU, CH, CL

Answer: a

Explanation: The SPARC processor has three modules which are Integer unit, Floating point unit, and coprocessor unit. Each module has its own functions and integer unit controls the overall operation of the processor.

13. How many floating point register does the FPU of the SPARC have?

a) 16 128-bit

b) 32 128-bit

c) 64 128-bit

d) 10 128-bit

Answer: a

Explanation: It possesses 32 32-bit single precision, 32 64-bit double precision and 16 128-bit quads precise floating registers.

14. Which module of SPARC contains the general purpose registers?

a) IU

b) FPU

c) CU

d) control unit

Answer: a

Explanation: Integer unit contains the general purpose registers and it controls the overall operation and performance of the processor and the memory address is also calculated by the integer unit.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Types of Processors”.


1. What shows the brightness of the pixel in a digital signal processor?

a) luminance

b) transparent

c) chrominance

d) opaque

Answer: a

Explanation: The color image of a digital signal processor have multiple channels. The brightness of the pixel is determined by luminance and the color of the pixel is determined by chrominance.

2. What is the color format of chrominance in a digital signal processor?

a) VGBA

b) VIBGYOR

c) White

d) RGBA

Answer: d

Explanation: RGBA colors have four channels red, green, blue, and alpha, which is transparent.

3. Which of the following processor are designed to perform calculations in graphics rendering?

a) GPU

b) digital signal processor

c) microprocessor

d) microcontroller

Answer: a

Explanation: Graphics processing unit is designed to perform calculations in graphics rendering. Intel, NVIDIA, and AMD are dominant providers of GPU.

4. Which of the processor is a good match for applications such as video games?

a) GPU

b) VLIW

c) Coprocessor

d) Microcontroller

Answer: a

Explanation: GPU is a graphics processing unit. Therefore, more graphical images can be created by GPU which is necessary for video games. Therefore, GPU is a good match for video games.

5. Which of the following statement is true for concurrency?

a) different parts of the program executes physically

b) different parts of the program executes sequentially

c) different parts of the program executes conceptually

d) different parts of the program executes sequentially and physically

Answer: c

Explanation: A concurrent program executes different parts of the program conceptually, a parallel program executes different programs physically and a non-concurrent program executes the program in sequential order.

6. Which is an imperative language?

a) C program

b) SQL

c) XQuery

d) Concurrent model of HDL

Answer: a

Explanation: Imperative language is one which executes the program in sequential order. C program is an example of imperative language, SQL and XQuery are examples of declarative languages or non-imperative language. Concurrent model in HDL is a hardware description language which executes the program concurrently.

7. Which of the following instructions supports parallel execution?

a) VLIW

b) TTA

c) ALU operation

d) Test-and-set instructions

Answer: a

Explanation: VLIW is a very long instruction word which receives many instructions and is executed in one instructed word. VLIW is majorly designed for instruction-level parallel  that is, it can execute codes concurrently or parallel in some time. TTA is a transport triggered architecture which is a type of CPU design which programs controlling the internal buses of the processor. Test-and-set is used to write to a memory location and return its old values. ALU used to perform arithmetic and logic operations.

8. Who invented VLIW architecture?

a) Josh Fisher

b) John Ellis

c) John Ruttenberg

d) John O’Donnell

Answer: a

Explanation: Josh Fisher from Yale Universities invented the concept of VLIW architecture. John Ellis described the VLIW compiler. John Ruttenberg develops some important algorithms in scheduling.

9. What is ILP?

a) instruction-level parallelism

b) instruction-level panel

c) instruction-language panel

d) inter-language parallelism

Answer: a

Explanation: A processor which supports instruction-level parallelism can perform multiple independent operations in every instruction cycle. Basically, there are four types of instructions. These are CISC instructions, subword parallelism, superscalar, and VLIW.

10. Which ILP supports the ALU division?

a) Subword parallelism

b) CISC

c) Superscalar

d) VLIW

Answer: a

Explanation: In subword parallelism, the wide ALU is divided into smaller slices which enable simultaneous arithmetic and logical operations.

11. Which is a vector processor?

a) Subword parallelism

b) CISC

c) Superscalar

d) VLIW

Answer: a

Explanation: Subword parallelism is a form of a vector processing. A vector processor is the one whose instruction set includes operations on multiple data elements simultaneously.

12. Which of the following architecture supports out-of-order execution?

a) RISC

b) CISC

c) Superscalar

d) Subword parallelism

Answer: c

Explanation: Superscalar architecture support out-of-order execution in which the instructions later in the stream are executed before earlier instructions.

13. Which is an example of superscalar architecture?

a) Pentium 4

b) 8086

c) 80386

d) Pentium pro

Answer: a

Explanation: Pentium 4 is a single core CPU used in desktops, laptops which are proposed by Intel. It has Netburst architecture.

14. Which of the following is a combination of several processors on a single chip?

a) Multicore architecture

b) RISC architecture

c) CISC architecture

d) Subword parallelism

Answer: a

Explanation: The Multicore machine is a combination of many processors on a single chip. The heterogeneous multicore machine also combines a variety of processor types on a single chip.

15. Which is an example of the multi-core processor which possesses 10 cores?

a) Intel Xeon E7-2850

b) AMD Phenom IIX2

c) Intel core duo

d) AMD Phenom IIX3

Answer: a

Explanation: Intel Xeon E7-2850 have ten cores whereas AMD Phenom IIx2 and Intel core duo has two cores and AMD Phenom IIX3 has three cores.

This set of Embedded Systems Assessment Questions and Answers focuses on “Memory Technology of Embedded Systems”.


1. Which is the most basic non-volatile memory?

a) Flash memory

b) PROM

c) EPROM

d) ROM

Answer: d

Explanation: The basic non-volatile memory is ROM or mask ROM, and the content of ROM is fixed in the chip which is useful in firmware programs for booting up the system.

2. Who has invented flash memory?

a) Dr.Fujio Masuoka

b) John Ellis

c) Josh Fisher

d) John Ruttenberg

Answer: a

Explanation: Flash memory is invented by Dr. Fujio Masuoka at Toshiba in the 1980s which are non-volatile memory.

3. Which of the following is serial access memory?

a) RAM

b) Flash memory

c) Shifters

d) ROM

Answer: c

Explanation: The memory arrays are basically divided into three which are random access memory, serial access memory, and content address memory. Serial access memory is divided into two, theses are shifters and queues.

4. Which is the early form of non-volatile memory?

a) magnetic core memory

b) ferrimagnetic memory

c) anti-magnetic memory

d) anti-ferromagnetic

Answer: a

Explanation: The early form of non-volatile memory is known as magnetic core memory in which the ferromagnetic ring was magnetised to store data.

5. Which of the following memories has more speed in accessing data?

a) SRAM

b) DRAM

c) EPROM

d) EEPROM

Answer: a

Explanation: SRAM have more speed than DRAM because it has 4 to 6 transistors arranged as flip-flop logic gates, that is it can be flipped from one binary state to another but DRAM has a small capacitor as its storage element.

6. In which memory, the signals are multiplexed?

a) DRAM

b) SRAM

c) EPROM

d) EEPROM

Answer: a

Explanation: The signals in address bus are multiplexed with DRAM non-multiplexed with SRAM.

7. How many main signals are used with memory chips?

a) 2

b) 4

c) 6

d) 8

Answer: b

Explanation: The main signals associated with memory chips are four. These are the signals associated with address bus, data bus, chip select signals, and control signals for read and write operations.

8. What is the purpose of the address bus?

a) to provide data to and from the chip

b) to select a specified chip

c) to select a location within the memory chip

d) to select a read/write cycle

Answer: c

Explanation: Address bus is used to choose a particular location in the memory chip. Data bus is used to provide data to and from the chip. Chip select signals are used to select a particular chip within the memory.

9. Which are the two main types of processor connection to the motherboard?

a) sockets and slots

b) sockets and pins

c) slots and pins

d) pins and ports

Answer: a

Explanation: The type of processor which connects to a socket on the bottom surface of the chip that connects to the motherboard by Zero Insertion Force Socket. Intel 486 is an example of this type of connection. The processor slot is one which is soldered into a card, which connects to a motherboard by a slot. Example for slot connection is Pentium 3.

10. Which of the following has programmable hardware?

a) microcontroller

b) microprocessor

c) coprocessor

d) FPGA

Answer: d

Explanation: Field programmable gate arrays are a type of multi-core architecture whose hardware function can be programmed by using hardware design tools.

11. Who invented TriMedia processor?

a) Intel

b) IBM

c) Apple

d) NXP Semiconductor

Answer: d

Explanation: TriMedia is a VLIW processor from NXP Semiconductor in the Netherlands. It possesses a Harvard architecture CPU for video and audio applications.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “SRAM”.

.

1. Why is SRAM more preferably in non-volatile memory?

a) low-cost

b) high-cost

c) low power consumption

d) transistor as a storage element

Answer: c

Explanation: SRAM will retain data as long it is powered up and it does not need to be refreshed as DRAM. It is designed for low power consumption and used in preference. DRAM is cheaper than SRAM but it is based on refresh circuitry as it loses charge since the capacitor is the storage element.

2. Which of the following ahs refreshes control mechanism?

a) DRAM

b) SRAM

c) Battery backed-up SRAM

d) Pseudo-static RAM

Answer: d

Explanation: Pseudo RAM uses DRAM cells because of its higher memory density and it have refresh control which is an additional function of DRAM and is suitable for low power consumption. It has both the advantages of SRAM and DRAM.

3. Which storage element is used by MAC and IBM PC?

a) CMOS

b) Transistor

c) Capacitor

d) Inductor

Answer: a

Explanation: CMOS is complementary metal oxide semiconductor which is used by MAC and IBM PC as storage element because it contains configuration data of SRAM and is battery back-up to ensure that it is powered up when the computer is switched off.

4. Which type of storage element of SRAM is very fast in accessing data but consumes lots of power?

a) TTL

b) CMOS

c) NAND

d) NOR

Answer: a

Explanation: TTL or transistor-transistor logic which is a type of bipolar junction transistor access data very fastly but consumes lots of power whereas CMOS is used in low power consumption.

5. What is approximate data access time of SRAM?

a) 4ns

b) 10ns

c) 2ns

d) 60ns

Answer: a

Explanation: SRAM access data in approximately 4ns because of its flip-flop arrangement of transistors whereas the data access time in DRAM is approximately 60ns since it has a single capacitor for one-bit storage.

6. Who proposed the miniature card format?

a) Intel

b) IBM

c) MIPS

d) Apple

Answer: a

Explanation: Miniature Card is an SRAM memory card proposed by Intel in the 1980s but it was no longer manufactured.

7. How many MOSFETs are required for SRAM?

a) 2

b) 4

c) 6

d) 8

Answer: c

Explanation: Six MOSFETs are required for a typical SRAM. Each bit of SRAM is stored in four transistors which form two cross-coupled inverters.

8. Which of the following is an SRAM?

a) 1T-RAM

b) PROM

c) EEPROM

d) EPROM

Answer: a

Explanation: 1T-RAM is a pseudo-static RAM which is developed by MoSyS, Inc. PROM, EPROM, and EEPROM are non-volatile memories.

9. Which of the following can access data even when the power supply is lost?

a) Non-volatile SRAM

b) DRAM

c) SRAM

d) RAM

Answer: a

Explanation: Random Access Memory is the primary storage which can access data only when it is powered up. But non-volatile SRAM can access data even when the power supply is lost. It is used in many applications like networking, aerospace etc.

10. Which of the following can easily convert to a non-volatile memory?

a) SRAM

b) DRAM

c) DDR SRAM

d) Asynchronous DRAM

Answer: a

Explanation: The low power consumption makes SRAM easily convertible to non-volatile memory, by adding a small battery it can retain its data even when the main power is lost.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “DRAM”.


1. Which memory storage is widely used in PCs and Embedded Systems?

a) SRAM

b) DRAM

c) Flash memory

d) EEPROM

Answer: b

Explanation: DRAM is used in PCs and Embedded systems because of its low cost. SRAM, flash memory and EEPROM are more costly than DRAM.

2. Which of the following memory technology is highly denser?

a) DRAM

b) SRAM

c) EPROM

d) Flash memory

Answer: a

Explanation: DRAM is highly denser and cheaper because it only uses a single capacitor for storing one bit.

3. Which is the storage element in DRAM?

a) inductor

b) capacitor

c) resistor

d) mosfet

Answer: b

Explanation: DRAM uses a small capacitor whose voltage represents a binary zero which is used as a storage element in DRAM in which a single transistor cell is used to store each bit of data.

4. Which one of the following is a storage element in SRAM?

a) capacitor

b) inductor

c) transistor

d) resistor

Answer: c

Explanation: Four to six transistors are used to store a single bit of data and form a flip-flop logic gate and thus SRAM is faster in accessing data.

5. Which of the following is more volatile?

a) SRAM

b) DRAM

c) ROM

d) RAM

Answer: b

Explanation: DRAM is said to be more volatile because it has a capacitor as its storage element in which the data disappears when the capacitor loses its charge so even when the device is powered the data can be lost.

6. What is the size of a trench capacitor in DRAM?

a) 1 Mb

b) 4-256 Mb

c) 8-128 Mb

d) 64-128 Mb

Answer: b

Explanation: Trench capacitor can store from 4-256 Mb but planar capacitor can store up to 1 Mb.

7. Which of the following capacitor can store more data in DRAM?

a) planar capacitor

b) trench capacitor

c) stacked-cell

d) non-polar capacitor

Answer: c

Explanation: Stacked-cell can store greater than 1 Gb. Planar capacitor can store up to 1 Mb and trench capacitor can store 4-256 Mb.

8. In which of the memories, does the data disappear?

a) SRAM

b) DRAM

c) Flash memory

d) EPROM

Answer: b

Explanation: Both SRAM and DRAM are volatile memories and flash memory and EPROM are non-volatile memories. DRAM has a storage element as a capacitor whose charge loses gradually thereby losing data.

9. Which of the following is the main factor which determines the memory capacity?

a) number of transistors

b) number of capacitors

c) size of the transistor

d) size of the capacitor

Answer: a

Explanation: The chip capacity is dependent on the number of transistors which can be fabricated on the silicon, and DRAM offers more storage capacity than SRAM.

10. What does VRAM stand for?

a) video RAM

b) verilog RAM

c) virtual RAM

d) volatile RAM

Answer: a

Explanation: Video RAM is a derivative of DRAM. It functions as a DRAM and has additional functions to access data for video hardware for creating the display.

11. What does TCR stand for?

a) temperature-compensated refresh

b) temperature-compensated recovery

c) texas CAS-RAS

d) temperature CAS-RAS

Answer: a

Explanation: The temperature-compensated refresh is one of the refreshing techniques used for extending the battery life by reducing the refresh rate.

This set of Embedded Systems Questions and Answers for Freshers focuses on “Memory Organisation of Embedded Systems”.


1. How many data lines does 256*4 have?

a) 256

b) 8

c) 4

d) 32

Answer: c

Explanation: There are four data lines in the memory and these different organisations of memory and these different organisations of memory are apparent when upgrading memory and it also determines how many chips are needed.

2. How is the number of chips required is determined?

a) number of data lines

b) the minimum number of data

c) width of the data path from the processor

d) number of data lines and the width of the data path from the processor

Answer: d

Explanation: The minimum number of chips is determined by the number of data lines and the width of the data path from the processor. For example, MC6800 family have a 16-bit wide datapath, 16*1 devices, 4*4 or 2*8 devices are needed.

3. Where is memory address stored in a C program?

a) stack

b) pointer

c) register

d) accumulator

Answer: b

Explanation: Memory model is defined by a range of memory address which is accessible to the program. For example, in the C program, the memory address is stored in the pointer.

4. Which is the term that is used to refer the order of bytes?

a) endianness

b) memory organisation

c) bit

d) register

Answer: a

Explanation: Endianness defines the order of bytes, that is, whether it is big endian or little endian. The former represents the higher order bits and the latter represents the lower order bits.

5. Which of the following processors uses big endian representation?

a) 8086

b) ARM

c) PowerPC

d) Zilog Z80

Answer: c

Explanation: The IBM’s PowerPC uses big endian representation whereas 8086, ARM and Zilog Z80 use little representation.

6. Which statement is true for a cache memory?

a) memory unit which communicates directly with the CPU

b) provides backup storage

c) a very high-speed memory to increase the speed of the processor

d) secondary storage

Answer: c

Explanation: The RAM is the primary storage which directly communicates with the CPU. ROM is the secondary storage. Disk drives are capable of providing backup storage and the cache memory is a small high-speed memory which increases the speed of the processor.

7. Which of the following memory organisation have the entire memory available to the processor at all times?

a) segmented addressing

b) paging

c) virtual address

d) linear address

Answer: d

Explanation: There are two types of memory organisation, linear addressing in which the entire memory is available to the processor of all times as in Motorola 6800 and the other is segmented addressing where the memory space is divided into several segments and the processor is limited to access the program instructions and data which are located in particular segments.

8. How many memory locations can be accessed by 8086?

a) 1 M

b) 2 M

c) 3 M

d) 4 M

Answer: a

Explanation: The 8086 processor has a 20-bit address bus, hence it can access a memory of 2 20 -1 M locations.

9. Which of them is a memory that is allocated to the program in LIFO pattern?

a) stack

b) index

c) accumulator

d) base

Answer: a

Explanation: A stack is a memory which is allocated to the program in last-in, first out pattern. Stack pointer contains the memory address of the stack.

10. What does SIMM stand for?

a) single in-line memory module

b) single interrupt memory module

c) single information memory module

d) same-in-line memory module

Answer: a

Explanation: SIMM is single in-line memory module is a kind of memory module, which contains random access memory used in computers of the early 1980s and 1990s.

11. Which of the memory organisation is widely used in parity bit?

a) by 1 organisation

b) by 4 organisation

c) by 8 organisation

d) by 9 organisation

Answer: a

Explanation: The use of By 1 organisation is declined because of the wider data path devices. But it is still used in parity bit and were used in SIMM memory.

12. Which configuration of memory organisation replaces By 1 organisation?

a) by 4 organisation

b) by 8 organisation

c) by 9 organisation

d) by 16 organisation

Answer: a

Explanation: By 1 organisation is replaced with By 4 organisation because of its reduced address bus and complexity.

13. Which shifting helps in finding the physical address in 8086?

a) shifting the segment by 8

b) shifting the segment by 6

c) shifting the segment by 4

d) shifting the segment by 2

Answer: c

Explanation: The address bus of the 8086 is 20-bit and the data bus is 16-bit in size. So the physical address can be calculated by shifting the segment register by 4 to left and by adding the address bus to it.

14. Which memory organisation is supported in wider memories?

a) by 8 organisation

b) by 16 organisation

c) by 9 organisation

d) by 4 organisation

Answer: b

Explanation: The wider memories support 16-bits because it can integrate more number of the interface logic so that the time consumed by the latches and buffers removes the memory access thus allowing the slower parts to be used in wait state free designs.

15. Which of the following is a plastic package used primarily for DRAM?

a) SIMM

b) DIMM

c) Zig-zag

d) Dual-in-line

Answer: c

Explanation: Zig-zag package of memory is a plastic package used for DRAM. The leads of this package are arranged in a zigzag manner.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Memory Management”.


1. Which of the following have a 16 Mbytes addressed range?

a) PowerPC

b) M68000

c) DSP56000

d) TMS 320

Answer: b

Explanation: The M68000 family has a 16 Mbyte addressing range. The PowerPC family has a larger 4 Gbyte range and the DSP56000 has a 128-kilo word address space.

2. Which of the following can destroy the accuracy in the algorithms?

a) delays

b) error signal

c) interrupt

d) mmu

Answer: a

Explanation: The delays occurring in the memory management unit can destroy the accuracy in the algorithms and in order to avoid this, the linear addressing range should be increased.

3. How many numbers of ways are possible for allocating the memory to the modular blocks?

a) 1

b) 2

c) 3

d) 4

Answer: c

Explanation: Most of the systems have a multitasking operating system in which the software consists of modular blocks of codes which run under the control of the operating system. There are three ways for allocating memory to these blocks. The first way distributes the block in a predefined way. The second way for allocating memory includes relocation or position independency in the software and the other way of allocating memory to the block is the address translation in which the logical address is translated to the physical address.

4. Which of the following is replaced with the absolute addressing mode?

a) relative addressing mode

b) protective addressing mode

c) virtual addressing mode

d) temporary addressing mode

Answer: a

Explanation: The memory allocation of the modular blocks can be done by the writing the software program in relocatable or position independent manner which can execute anywhere in the memory map, but relocatable code must have the same address between its data and code segments. This is used to avoid the use of absolute addressing modes which is replaced by the relative addressing modes.

5. What is the main purpose of the memory management unit?

a) address translation

b) large storage

c) reduce the size

d) provides address space

Answer: a

Explanation: The memory management unit handles with physical addresses. Therefore, the virtual or the logical address is first translated to the physical address.

6. Which of the following provides stability to the multitasking system?

a) memory

b) DRAM

c) SRAM

d) Memory partitioning

Answer: d

Explanation: The memory partitioning provides stability to the multitasking system so that the errors within one task will not corrupt the other tasks.

7. Which of the following is used by the M68000 family?

a) M68000

b) 80386

c) 8086

d) 80286

Answer: a

Explanation: The M68000 uses memory partitioning by the use of function code or by the combination of superscalar signals and the Harvard architecture.

8. What can be done for the fine grain protection of the processor?

a) add extra description bit

b) add error signal

c) add wait stage

d) remains unchanged

Answer: a

Explanation: The finer grain protection of memory management is achieved by the addition of extra description bit to an address to declare its status. The memory management unit can detect an error if the task attempts to access memory that has not been allocated to it or a certain kind of mismatch occurs.

9. Which of the following technique is used by the UNIX operating system?

a) logical address memory

b) physical address memory

c) virtual memory technique

d) translational address

Answer: c

Explanation: In the workstation and in the UNIX operating system virtual memory technique is frequently used in which the main memory is divided into different segments and pages. These pages will have a virtual address which can increase the address spacing.

10. Which of the following consist two lines of legs on both sides of a plastic or ceramic body?

a) SIMM

b) DIMM

c) Zig-zag

d) Dual in-line

Answer: d

Explanation: The dual-in-line package consists of two lines of legs on both sides of the plastic or ceramic. Most commonly used are BIOS EPROMs, DRAM and SRAM.

11. Which package has high memory speed and change in the supply?

a) DIP

b) SIMM

c) DIMM

d) zig-zag

Answer: c

Explanation: DIMM is a special version of SIMM which is 168-bits wider bus and looks similar to a larger SIMM. The wider bus increases the memory speed and change in supply voltage.

12. Which is a subassembly package?

a) dual-in-line

b) zig-zag

c) simm

d) ceramic shell

Answer: c

Explanation: The SIMM is basically a subassembly, not a package. It is a small board which possesses finger connection on the bottom and sufficient memory on the board in order to make up the required configuration.

13. What is the required voltage of DIMM?

a) 2V

b) 2.2V

c) 5V

d) 3.3V

Answer: d

Explanation: For increasing the speed and reducing the power consumption, it is necessary to reduce the power supply. Today’s CPUs and memories have 3.3V supply or even lower instead of the signal level from 0 to 5V. DIMMS are described by its voltage, speed, and memory type respectively as 3.3V 133MHz SDRAM DIMM.

14. Which memory package has a single row of pins?

a) SIMM

b) DIP

c) SIP

d) zig-zag

Answer: c

Explanation: The Single-in-line package is the same as that of SIMM, in which the finger connections are replaced by a single row of pins. SIP took the popularity of SIMM but nowadays it is rarely seen.

15. What is the access time of MCM51000AP10?

a) 100ns

b) 80ns

c) 60ns

d) 40ns

Answer: a

Explanation: The access time of memory is defined as the maximum time taken by the chip to read/write data and it is very important to match the access time to the design. For example, MCM51000AP10 have 100ns access time for the memory.

This set of Embedded Systems Questions and Answers for Aptitude test focuses on “DRAM Refreshing Techniques”.


1. Which is the very basic technique of refreshing DRAM?

a) refresh cycle

b) burst refresh

c) distributive refresh

d) software refresh

Answer: a

Explanation: The DRAM needs to be periodically refreshed and the very basic technique is a special refresh cycle, during these cycles no other access is permitted. The whole chip is refreshed within a particular time period otherwise, the data will be lost.

2. How is the refresh rate calculated?

a) by refresh time

b) by the refresh cycle

c) by refresh cycle and refresh time

d) refresh frequency and refresh cycle

Answer: c

Explanation: The time required for refreshing the whole chip is known as refresh time. The number of access needed to complete refresh is called as the number of cycles. The number of cycles divided by the refresh time gives the refresh rate.

3. Which is the commonly used refresh rate?

a) 125 microseconds

b) 120 microseconds

c) 130 microseconds

d) 135 microseconds

Answer: a

Explanation: There are two refresh rates used in common. They are standard refresh rate of 15.6 microseconds and 125 microseconds which the extended form.

4. How can we calculate the length of the refresh cycle?

a) twice of normal access

b) thrice of normal access

c) five times of normal access

d) six times of normal access

Answer: a

Explanation: Each of the refresh cycles is approximately as twice as the length of the normal access, for example, a 70ns DRAM has a refresh cycle time of 130ns.

5. What type of error occurs in the refresh cycle of the DRAM?

a) errors in data

b) power loss

c) timing issues

d) not accessing data

Answer: c

Explanation: When the refresh cycle in a DRAM is running, it will not access data, so the processor will have to wait for its data. This arises some timing issues.

6. What is the worst case delay of the burst refresh in 4M by 1 DRAM?

a) 0.4ms

b) 0.2ms

c) 170ns

d) 180ns

Answer: b

Explanation: A 4M by 1 DRAM have 1024 refresh cycles. Bursting delay will be 0.2ms that are, the worst case delay is 1024 times larger than that of the single refresh cycle. The distributed delay is about 170ns.

7. Which refresh techniques depends on the size of time critical code for calculating the refresh cycle?

a) burst refresh

b) distributed refresh

c) refresh cycle

d) software refresh

Answer: b

Explanation: Most of the system uses the distributed method and depending on the size of the time critical code, the number of refresh cycles can be calculated.

8. Which of the following uses a timer for refresh technique?

a) RAS

b) CBR

c) software refresh

d) CAS

Answer: c

Explanation: The software refresh performs the action by using a routine to periodically cycle through the memory and refreshes. It uses a timer in the program generating an interrupt. This interrupt performs the refreshing part in the DRAM.

9. What is the main disadvantage in the software refresh of the DRAM?

a) timer

b) delay

c) programming delay

d) debugging

Answer: d

Explanation: Debugging in software refresh is very difficult to perform because they may stop the refreshing and if the refreshing is stopped, the contents get lost.

10. Which refresh technique is useful for low power consumption?

a) Software refresh

b) CBR

c) RAS

d) Burst refresh

Answer: b

Explanation: CBR that is, CAS before RAS refresh is the one which is commonly used. It has low power consumption quality because it does not have address bus and the buffers can be switched off. It is worked by using an internal address counter which is stored on the memory chip itself and this can be incremented periodically.

11. Which refreshing techniques generate a recycled address?

a) RAS

b) CBR

c) Distributed refresh

d) Software refresh

Answer: a

Explanation: The row address is placed on the address bus and the column address is held off which generates the recycle address. The address generation is done by an external hardware controller.

12. Which of the following uses a software refresh in the DRAM?

a) 8086

b) 80386

c) Pentium

d) Apple II personal computer

Answer: d

Explanation: The Apple II personal computer has a particular memory configuration, periodically the DRAM gets blocked and is used for video memory accessing to update the screen which can refresh the DRAM.

13. How do CBR works?

a) by asserting CAS before RAS

b) by asserting CAS after RAS

c) by asserting RAS before CAS

d) by asserting CAS only

Answer: a

Explanation: CBR works by an internal address counter which is periodically incremented. The mechanism is based on CAS before RAS. Each time when RAS is asserted, the refresh cycle performs and the counter is incremented.

14. Which of the refresh circuit is similar to CBR?

a) software refresh

b) hidden refresh

c) burst refresh

d) distribute refresh

Answer: b

Explanation: In the hidden refresh, the refresh cycle is added to the end of a normal read cycle. The RAS signal goes high and is then asserted low. At the end of the read cycle, the CAS is still asserted. This is similar to the CBR mechanism, that is, toggling of the RAS signal at the end of the read cycle starts a CBR refresh cycle.

15. Which technology is standardized in DRAM for determining the maximum time interval between the refresh cycle?

a) IEEE

b) RAPID

c) JEDEC

d) UNESCO

Answer: c

Explanation: The maximum time interval between refresh cycle is standardized by JEDEC, Joint Electron Device Engineering Council which is an independent semiconductor engineering trade organization. This standardized JEDEC in DRAM is specified in the manufacturer’s chip specification.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “DRAM Interfaces”.


1. In which pin does the data appear in the basic DRAM interfacing?

a) dout pin

b) din pin

c) clock

d) interrupt pin

Answer: a

Explanation: In the basic DRAM interfacing, the higher order bits asserts the RAS signal and the lower order bits asserts the CAS signal. When the access got expired, the data appears on the dout pin and is latched by the processor.

2. What is the duration for memory refresh to remain compatible?

a) 20 microseconds

b) 12 microseconds

c) 15 microseconds

d) 10 microseconds

Answer: c

Explanation: The memory refresh is performed every 15 microseconds in order to remain compatible.

3. Which interfacing method lowers the speed of the processor?

a) basic DRAM interface

b) page mode interface

c) page interleaving

d) burst mode interface

Answer: a

Explanation: The direct method access limits the wait state-free operation which lowers the processor speed.

4. What is EDO RAM?

a) extreme data operation

b) extended direct operation

c) extended data out

d) extended DRAM out

Answer: c

Explanation: EDO RAM is a special kind of random access memory which can improve the time to read from the memory on faster microprocessors. The example of such a microprocessor is Intel Pentium.

5. What is RDRAM?

a) refresh DRAM

b) recycle DRAM

c) Rambus DRAM

d) refreshing DRAM

Answer: c

Explanation: Rambus DRAM is a synchronous memory developed by Rambus. It can replace SDRAM and is useful in high bandwidth applications.

6. Which of the following can transfer up to 1.6 billion bytes per second?

a) DRAM

b) RDRAM

c) EDO RAM

d) SDRAM

Answer: b

Explanation: The Rambus RAM can transfer up to 1.6 billion bytes per second. It possesses RAM controller, a bus which connects the microprocessor and the device, and random access memory.

7. Which of the following cycle is larger than the access time?

a) write cycle

b) set up time

c) read cycle

d) hold time

Answer: c

Explanation: The read cycle in the DRAM interfacing is larger than the access time because of the precharge time.

8. Which mode of operation selects an internal page of memory in the DRAM interfacing?

a) page interleaving

b) page mode

c) burst mode

d) EDO RAM

Answer: b

Explanation: In the page mode operation, the row address is provided as normal but the RAS signal is left asserted. This, in turn, selects an internal page within the DRAM memory where any bit of data can be accessed by placing the column address and asserting CAS.

9. What is the maximum time that the RAS signal can be asserted in the page mode operation?

a) 5 microseconds

b) 10 microseconds

c) 15 microseconds

d) 20 microseconds

Answer: b

Explanation: The maximum time that the RAS signal can be asserted during the page mode operation is about 10 microseconds. But this is a major disadvantage for page mode operation, that is, the standard PCs have a maximum time of 15 microseconds for the refresh cycle.

10. Which of the following mode of operation in the DRAM interfacing has a page boundary?

a) burst mode

b) EDO RAM

c) page mode

d) page interleaving

Answer: c

Explanation: The page mode operation have memory cycles that exhibit some form of locality, that is, stay within the page boundary which causes page missing when there is access outside the page boundary and two or more wait states.

11. Which mode offers the banking of memory in the DRAM interfacing technique?

a) page mode

b) basic DRAM interfacing

c) page interleaving

d) burst mode

Answer: c

Explanation: The accessing of data outside the page boundary can cause missing of pages in the page mode operation. So a program has to operate for frequently accessing data thereby, increasing the efficiency in the page selection. One such mode is the page interleaving mode in which the memory is divided into different banks, depending on the number of memories installed.

12. Which of the following has a fast page mode RAM?

a) burst mode

b) page interleaving

c) EDO memory

d) page mode

Answer: c

Explanation: Extended data out memory is a fast page mode RAM which has a faster cycling process which makes EDO memory a faster page mode access.

13. Which mode reduces the need for fast static RAMs?

a) page mode

b) page interleaving

c) burst mode

d) EDO memory

Answer: c

Explanation: The page mode, nibble mode devices can provide data fastly when the new column address is given. In burst mode operation, the processor can fetch more data than it needs and keeps the remaining data in an internal cache for the future use which can reduce the need for fast static RAMs.

14. Which of the following is also known as hyper page mode enabled DRAM?

a) page mode

b) EDO DRAM

c) burst EDO DRAM

d) page interleaving

Answer: b

Explanation: The EDO DRAM is also known as hyper page mode enable DRAM because of the faster page mode operation along with some additional features.

15. What does BEDO DRAM stand for?

a) burst EDO DRAM

b) buffer EDO DRAM

c) BIBO EDO DRAM

d) bilateral EDO DRAM

Answer: a

Explanation: The burst EDO DRAM is evolved from the EDO DRAM and it can access four memory addresses in one burst. It also supports pipeline stages which allow the page access cycle into two parts.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Cache Memory”.


1. Which of the following is more quickly accessed?

a) RAM

b) Cache memory

c) DRAM

d) SRAM

Answer: b

Explanation: The cache memory is a small random access memory which is faster than a normal RAM. It has a direct connection with the CPU otherwise, there will be a separate bus for accessing data. The processor will check whether the copy of the required data is present in the cache memory if so it will access the data from the cache memory.

2. Which factor determines the effectiveness of the cache?

a) hit rate

b) refresh cycle

c) refresh rate

d) refresh time

Answer: a

Explanation: The proportion of accesses of data that forms the cache hit, which measures the effectiveness of the cache memory.

3. Which of the following determines a high hit rate of the cache memory?

a) size of the cache

b) number of caches

c) size of the RAM

d) cache access

Answer: a

Explanation: The size of the cache increases, a large amount of data can be stored, which can access more data which in turn increases the hit rate of the cache memory.

4. Which of the following is a common cache?

a) DIMM

b) SIMM

c) TLB

d) Cache

Answer: c

Explanation: The translation lookaside buffer is common cache memory seen in almost all CPUs and desktops which are a part of the memory management unit. It can improve the virtual address translation speed.

5. Which factor determines the number of cache entries?

a) set commutativity

b) set associativity

c) size of the cache

d) number of caches

Answer: b

Explanation: The set associativity is a criterion which describes the number of cache entries which could possibly contain the required data.

6. What is the size of the cache for an 8086 processor?

a) 64 Kb

b) 128 Kb

c) 32 Kb

d) 16 Kb

Answer: a

Explanation: The 8086 processor have a 64 Kbytes cache, beyond this size, the cost will be extremely high.

7. How many possibilities of mapping does a direct mapped cache have?

a) 1

b) 2

c) 3

d) 4

Answer: a

Explanation: The direct mapped cache only have one possibility to fetch data whereas a two-way system, there are two possibilities, for a three-way system, there are three possibilities and so on. It is also known as the one-way set associative cache.

8. Which of the following allows speculative execution?

a) 12-way set associative cache

b) 8-way set associative cache

c) direct mapped cache

d) 4-way set associative cache

Answer: c

Explanation: The direct mapped cache has the advantage of allowing a simple and fast speculative execution.

9. Which of the following refers to the number of consecutive bytes which are associated with each cache entry?

a) cache size

b) associative set

c) cache line

d) cache word

Answer: c

Explanation: The cache line refers to the number of consecutive bytes which are associated with each cache entry. The data is transferred between the memory and the cache in a particular size which is called a cache line.

10. Which factor determines the cache performance?

a) software

b) peripheral

c) input

d) output

Answer: a

Explanation: The cache performance is completely dependent on the system and software. In software, the processor checks out each loop and if a duplicate is found in the cache memory, immediately it is accessed.

11. What are the basic elements required for cache operation?

a) memory array, multivibrator, counter

b) memory array, comparator, counter

c) memory array, trigger circuit, a comparator

d) memory array, comparator, CPU

Answer: b

Explanation: The cache memory operation is based on the address tag, that is, the processor generates the address which is provided to the cache and this cache stores its data with an address tag. The tag is compared with the address, if they did not match, the next tag is checked. If they match, a cache hit occurs, the data is passed to the processor. So the basic elements required is a memory array, comparator, and a counter.

12. How many divisions are possible in the cache memory based on the tag or index address?

a) 3

b) 2

c) 4

d) 5

Answer: c

Explanation: There is four classification based on the tag or index address corresponds to a virtual or physical address. They are PIPT, VIVT, PIVT, VIPT that is, physically indexed physically tagged, virtually indexed virtually tagged, physically indexed virtually tagged, virtually indexed physically tagged respectively.

13. What does DMA stand for?

a) direct memory access

b) direct main access

c) data main access

d) data memory address

Answer: a

Explanation: The DMA is direct memory access which can modify the memory without the help of the processor. If any kind of memory access by DMA to be done, it will passes a request to the processor bus and the processor provides an acknowledgment and gives the control of the bus to the DMA.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Size of Cache”.


1. Which of the following cache has a separate comparator for each entry?

a) direct mapped cache

b) fully associative cache

c) 2-way associative cache

d) 16-way associative cache

Answer: b

Explanation: A fully associative cache have a comparator for each entry so that all the entries can be tested simultaneously.

2. What is the disadvantage of a fully associative cache?

a) hardware

b) software

c) memory

d) peripherals

Answer: a

Explanation: The major disadvantage of the fully associative cache is the amount of hardware needed for the comparison increases in proportion to the cache size and hence, limits the fully associative cache.

3. How many comparators present in the direct mapping cache?

a) 3

b) 2

c) 1

d) 4

Answer: c

Explanation: The direct mapping cache have only one comparator so that only one location possibly have all the data irrespective of the cache size.

4. Which mapping of cache is inefficient in software viewpoint?

a) fully associative

b) 2 way associative

c) 16 way associative

d) direct mapping

Answer: d

Explanation: The direct mapping cache organization is simple from the hardware design aspects but it is inefficient in the software viewpoint.

5. Which mechanism splits the external memory storage into memory pages?

a) index mechanism

b) burst mode

c) distributive mode

d) a software mechanism

Answer: a

Explanation: The index mechanism splits the external memory storage into a series of memory pages in which each page is the same size as the cache. Each page is mapped to the cache so that each page can have its own location in the cache.

6. Which of the following cache mapping can prevent bus thrashing?

a) fully associative

b) direct mapping

c) n way set associative

d) 2 way associative

Answer: c

Explanation: Only one data can be accessed in direct mapping that is, if one word is accessed at a time, all other words are discarded at the same time. This is known as bus thrashing which can be solved by splitting up the caches so there are 2,4,..n possible entries available. The major advantage of the set associative cache is its capability to prevent the bus thrashing at the expense of hardware.

7. Which cache mapping have a sequential execution?

a) direct mapping

b) fully associative

c) n way set associative

d) burst fill

Answer: d

Explanation: The burst fill mode of cache mapping have a sequential nature of executing instructions and data access. The instruction fetches and execution accesses to sequential memory locations until it has a jump instruction or a branch instruction. This kind of cache mapping is seen in the MC68030 processor.

8. Which address is used for a tag?

a) memory address

b) logical address

c) cache address

d) location address

Answer: b

Explanation: The cache memory uses either a physical address or logical address for its tag data. For a logical cache, the tag refers to a logical address and for a physical cache, the tag refers to the physical address.

9. In which of the following the data is preserved within the cache?

a) logical cache

b) physical cache

c) unified cache

d) harvard cache

Answer: b

Explanation: In the physical cache, the data is preserved within the cache because it does not flush out during the context switching but on the other hand, the logical cache flushes out the data and clear it during a context switching.

10. What is the disadvantage of the physical address?

a) debugging

b) delay

c) data preservation

d) data cleared

Answer: b

Explanation: The physical address access the data through the memory management unit which causes a delay.

11. Which cache memory solve the cache coherency problem?

a) physical cache

b) logical cache

c) unified cache

d) harvard cache

Answer: a

Explanation: The physical cache is more efficient and can provide the cache coherency problem solved and MMU delay is kept to a minimum. PowerPC is an example for this advantage.

12. What type of cache is used in the Intel 80486DX?

a) logical

b) physical

c) harvard

d) unified

Answer: d

Explanation: The Intel 80486DX processor has a unified cache. Similarly, Motorola MPC601PC also uses the unified cache. The unified cache has the same mechanism to store both data and instructions.

13. Which of the following has a separate cache for the data and instructions?

a) unified

b) harvard

c) logical

d) physical

Answer: b

Explanation: The Harvard cache have a separate cache for the data and the instruction whereas the unified cache has a same cache for the data and instructions.

14. Which type of cache is used the SPARC architecture?

a) unified

b) harvard

c) logical

d) physical

Answer: c

Explanation: The SPARC architecture uses logical cache whereas most of the internal cache designed now, uses physical cache because data is not flushed out in this cache.

15. Which of the following approach uses more silicon area?

a) unified

b) harvard

c) logical

d) physical

Answer: b

Explanation: The Harvard architecture have a separate bus for data and instruction, therefore, it requires more area. It also uses more silicon area for the second set of tags and the comparators.

This set of Embedded Systems Interview Questions and Answers for freshers focuses on “Writing Scheme of Cache Memory”.


1. Which of the following is the biggest challenge in the cache memory design?

a) delay

b) size

c) coherency

d) memory access

Answer: c

Explanation: The coherency is a major challenge in designing the cache memory. The cache has to be designed by solving the problem of data coherency while remaining hardware and software compatible.

2. What arises when a copy of data is held both in the cache and in the main memory?

a) stall data

b) stale data

c) stop data

d) wait for the state

Answer: b

Explanation: The stale data arises when the copy is held both in the cache memory and in the main memory. If either copy is modified, the other data become stale and the system coherency can be destroyed.

3. In which writing scheme does all the data writes go through to main memory and update the system and cache?

a) write-through

b) write-back

c) write buffering

d) no caching of writing cycle

Answer: a

Explanation: There are different writing scheme in the cache memory which increases the cache efficiency and one such is the write-through in which all the data go to the main memory and can update the system as well as the cache.

4. In which writing scheme does the cache is updated but the main memory is not updated?

a) write-through

b) write-back

c) no caching of writing cycle

d) write buffering

Answer: b

Explanation: The cache write-back mechanism needs a bus snooping system for the coherency. In this write-back scheme, the cache is updated first and the main memory is not updated.

5. In which writing scheme does the cache is not updated?

a) write-through

b) write-back

c) write buffering

d) no caching of writing cycle

Answer: d

Explanation: The no caching write cycle does not update the cache but the data is written to the cache. If the previous data had cached, that entry is invalid and will not use. This makes the processor fetch data directly from the main memory.

6. Which writing mechanism forms the backbone of the bus snooping mechanism?

a) write-back

b) write-through

c) no caching of write cycles

d) write buffer

Answer: c

Explanation: The no caching of write cycle seems to be wasteful because it does not update the cache, and if any previous data is cached, that entry might be an error and is not used. So the processor access data from the main memory but this writing scheme forms the backbone of the bus snooping system for the coherency issue.

7. What is the main idea of the writing scheme in the cache memory?

a) debugging

b) accessing data

c) bus snooping

d) write-allocate

Answer: c

Explanation: There are four main writing scheme in the cache memory which is, write-through, write-back, no caching of the write cycle and write buffer. All these writing schemes are designed for bus snooping which can reduce the coherency.

8. In which scheme does the data write via a buffer to the main memory?

a) write buffer

b) write-back

c) write-through

d) no caching of the write cycle

Answer: a

Explanation: The write-buffer is slightly similar to the write-through mechanism in which data is written to the main memory but in write buffer mechanism data writes to the main memory via a buffer.

9. Which of the following can allocate entries in the cache for any data that is written out?

a) write-allocate cache

b) read-allocate cache

c) memory-allocate cache

d) write cache

Answer: a

Explanation: A write-allocate cache allocates the entries in the cache for any data that is written out. If the data is transferred to the external memory so that, when it is accessed again, the data is already waiting in the cache. It works efficiently if the size of the cache is large and it does not overwrite even though it is advantageous.

10. Which of the following uses a bus snooping mechanism?

a) MC88100

b) 8086

c) 8051

d) 80286

Answer: a

Explanation: The bus snooping mechanism uses a combination of cache tag status, write policies and bus monitoring to ensure coherency. MC88100 or MC88200 uses bus snooping mechanism.

11. What leads to the development of MESI and MEI protocol?

a) cache size

b) cache coherency

c) bus snooping

d) number of caches

Answer: b

Explanation: The problem of cache coherency lead to the formation of two standard mechanisms called MESI and MEI protocol. MC88100 have MESI protocol and MC68040 uses an MEI protocol.

12. Which of the following is also known as Illinois protocol?

a) MESI protocol

b) MEI protocol

c) Bus snooping

d) Modified exclusive invalid

Answer: a

Explanation: The MESI protocol is also known as Illinois protocol because of its formation at the University of Illinois.

13. What does MESI stand for?

a) modified exclusive stale invalid

b) modified exclusive shared invalid

c) modified exclusive system input

d) modifies embedded shared invalid

Answer: b

Explanation: The MESI protocol supports a shared state which is a formal mechanism for controlling the cache coherency by using the bus snooping techniques. MESI refers to the states that cached data can access. In MESI protocol, multiple processors can cache shared data.

14. What does MEI stand for?

a) modified embedded invalid

b) modified embedded input

c) modified exclusive invalid

d) modified exclusive input

Answer: c

Explanation: MEI protocol is less complex and is easy to implement. It does not allow shared state for the cache.

15. Which protocol does MPC601 use?

a) MESI protocol

b) MEI protocol

c) MOSI protocol

d) MESIF protocol

Answer: a

Explanation: MPC601 uses a MESI protocol, that is they have a shared state for data accessing in the cache. It can reduce the cache coherency but the cache coherency is processor specific. So different processors have different cache coherency implementations.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Burst Interfaces”.


1. Which of the following include special address generation and data latches?

a) burst interface

b) peripheral interface

c) dma

d) input-output interfacing

Answer: a

Explanation: The burst interfacing has special memory interfaces which include special address generation and data latches that help in the high performance of the processors. It takes the advantages of both the nibble mode memories and paging.

2. Which of the following makes use of the burst fill technique?

a) burst interfaces

b) dma

c) peripheral interfaces

d) input-output interfaces

Answer: a

Explanation: The burst interfaces use the burst fill technique in which the processor will access four words in succession, which fetches the complete cache line or written out to the memory.

3. How did burst interfaces access faster memory?

a) segmentation

b) dma

c) static column memory

d) memory

Answer: c

Explanation: The speed of the memory can be improved by the page mode or the static column memory which offer a faster access in a single cycle.

4. Which of the following memory access can reduce the clock cycles?

a) bus interfacing

b) burst interfacing

c) dma

d) dram

Answer: b

Explanation: The burst interfaces reduces the clock cycles. For fetching four words with a three clock memory, it will take 12 clock cycle but in the burst interface, it will only take five clocks to access the data.

5. How many clocks are required for the first access in the burst interface?

a) 1

b) 2

c) 3

d) 4

Answer: b

Explanation: In the burst interface, the first access of the memory address requires two clock cycles and a single cycle for the remaining memory address.

6. In which of the following access, the address is supplied?

a) the first access

b) the second access

c) third access

d) fourth access

Answer: a

Explanation: In the burst interface, the address is supplied only for the first access and not for the remaining accesses. An external logic is required for the additional addresses for the memory interface.

7. What type of timing is required for the burst interfaces?

a) synchronous

b) equal

c) unequal

d) symmetrical

Answer: c

Explanation: The burst interfacing uses an unequal timing. It takes two clocks for the first access and only one for the remaining accesses which make it an unequal timing.

8. How can gate delays be reduced?

a) synchronous memory

b) asynchronous memory

c) pseudo asynchronous memory

d) symmetrical memory

Answer: a

Explanation: The burst interfaced is associated with the SRAM and for the efficiency of the SRAM, it uses a synchronous memory on-chip latches to reduce the gate delays.

9. In which memory does the burst interfaces act as a part of the cache?

a) DRAM

b) ROM

c) SRAM

d) Flash memory

Answer: c

Explanation: The burst interface is associated with the static RAM.

10. Which of the following uses a wrap around burst interfacing?

a) MC68030

b) MC68040

c) HyperBus

d) US 5729504 A

Answer: b

Explanation: MC68040 is developed by the Motorola which uses a wrap around burst interfacing. MC68030 is also developed by Motorola but it uses a linear line fill burst. HyperBus can switch to both linear and wrap around burst. US 5729504 A uses a linear burst fill.

11. Which of the following is a Motorola’s protocol product?

a) MCM62940

b) Avalon

c) Slave interfaces

d) AXI slave interfaces

Answer: a

Explanation: MCM62940 protocol is developed by Motorola, whereas Slave interfaces, AXI slave interfaces are for ARM. Avalon is developed by Altera.

12. Which of the following uses a linear line fill interfacing?

a) MC68040

b) MC68030

c) US 74707 B2

d) Hyper Bus

Answer: b

Explanation: MC68030 uses a linear burst fill whereas MC68040, US 74707 B2 uses to wrap around burst interfacing. HyperBus can switch to both linear and wrap around interfacing.

13. Which of the following protocol matches the Intel 80486?

a) MCM62940

b) MCM62486

c) US 74707 B2

d) Hyper Bus

Answer: b

Explanation: The MCM62486 has an on-chip counter that matches the Intel 80486 and is developed by the Motorola.

14. Which of the following protocol matches the MC68040?

a) MCM62486

b) US 5729504 A

c) HyperBus

d) MCM62940

Answer: d

Explanation: The MCM62940 and MCM62486 are the specific protocols developed by Motorola, in which the MCM62940 has an on-chip counter which matches the wrap-around burst interfacing of the MC68040.

This set of Embedded Systems Problems focuses on “Segmentation and Paging”.


1. The modified bit is also known as

a) dead bit

b) neat bit

c) dirty bit

d) invalid bit

Answer:c

Explanation: The dirty bit is said to be set if the processor modifies its memory. This bit indicates that the associative set of blocks regarding the memory is modified and has not yet saved to the storage.

2. Which of the following have an 8 KB page?

a) DEC Alpha

b) ARM

c) VAX

d) PowerPC

Answer:a

Explanation: DEC Alpha divides its memory into 8KB pages whereas VAX is a small page which is only 512 bytes in size. PowerPC pages are normally 4 KB and ARM is having 4 KB and 64 KB pages.

3. Which of the following address is seen by the memory unit?

a) logical address

b) physical address

c) virtual address

d) memory address

Answer: b

Explanation: The logical address is the address generated by the CPU. It is also known as virtual address. The physical address is the address which is seen by the memory unit.

4. Which of the following modes offers segmentation in the memory?

a) virtual mode

b) real mode

c) protected mode

d) memory mode

Answer: c

Explanation: The main memory can split into small blocks by the method of paging and segmentation and these mechanisms are possible only in protected mode.

5. Which of the following is necessary for the address translation in the protected mode?

a) descriptor

b) paging

c) segmentation

d) memory

Answer: a

Explanation: The address translation from the logical address to physical address partitions the main memory into different blocks which is called segmentation. Each of these blocks have a descriptor which possesses a descriptor table. So the size of every block is very important for the descriptor.

6. What does “G” in the descriptor entry describe?

a) gain

b) granularity

c) gate voltage

d) global descriptor

Answer: b

Explanation: The granularity bit controls the resolution of the segmented memory. When it is set to logic one, the resolution is 4 KB. When the granularity bit is set to logic zero, the resolution is 1 byte.

7. How many types of tables are used by the processor in the protected mode?

a) 1

b) 2

c) 3

d) 4

Answer: b

Explanation: There are two types of descriptor table used by the processor in the protected mode which are GDT and LDT, that is global descriptor table and local descriptor table respectively.

8. What does the table indicator indicate when it is set to one?

a) GDT

b) LDT

c) remains unchanged

d) toggles with GTD and LTD

Answer: b

Explanation: The table indicator is a part of selector that selects which table is to be used. If the table indicator is set to logic one, the will use the local descriptor table and if the table indicator is set to logic zero, it will use the global descriptor table.

9. What does GDTR stand for?

a) global descriptor table register

b) granularity descriptor table register

c) gate register

d) global direct table register

Answer: a

Explanation: The global descriptor table register is a special register which have the linear address and the size of its own GDT. Both the global descriptor table register and local descriptor table register are located in the global descriptor table.

10. What does PMMU stands for?

a) protection mode memory management unit

b) paged memory management unit

c) physical memory management unit

d) paged multiple management unit

Answer: b

Explanation: The paged memory management unit is used to decrease the amount of storage needed in the page tables, that is, a multi-level tree structure is used. MC68030, PowerPC, ARM 920 uses a paged memory management unit.

11. Which of the following support virtual memory?

a) segmentation

b) descriptor

c) selector

d) paging

Answer: d

Explanation: The paging mechanism supports the virtual memory. Paging helps in creating virtual address space which has a major role in memory management.

12. What does DPL in the descriptor describes?

a) descriptor page level

b) descriptor privilege level

c) direct page level

d) direct page latch

Answer: b

Explanation: The descriptor privilege level is used to restrict access to the segment which helps in protection mechanism. It acquires two bit of the descriptor.

13. What does “S” bit describe in a descriptor?

a) descriptor type

b) small type

c) page type

d) segmented type

Answer: a

Explanation: The S bit determines whether it is a system segment or a normal segment. When the S bit is set, it might be a code segment or a data segment. If the S bit clears, it is a system segment.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Memory Protection Unit”.


1. How many regions are created by the memory range in the ARM architecture?

a) 4

b) 8

c) 16

d) 32

Answer: b

Explanation: The memory protection unit in the ARM architecture divides the memory into eight separate regions. Each region can be small as well as big ranging from 4 Kbytes to 4 Gbytes.

2. How many bits does the memory region in the ARM memory protection unit have?

a) 1

b) 2

c) 3

d) 4

Answer: c

Explanation: The memory region possesses three bits which are the cacheable bit, bufferable bit and access permission bit.

3. Which of the following uses a priority level for permitting data?

a) ARM memory management unit

b) ARM protection memory management unit

c) Bus interface unit

d) Execution unit

Answer: b

Explanation: In the ARM protection architecture, the memory is divided into some regions of size 4 Kbytes to 4 Gbytes. These regions possess bits called the cacheable bit, buffer bit, and access permitted bits. The regions are numbered as per priority level for which the permission bits takes the precedence if any of the regions gets overlapped.

4. What type of bit in the ARM memory mimics to that of the protection unit of ARM management unit?

a) permission bit

b) buffer bit

c) cacheable bit

d) access permission bit

Answer: a

Explanation: The ARM architecture memory protection unit divides the memory range into different regions of size ranging from 4 Kbytes to 4 Gbytes. Each region is associated with certain bits called the cacheable bit, buffer bit, and access permitted bit. These bits are similar to the permission bit in the ARM memory management unit architecture which is stored in the control register.

5. Which of the following bits are used to control the cache behaviour?

a) cacheable bit

b) buffer bit

c) cacheable bit and buffer bit

d) cacheable bit, buffer bit and permission access bit

Answer: c

Explanation: The cacheable bit and the buffer bit are used to control the behaviour of cache. Depending on the cacheable bit and the buffer bit, the memory access will complete successfully.

6. Which of the following unit provides security to the processor?

a) bus interface unit

b) execution unit

c) peripheral unit

d) memory protection unit

Answer: d

Explanation: The memory management unit and the memory protection unit provides security to the processor by trapping the invalid memory accesses before they corrupt other data.

7. Which of the following includes a tripped down memory management unit?

a) memory protection unit

b) memory real mode

c) memory management unit

d) bus interface unit

Answer: a

Explanation: The memory protection unit allows a tripped memory down memory management unit in which the memories are partitioned and protected without any address translation. This can remove the time consumption in the address translation thereby increases the speed.

8. Which of the following can reduce the chip size?

a) memory management unit

b) execution unit

c) memory protection unit

d) bus interface unit

Answer: c

Explanation: The memory protection unit have many advantages over the other units. It can reduce the chip size, cost and power consumption.

9. How does the memory management unit provide the protection?

a) disables the address translation

b) enables the address translation

c) wait for the address translation

d) remains unchanged

Answer: a

Explanation: The memory management unit can be used as a protection unit by disabling the address translation that is, the physical address and the logical address are the same.

10. Which of the following is used to start a supervisor level?

a) error signal

b) default signal

c) wait for the signal

d) interrupt signal

Answer: a

Explanation: If memory access from the software does not access the correct data, an error signal is generated which will start a supervisor level software for the decision.

11. What happens when a task attempts to access memory outside its own address space?

a) paging fault

b) segmentation fault

c) wait

d) remains unchanged

Answer: b

Explanation: Different tasks assign their own address space and whenever a task access memory outside its own address space, a segmentation fault result and which in turn results in the termination of the offending application.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Parallel Ports”.


1. Which of the following can transfer multiple bits of data simultaneously?

a) serial port

b) sequential port

c) concurrent unit

d) parallel port

Answer: d

Explanation: The parallel port can transfer multiple bits of data simultaneously. It provides the input or output binary data with a single bit allocated to each pin within the port.

2. Which of the following are interfaced as inputs to the parallel ports?

a) LEDs

b) switch

c) alphanumeric display

d) seven segmented display

Answer: b

Explanation: The LEDs, alphanumeric displays, seven segment displays are interfaced for the output whereas the switch is an input port.

3. Which of the following are interfaced as the outputs to the parallel ports?

a) keyboards

b) switches

c) LEDs

d) knobs

Answer: c

Explanation: The keyboards, switches, and knobs are used as output whereas the LEDs are used as the input port.

4. How many registers are there to control the parallel port in the basic form?

a) 1

b) 3

c) 2

d) 5

Answer: c

Explanation: The basic operation of the parallel port dealt with two types of registers which are called data direction register and the data register.

5. Which of the following is also known as tri-state?

a) output port

b) input port

c) parallel port

d) output-input port

Answer: a

Explanation: The progression in the parallel ports provides a third register or an individual control bit which can make the pin in a high impedance state. An output port which can do this is also known as tri-state, that is, logic high, logic low and a high impedance state.

6. How buffers are enabled in the parallel ports?

a) by the data register

b) by data direction register

c) by individual control register

d) by data and individual control register

Answer: b

Explanation: The implementation of parallel port uses a couple of buffers which are enabled by the data direction register by setting the corresponding bit of the register.

7. Which of the following registers offers high impedance?

a) data register

b) data direction register

c) individual control bit

d) data register and data direction register

Answer: c

Explanation: The register which offers high impedance is the individual control bit or the third register which can be implemented by switching off both the buffers and putting their connections to the pin which offers high impedance.

8. Which of the following can be used as a chip select?

a) multifunction I/O port

b) parallel port

c) DMA port

d) memory port

Answer: a

Explanation: The multifunction I/O port can also be used a chip select for the memory design. The function that the pin performs is set up internally through the use of a function register which internally configures how the external pins are connected internally.

9. Which of the following is necessary for the parallel input-output port?

a) inductor

b) pull-up resistor

c) push-up resistor

d) capacitor

Answer: b

Explanation: The I/O port needs an external pull-up resistor. In some devices, it offers internally. If it is not provided, it can cause incorrect data on reading the port and it prevents the port from turning off an external device.

10. Which of the following can be described as general-purpose?

a) multifunction I/O port

b) input port

c) dma port

d) output port

Answer: a

Explanation: The multifunction I/O ports can be described as the general-purpose and it can be shared with other peripherals.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Timer”.


1. Which of the following helps in the generation of waveforms?

a) timer

b) inputs

c) outputs

d) memory

Answer: a

Explanation: The embedded systems have a timing component called timer or counter which helps in the timing reference for control sequence, provides system tick for the operating system and also helps in the generation of waveforms for the serial port baud rate generation.

2. Which bit size determines the slowest frequency?

a) counter size

b) pre-scalar value

c) counter

d) timer

Answer: b

Explanation: The pre-scalar value determines the slowest frequency that can be generated from a given clock input. Actually the bit size are determined by the pre-scalar value and the conuter size.

3. Which bit size determines the maximum value of the counter-derived period?

a) counter size

b) pre-scalar value

c) bit size

d) byte size

Answer: a

Explanation: The bit size are basically determined by its fundamental properties, that is, the pre-scalar value and the counter size. The counter size determines the maximum value of the counter derived period.

4. Which of the following timer is suitable for IBM PC?

a) IA-32

b) Intel 8253

c) Intel 64

d) 8051 timer

Answer: b

Explanation: The Intel 8253 timer is suitable for the IBM PC. IA-32 and Intel 64 are the offload timers used only for Intel. The 8051 timer is used for the timing program in 8051.

5. Which of the following is mode 0 in 8253?

a) interrupt on start count

b) interrupt for wait statement

c) interrupt on terminal count

d) no interrupt

Answer: c

Explanation: The interrupt on the terminal count is known as mode 0 for the 8253. An initial value is loaded into the count register and then starts to count down at the frequency which is determined by the clock input. When the count reaches zero, an interrupt is generated.

6. Which determines the mode 1 in the Intel 8253?

a) interrupt on terminal count

b) programmable one-shot

c) rate generator

d) square wave rate generator

Answer: b

Explanation: Programmable one-shot is also known as mode 1 in the Intel 8253. In mode 1, a single pulse with a programmable duration is created first and then the pulse length is loaded into the counter and when the external gate signal is high, the rising edge starts the counter to count down to zero and the counter output signal goes high to start the external pulse. When the counter reaches to zero, the counter output goes low and thus the ending of the pulse.

7. Which mode of 8253 can provide pulse width modulation?

a) programmable one-shot

b) square wave rate generator

c) software triggered strobe

d) hardware triggered strobe

Answer: a

Explanation: Mode 1 of the Intel 8253 can provide pulse width modulation for the power control where the gate is connected to a zero crossing detector or a clock source.

8. Which of the following is the mode 3 in the Intel timer 8253?

a) rate generator

b) hardware triggered strobe

c) square wave rate generator

d) software triggered strobe

Answer: a

Explanation: The rate generator is the mode 3 in Intel 8253 timer. The square wave generator is the mode 4 and the hardware triggered strobe is the mode 5 in the Intel 8253 timer.

9. Which of the following determines the rate generation?

a) divide by N

b) multiply by N

c) addition by N

d) subtraction by N

Answer: a

Explanation: The rate generator mode is determined by the mode 3 with the Intel 8253. It is a simple divide by N mode where N is the initial value loaded into the counter.

10. Which mode of the Intel 8253 timer can generate a square wave?

a) mode 1

b) mode 2

c) mode 3

d) mode 4

Answer: d

Explanation: The mode 4 is the square wave generator. This mode is similar to mode 3 except that the waveform is a square wave.

This set of Embedded Systems Questions and Answers for Campus interviews focuses on “Timer-2”.


1. Which mode of the Intel timer 8253 provides a software watchdog timer?

a) rate generator

b) hardware triggered strobe

c) square wave rate generator

d) software triggered strobe

Answer: d

Explanation: The software triggered strobe can be used as a software-based watchdog timer in which the output is connected to a non maskable interrupt.

2. Which of the following mode is similar to the mode 4 of the 8253 timer?

a) mode 5

b) mode 6

c) mode 0

d) mode 1

Answer: a

Explanation: The mode 5 or the hardware triggered strobe is similar to the mode 4 or the square wave rate generator expect that the retriggering is done by the external gate pin.

3. Which pin of 8253 is used for the generation of an external interrupt signal?

a) OUT pin

b) IN pin

c) Interrupt pin

d) Ready pin

Answer: a

Explanation: The Intel 8253 timer has no interrupt pins. Therefore, the timer OUT pin is used to generate an external interrupt signal.

4. Which timer architecture can provide a higher resolution than Intel 8253?

a) Intel 8253

b) Intel 8254

c) 8051 timer

d) MC68230

Answer: d

Explanation: The Intel 8253 and 8254 have same pin configuration and functions. 8051 timer is a programmable timer in the 8051 microcontroller. The MC68230 timer developed by Motorola can provide a powerful timer architecture which can provide higher resolution than the Intel 8253.

5. How many bit architecture does MC68230 have?

a) 16

b) 24

c) 32

d) 40

Answer: b

Explanation: The MC68230 timer have a 24-bit architecture which is split into three 8-bit components because of the 8-bit bus in the MC68000 CPU.

6. How many bit bus does MC68230 have?

a) 2

b) 4

c) 8

d) 16

Answer: c

Explanation: The MC68230 timer have a 24-bit architecture which is split into three 8-bit components because of the 8-bit bus which is used for the communication with the host processor like MC68000 CPU which have an 8-bit architecture.

7. Which of the following is a timer processor?

a) Intel 8253

b) MC146818

c) MC68332

d) Intel 8259

Answer: c

Explanation: Intel 8253 and 8259 are timers or counters which supports the processors. MC146818 is a real-time clock. MC68332 which is developed by Motorola is a 32 bit timer processor which can support MC68020.

8. What is the running frequency of MC68332?

a) 12 MHz

b) 14 MHz

c) 16 MHz

d) 18 MHz

Answer: c

Explanation: The running frequency of the MC68332 is 16 MHz.

9. Which of the following is a real time clock?

a) MC146818

b) 8253

c) 8259

d) 8254

Answer: a

Explanation: The 8253, 8254 and 8259 are timers or counters developed by Intel whereas MC146818 is a real-time clock.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Serial Port and Serial Port Interface”.


1. Which of the following is the pin efficient method of communicating between other devices?

a) serial port

b) parallel port

c) peripheral port

d) memory port

Answer: a

Explanation: The serial ports are considered to be the pin efficient method of communication between other devices within an embedded system.

2. Which of the following depends the number of bits that are transferred?

a) wait statement

b) ready statement

c) time

d) counter

Answer: c

Explanation: The time taken for the data transmission within the system depends on the clock frequency and the number of bits that are transferred.

3. Which of the following is the most commonly used buffer in the serial porting?

a) LIFO

b) FIFO

c) FILO

d) LILO

Answer: b

Explanation: Most of the serial ports uses a FIFO buffer so that the data is not lost. The FIFO buffer is read to receive the data, that is, first in first out.

4. What does SPI stand for?

a) serial parallel interface

b) serial peripheral interface

c) sequential peripheral interface

d) sequential port interface

Answer: b

Explanation: The serial parallel interface bus is a commonly used interface which involves master slave mechanism. The shift registers are worked as master and the slave devices are driven by a common clock.

5. Which allows the full duplex synchronous communication between the master and the slave?

a) SPI

b) serial port

c) I2C

d) parallel port

Answer: a

Explanation: The serial peripheral interface allows the full duplex synchronous communication between the master and the slave devices. MC68HC05 developed by Motorola uses SPI for interfacing the peripheral devices.

6. Which of the following processor uses SPI for interfacing?

a) 8086

b) 8253

c) 8254

d) MC68HC11

Answer: d

Explanation: The MC68HC05 and MC68HC11 microcontrollers use the serial peripheral interface for the peripheral interfacing.

7. In which register does the data is written in the master device?

a) index register

b) accumulator

c) SPDR

d) status register

Answer: c

Explanation: The serial peripheral interface follows a master slave mechanism in which the data is written to the SPDR register in the master device and clocked out into the slave device SPDR by using a common clock signal called SCK.

8. What happens when 8 bits are transferred in the SPI?

a) wait statement

b) ready statement

c) interrupt

d) remains unchanged

Answer: c

Explanation: The interrupts are locally generated when 8-bits are transferred so that the data can be read before the next byte is clocked through.

9. Which signal is used to select the slave in the serial peripheral interfacing?

a) slave select

b) master select

c) interrupt

d) clock signal

Answer: a

Explanation: The slave select signal selects which slave is to receive data from the master.

10. How much time period is necessary for the slave to receive the interrupt and transfer the data?

a) 4 clock time period

b) 8 clock time period

c) 16 clock time period

d) 24 clock time period

Answer: b

Explanation: The SPI uses an eight clock time period for the slave to receive the interrupt and transfer the data which determines the maximum data rate.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “I2C-I”.


1. What does I2C stand for?

a) inter-IC

b) intra-IC

c) individual integrated chip

d) intel IC

Answer: a

Explanation: The I2C is known as inter-IC, which is developed by Philips for interfacing with the peripheral devices.

2. Which company developed I2C?

a) Intel

b) Motorola

c) Phillips

d) IBM

Answer: c

Explanation: The I2C is developed by Philips for use within the television sets.

3. Which of the following is the most known simple interface?

a) I2C

b) Serial port

c) Parallel port

d) SPI

Answer: a

Explanation: The I2C is the most known simple interface which is used currently. It can combine both the hardware and the software protocols to provide a bus interface which helps in the communication with many peripherals.

4. Which are the two lines used in the I2C?

a) SDA and SPDR

b) SPDR and SCL

c) SDA and SCL

d) SCL and status line

Answer: c

Explanation: The I2C bus consists of two lines which are called SDA and SCL. The master and slave devices are attached to these lines.

5. Which of the following developed P82B715?

a) Philips

b) Intel

c) IBM

d) Motorola

Answer: a

Explanation: The special buffer chip, P82B715 for increasing the current drive is developed by Philips.

6. Which pin provides the reference clock for the transfer of data?

a) SDA

b) SCL

c) SPDR

d) Interrupt pin

Answer: b

Explanation: The SCL pin can provide the reference clock for the transmission of data but it is not a free running clock.

7. Which of the following are the three hardware signals?

a) START, STOP, ACKNOWLEDGE

b) STOP, TERMINATE, END

c) START, SCL, SDA

d) STOP, SCL, SDA

Answer: a

Explanation: The three hardware signals are START, STOP and ACKNOWLEDGE. These signals help in the transmission of data between the slave and the masters.

8. Which of the following performs the START signal?

a) master

b) slave

c) CPU

d) memory

Answer: a

Explanation: The START signal is performed by the master by making the SCL and SDA pin high.

9. Which of the following are handshake signals?

a) START

b) STOP

c) ACKNOWLEDGE

d) START and STOP

Answer: c

Explanation: The START signal and ACKNOWLEDGE signals are almost similar but there exhibits a small change. The START signal is initiated by the master only but the ACKNOWLEDGE signal is a handshake between both the master and slave.

10. A packet is also referred to as

a) postcard

b) telegram

c) letter

d) data

Answer: b

Explanation: The data is transmitted in packets with a having one or more bytes. These packets of data are also known as a telegram.

11. Which of the following byte performs the slave selection?

a) first byte

b) second byte

c) terminal byte

d) eighth byte

Answer: a

Explanation: The slave selection is performed by using the first byte as an address byte. When the address byte is sent out all the slave devices compares the address by its own value. If there is a match, the ACKNOWLEDGE signal will be sent by the slave.

This set of Embedded Systems Questions and Answers for Experienced people focuses on “I2C-II”.


1. Which of the following indicates the type of operation that the master requests?

a) address value

b) initial value

c) terminal count

d) first byte

Answer: a

Explanation: The address value helps the master to select the device and indicates what operation should be taken. If the 8th bit is logic one, read operation takes out and if it is logic zero, write operation takes out.

2. How can both single byte and the double byte address slave use the same bus?

a) extended memory

b) extended address

c) peripheral count

d) slave bus

Answer: b

Explanation: For providing more addressing, an extended address is developed which possesses two bytes in which the first byte uses a special code to distinguish it from a single byte address so that the single byte and double byte address slaves can use a shared bus.

3. Which counter selects the next register in the I2C?

a) auto-incrementing counter

b) decrementing counter

c) auto-decrementing counter

d) terminal counter

Answer: a

Explanation: The peripheral having a small number of locations can use auto-incrementing counter for accessing the next register. But this will not be applicable in bigger memory devices.

4. Which is an efficient method for the EEPROM?

a) combined format

b) auto-incrementing counter

c) register set

d) single format

Answer: a

Explanation: Combined format is an efficient method for the EEPROM because it is having a large number of registers.

5. Which of the following uses two data transfers?

a) auto-incrementing counter

b) auto-decrementing counter

c) combined format

d) single format

Answer: c

Explanation: The EEPROM is having a large number of registers, so auto incrementing counter will not be applicable. So there is an alternative method which uses index value that is written to the chip, prior to accessing the data. This is called combined format and this combined format uses two data transfer. One is to write the data and the other is to read.

6. Which of the following is efficient for the small number of registers?

a) auto-incrementing counter

b) auto-decrementing counter

c) combined format

d) single format

Answer: a

Explanation: The peripherals which have a small number of locations can use auto-increment counter within the peripheral in which each access selects the next register.

7. Which can determine the timeout value?

a) polling

b) timer

c) combined format

d) watchdog timer

Answer: a

Explanation: The polling can be used along with the counter to determine the timeout value.

8. How is bus lockup avoided?

a) timer and polling

b) combined format

c) terminal counter

d) counter

Answer: a

Explanation: The timeout value can be changed by the peripheral devices, so for a sophisticated system a combination of polling and timer is used to check for the signal n times within a predefined interval. This can avoid the bus lock.

9. Which of the following can determine if two masters start to use the bus at the same time?

a) counter detect

b) collision detect

c) combined format

d) auto-incremental counter

Answer: b

Explanation: The collision detects technique helps to determine whether two or more masters are using the same bus in a multi-master device.

10. Which ports are used in the multi-master system to avoid errors?

a) unidirectional port

b) bidirectional port

c) multi directional port

d) tridirectional port

Answer: b

Explanation: By using the bidirectional ports, each master can monitor the line and confirm its expected state and if it is not matched, a mismatch or collision had occurred which will discontinue the transmission by the master.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “RS232”.


1. Which of the following can be used for long distance communication?

a) I2C

b) Parallel port

c) SPI

d) RS232

Answer: d

Explanation: A slightly different serial port called RS232 is used for long distance communication, otherwise the clock may get skewed. The low voltage signal also affects the long distance communication.

2. Which of the following can affect the long distance communication?

a) clock

b) resistor

c) inductor

d) capacitor

Answer: a

Explanation: For small distance communication, the clock signal which allows a synchronous transmission of data is more than enough, and the low voltage signal of TTL or CMOS is sufficient for the operation. But for long distance communication, the clock signal may get skewed and the low voltage can be affected by the cable capacitance. So for long distance communication RS232 can be used.

3. Which are the serial ports of the IBM PC?

a) COM1

b) COM4 and COM1

c) COM1 and COM2

d) COM3

Answer: c

Explanation: The IBM PC has one or two serial ports called the COM1 and the COM2, which are used for the data transmission between the PC and many other peripheral units like a printer, modem etc.

4. Which of the following can provide hardware handshaking?

a) RS232

b) Parallel port

c) Counter

d) Timer

Answer: a

Explanation: In RS232, several lines are used for transmitting and receiving data and these also provide control for the hardware handshaking.

5. Which of the following have an asynchronous data transmission?

a) SPI

b) RS232

c) Parallel port

d) I2C

Answer: b

Explanation: The data is transmitted asynchronously in RS232 which enhance long distance communication, whereas SPI, I2C offers short distance communication, and therefore, they are using synchronous data transmission.

6. How many areas does the serial interface have?

a) 1

b) 3

c) 2

d) 4

Answer: c

Explanation: The serial interface is divided into two, physical interface and the electrical interface.

7. The RS232 is also known as

a) UART

b) SPI

c) Physical interface

d) Electrical interface

Answer: d

Explanation: The RS232 is also known as the physical interface and it is also known as EIA232.

8. How much voltage does the MC1489 can take?

a) 12V

b) 5V

c) 3.3V

d) 2.2V

Answer: b

Explanation: The MC1489 is an interface chip which can take a 5V and generate internally the other voltages which are needed to meet the interface specification.

9. Which of the following is not a serial protocol?

a) SPI

b) I2C

c) Serial port

d) RS232

Answer: d

Explanation: The RS232 is a physical interface. It does not follow the serial protocol.

10. Which of the following is an ideal interface for LCD controllers?

a) SPI

b) parallel port

c) Serial port

d) M-Bus

Answer: d

Explanation: M-Bus or Motorola Bus is an ideal interface for LCD controllers, A/D converters, EEPROMs and many other components which can benefit faster transmission.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “UART”.


1. What does UART stand for?

a) universal asynchronous receiver transmitter

b) unique asynchronous receiver transmitter

c) universal address receiver transmitter

d) unique address receiver transmitter

Answer: a

Explanation: The UART or universal asynchronous receiver transmitter is used for the data transmission at a predefined speed or baud rate.

2. How is data detected in a UART?

a) counter

b) timer

c) clock

d) first bit

Answer: c

Explanation: The data can be detected by the local clock reference which is generated from the baud rate generator.

3. Which of the signal is set to one, if no data is transmitted?

a) READY

b) START

c) STOP

d) TXD

Answer: d

Explanation: The TXD signal goes to logic one when no data is transmitted. When data transmit, it sets to logic zero.

4. What rate can define the timing in the UART?

a) bit rate

b) baud rate

c) speed rate

d) voltage rate

Answer: b

Explanation: The timing is defined by the baud rate in which both the transmitter and receiver are used. The baud rate is supplied by the counter or an external timer called baud rate generator which generates a clock signal.

5. How is the baud rate supplied?

a) baud rate voltage

b) external timer

c) peripheral

d) internal timer

Answer: b

Explanation: The baud rate is supplied by the counter or an external timer called baud rate generator which generates a clock signal.

6. Which is the most commonly used UART?

a) 8253

b) 8254

c) 8259

d) 8250

Answer: d

Explanation: The Intel 8253, 8254 and 8259 are timers whereas Intel 8250 is a UART which is commonly used.

7. Which company developed 16450?

a) Philips

b) Intel

c) National semiconductor

d) IBM

Answer: c

Explanation: The Intel 8250 is replaced by the 16450 and 16550 which are developed by the National Semiconductors. 16450 is a chip which can combine all the PC’s input output devices into a single piece of silicon.

8. What does ADS indicate in 8250 UART?

a) address signal

b) address terminal signal

c) address strobe signal

d) address generating signal

Answer: c

Explanation: The ADS is address strobe signal and is working as active low in 8250 UART. The ADS signal is used to latch the address and chip select signals while processor access.

9. Which of the following signals are active low in the 8250 UART?

a) BAUDOUT

b) DDIS

c) INTR

d) MR

Answer: a

Explanation: The BAUDOUT signal is active low whereas DDIS, INTR and MR are active high in the 8250 UART. BAUDOUT is the clock signal from the transmitter part of the UART. DDIS signal goes low when the CPU is reading data from the UART. INTR is the interrupt pin. MR is the master reset pin.

10. Which of the signal can control bus arbitration logic in 8250?

a) MR

b) DDIS

c) INTR

d) RCLK

Answer: b

Explanation: DDIS signal goes low when the CPU is reading data from the UART and it also controls the bus arbitration logic.

This set of Embedded Systems Questions and Answers for Entrance exams focuses on “UART-2”.


1. Which of the following is used to reset the device in 8250?

a) MR

b) DDIS

c) INTR

d) RCLK

Answer: a

Explanation: MR is the master reset pin which helps to reset the device and restore the internal registers.

2. Which provides an input clock for the receiver part of the UART 8250?

a) RD

b) RCLK

c) MR

d) DDIS

Answer: b

Explanation: RCLK provides an input clock for the receiver part of the UART. RD is the read signal. MR is the master reset pin and DDIS is used to control bus arbitration logic.

3. Which of the following is a general purpose I/O pin?

a) OUT1

b) RD

c) ADS

d) MR

Answer: a

Explanation: There are two general purposes I/O pin OUT1 and OUT2. OUT1 is set by the programming bit 2 of the MCR to a ‘1’ whereas OUT2 is set by the programming bit 3 of the MCR to ‘1’. These are active low pins in 8250.

4. Which of the following indicate the type of access that the CPU needs to perform?

a) MR

b) RD

c) ADS

d) RCLK

Answer: b

Explanation: RD and WR signals are indicating the type of access that the CPU needs to perform, that is, whether it is a read cycle or write cycle.

5. Which pins are used for additional DMA control?

a) RXRDY

b) RD

c) MR

d) INR

Answer: a

Explanation: The RXRDY and TXRDY are two active low pins which are used for additional DMA control. It can be used for DMA transfers to and from the read and write buffers.

6. Which of the following are not used within the IBM PC?

a) TXRDY

b) BAUDOUT

c) ADS

d) OUT2

Answer: a

Explanation: The CPU is responsible for moving data to and from the UART in the IBM PC, therefore it does not have TXRDY and RXRDY pins which are used for DMA accessing.

7. Which pins are used to connect an external crystal?

a) INR

b) ADS

c) XIN

d) SIN

Answer: c

Explanation: The XIN and XOUT pins are used to connect an external crystal. These pins can also connect an external clock.

8. Which UART is used in MC680 by 0 design?

a) Intel 8250

b) 16450

c) 16550

d) MC68681

Answer: d

Explanation: The MC68681 is a standard UART developed by Motorola. It has been used in many MC680 by 0 designs.

9. Which of the following have large FIFO buffer?

a) 8253

b) 8250

c) 16550

d) 16450

Answer: c

Explanation: The largest buffer of 16 bytes is available on 16550 UART which is used for high speed data communications.

10. Which of the following has a quadruple buffered receiver and a double buffered transmitter?

a) Intel 8250

b) 16450

c) 16550

d) MC68681

Answer: d

Explanation: The MC68681 is a standard UART developed by Motorola. It possess a quadruple buffered receiver and a double buffered transmitter.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Asynchronous Flow Control”.


1. Which can prevent the terminal of data transmission?

a) flow control

b) increasing flow

c) increasing count

d) terminal count

Answer: a

Explanation: The flow control can prevent data transmission. It can also prevent the computer from sending more data than the other can cope with.

2. Which of the following is the first flow control method?

a) software handshaking

b) hardware handshaking

c) UART

d) SPI

Answer: b

Explanation: The first flow control method is the hardware handshaking in which the hardware in the UART detects the potential overrun and it will assert a handshake line to tell the other UART to stop the transmission.

3. Which one of the following is the second method for flow controlling?

a) hardware

b) peripheral

c) software

d) memory

Answer: c

Explanation: In the first method of flow control, there is a chance of data loss. So the second method of the flow control is adopted in which it uses software to send characters XON and XOFF. XOFF can stop the data transfer and XON can restart the data transfer.

4. Which can restart the data transmission?

a) XON

b) XOFF

c) XRST

d) restart button

Answer: a

Explanation: The second method of flow control is called software which is based on certain characters called XON and XOFF. XOFF can stop the data transfer and XON can restart the data transfer.

5. Which of the following is a common connector?

a) UART

b) SPI

c) I2C

d) DB-25

Answer: d

Explanation: There are two connectors which are used very commonly. They are DB-25 and DB-9 which has 25 pins and 9 pins respectively.

6. What does pin 22 in DB-25 indicate?

a) transmit data

b) receive data

c) ring indicator

d) signal ground

Answer: c

Explanation: The 22nd pin in DB-25 and the 9th pin in the DB-9 indicates a ring indicator which is asserted when a connected modem has detected an incoming call.

7. Which pin indicates the DSR in DB-25?

a) 1

b) 2

c) 4

d) 6

Answer: d

Explanation: The 6th pin in DB-25 indicates DSR, that is, data set ready which indicates that each side is powered on and is ready to access data.

8. Which of the following connections are one to one?

a) Modem cables

b) SPI

c) UART

d) I2C

Answer: a

Explanation: The modem cables are straight cables which allow one to one connections without crossover.

9. Which of the following are used to link PCs?

a) modem cable

b) null modem cable

c) serial port

d) parallel port

Answer: b

Explanation: The modem cables are used to link PC with other peripherals like printers, plotters, modems etc. But it cannot link with other PCs. So an alternative method is adopted to link PCs which is called null modem cable.

10. Which of the following method is used by Apple Macintosh?

a) hardware handshaking

b) software handshaking

c) no handshaking

d) null modem cable

Answer: b

Explanation: The Apple Macintosh and UNIX use software handshaking for the data transmission where the characters are sent to control the flow of characters between two systems.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “DMA”.


1. Which of the following provides an efficient method for transferring data from a peripheral to memory?

a) dma controller

b) serial port

c) parallel port

d) dual port

Answer: a

Explanation: The DMA controllers or direct memory access controller provides an efficient method for transferring data from the peripheral to the memory.

2. Which of the following can be adopted for the systems which does not contain DMA controller for data transmission?

a) counter

b) timer

c) polling

d) memory

Answer: c

Explanation: The polling and interrupt helps for data transmission for the systems which do not have DMA controller.

3. Which of the following have low-level buffer filling?

a) output

b) peripheral

c) dma controller

d) input

Answer: c

Explanation: The DMA controller can initiate and control the bus access between I/O devices and memory, and also between two different memory areas. Therefore, the DMA controller can act as a hardware implementation of low-level buffer filling or emptying the interrupt.

4. How many classifications of DMA controllers are made based on the addressing capability?

a) 2

b) 3

c) 4

d) 5

Answer: b

Explanation: There are three classifications for the DMA controllers based on the address capability. These are 1D, 2D and 3D.

5. How many address register are there for the 1D type DMA controller?

a) 1

b) 2

c) 3

d) 4

Answer: a

Explanation: The 1D controller only have a single address register whereas 2D controller have two address register and 3D controller have three or more address register.

6. Which of the following of a generic DMA controller contain a base address register and an auto-incrementing counter?

a) address bus

b) data bus

c) bus requester

d) address generator

Answer: d

Explanation: The generic controller have several components associated with it for controlling the operation and one such is the address generator. It consists of the base address register and an auto-incrementing counter which increment the address after every transfer.

7. Which of the following is used to transfer the data from the DMA controller to the destination?

a) data bus

b) address bus

c) request bus

d) interrupt signal

Answer: a

Explanation: The data bus is used for the transmission of data from the DMA controller to the destinal. The DMA controller can directly select the peripheral in some cases in which the data transfer is made from the peripheral to the memory.

8. Which of the following is used to request the bus from the main CPU?

a) data bus

b) address bus

c) bus requester

d) interrupt signal

Answer: c

Explanation: The bus requester requests the bus from the main CPU. In earlier design, the processor bus does not support the multi master system and there were no bus request signals. In such cases, the processor clock was extended.

9. Which signal can identify the error?

a) data bus

b) address bus

c) bus requester

d) interrupt signal

Answer: d

Explanation: The interrupt signal can identify the error occurred in the DMA controller. This makes the processor to reprogram the DMA controller for a different transfer.

10. Which signal allows the DMA controller to select the peripheral?

a) local peripheral control

b) global peripheral control

c) address bus

d) data bus

Answer: a

Explanation: The local peripheral control allows the DMA controller to select the peripheral.

This set of Embedded Systems Interview Questions and Answers for Experienced people focuses on ” DMA-II”.


1. Which of the following is also known as implicit address?

a) dual address model

b) single address model

c) 1D model

d) 2D model

Answer: b

Explanation: The single address model is also known as implicit model because the second address is implied and is not directly given, that is, the source address is not supplied.

2. Which address mode uses two addresses and two accesses to transfer the data between the peripheral and the memory?

a) dual address model

b) 1D model

c) 2D model

d) 3D model

Answer: a

Explanation: The dual address mode supports two addresses and two accesses for transferring data between a peripheral or memory and another memory location.

3. Which of the following address mode uses a buffer to hold data temporarily?

a) 1D model

b) 2D model

c) dual address model

d) 3D model

Answer: c

Explanation: The dual address mode supports two addresses and two accesses for transferring data between a peripheral or memory and another memory location, which also consumes two bus cycles and a buffer within the DMA controller to hold data temporarily.

4. Which of the following model can implement a circular buffer?

a) dual address mode

b) 1D model

c) 2D model

d) 3D model

Answer: b

Explanation: The 1D model can implement a circular buffer which makes an automatic reset to bring the address back to the beginning.

5. Which of the following uses an address and a counter to define the sequence of addresses?

a) dual address mode

b) 2D model

c) 1D model

d) 3D model

Answer: c

Explanation: The 1D model of the DMA controller uses an address location and a counter to define the address sequence which is used during the DMA cycles.

6. Which of the following is used to calculate an offset to base address?

a) single address mode

b) dual address mode

c) 1D model

d) 2D model

Answer: d

Explanation: An address stride is specified which can be used for calculating the offset to the base address at the terminal of count. This address stride is used in the 2D model of the DMA controller.

7. Which can provide an address stride?

a) single address mode

b) dual address mode

c) 1D model

d) 2D model

Answer: d

Explanation: In the 2D model of the DMA controller, an address stride is specified which can be used for calculating the offset to the base address at the terminal of count.

8. How is the count register can be splitted?

a) 2

b) 3

c) 4

d) 5

Answer: a

Explanation: In the 2D model of the DMA controller, in addition to the address stride there is a count register which can be split into two, in which one register is used to specify the count for the block and the second register is used to define the total number of blocks or the bytes to be transferred.

9. Which of the following has the ability to change the stride automatically?

a) 1D model

b) 2D model

c) 3D model

d) dual address mode

Answer: c

Explanation: In the 3D model of the DMA controller, it have the ability to change the address stride automatically so that blocks of different sizes and stride can be created.

10. Which is used to prioritise multiple requests?

a) dual address mode

b) single address mode

c) arbitration

d) chaining

Answer: c

Explanation: The arbitration is used to provide priority for multiple access. This uses a priority scheme which may offer fair priority to the one channel, or a high priority to the other channel and so on. Such condition is otherwise known as round-robin condition in which the priority is equally divided.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Implementation of DMA”.


1. Which of the following DMA is used in the IBM PC?

a) Intel 8253

b) Intel 8254

c) Intel 8237

d) Intel 8259

Answer: c

Explanation: The Intel 8237 is the DMA used in the IBM PC. 8253, 8254 and 8259 are timers developed by Intel.

2. Which of the following have four transfer modes?

a) Intel 8253

b) Intel 8254

c) Intel 8259

d) Intel 8237

Answer: d

Explanation: The Intel 8237 have four transfer modes. These are single mode, block transfer mode, demand mode and cascade mode.

3. Identify the additional transfer mode in the Intel 8237?

a) single transfer mode

b) demand transfer mode

c) verify transfer mode

d) block transfer mode

Answer: c

Explanation: In addition to the four main transfer mode, there is a verify transfer mode which is used within the PC to create dummy addresses which are used for refreshing the DRAM.

4. Which of the following transfer mode can refresh the DRAM memory?

a) verify transfer mode

b) bloch transfer mode

c) demand transfer mode

d) cascade mode

Answer: a

Explanation: The verify address transfer mode can generate dummy addresses which are used for the DRAM refreshing.

5. Which of the following is used for supporting the priority scheme?

a) address transfer mode

b) arbitration

c) counter

d) timer

Answer: b

Explanation: The arbitration is used for providing priority to the DMA requests. The DMA request is simultaneously generating, so in order to avoid the errors, a priority scheme is necessary which is done by the arbitration scheme in the DMA controller.

6. Which of the following consist of a fully programmable DMA controller of two channels?

a) MC68300

b) Intel 8237

c) Intel 8253

d) Intel 8254

Answer: a

Explanation: The MC68300 is developed by Motorola, which consists of a two channel fully programmable DMA controller which can support high speed data transfer.

7. Which cycle can support the burst and single transfer mode?

a) internal

b) external

c) both internal and external

d) address cycle

Answer: b

Explanation: The internal cycles can be programmed to occupy the partial or complete fulfillment of the available internal bus bandwidth while the external cycles provides support to the single transfer modes and burst mode.

8. Which of the following requires its own local memory and program?

a) DMA controller

b) DMA address

c) DMA CPU

d) DMA peripheral

Answer: c

Explanation: The DMA CPU has its own address local memory and program so that it will not harm main memory bus and it is completely isolated.

9. Which DMA is programmed with higher level software?

a) DMA controller

b) DMA address

c) DMA peripheral

d) DMA CPU

Answer: d

Explanation: The DMA CPU is programmed with higher level software which is used to transfer the data and for processing it.

10. Which of the following combine an MC68000/MC68020 type of processor with peripheral and DMA controllers?

a) Intel 8237

b) Intel 8253

c) MC68300

d) MC68000

Answer: c

Explanation: The MC68300 combines the processors along with the DMA controllers. The processors which support the MC68300 series are MC68000 or MC68020.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Errors of ADC technique”.


1. Which signal is sampled at regular intervals for the purpose of ADC?

a) analog signal

b) digital signal

c) quantised signal

d) sampled signal

Answer: a

Explanation: The analog signal is sampled at regular intervals for the analog to digital conversion. Each sample is then quantised to divided by a given value in order to identify the number of approximate analogue value.

2. Which factor depends on the quantisation error?

a) number of error

b) number of bits

c) size of error

d) conversion process

Answer: b

Explanation: The quantisation error depends on the number of bits which is used to represent the analogue vale.

3. Which is the first type of error caused during the conversion process?

a) sampling error

b) interrupt signal

c) counter error

d) quantisation error

Answer: d

Explanation: The quantisation error is the first type of error caused in the conversion process. This error is caused because the samples are converted to a slightly higher value instead of zero.

4. Which of the following defines the number of samples that are taken in the time period?

a) sample size

b) sample nature

c) sample rate

d) sample frequency

Answer: c

Explanation: The sample rate is defined by the number of samples that are taken in a time period. The sample rate is usually measured in Hertz. It can determine the speed of the conversion device itself.

5. Which of the following can determine the speed of conversion device itself?

a) sample rate

b) sampled data

c) sample size

d) sample nature

Answer: a

Explanation: The sample rate determines the various aspect of the conversion process and one such is the conversion speed.

6. Which of the following can determine the maximum frequency that can be converted?

a) sample frequency

b) sample rate

c) sample size

d) sample nature

Answer: b

Explanation: The sample rate can determine the maximum frequency that can be converted as per the Nyquist theorem. The theorem states that the minimum sampling rate frequency should be twice the maximum frequency of the analog signal.

7. Which term determines the random timing error?

a) jitter

b) quantisation error

c) sample error

d) delay

Answer: a

Explanation: Jitter is a random timing error. Jitter can cause irregular sampling errors.

8. Which of the following introduce a phase error?

a) conversion time

b) sampling rate

c) sample size

d) sample nature

Answer: a

Explanation: The conversion time always introduces a phase error. The conversion time will delay the digital output and hence introduce a phase error.

9. Which of the following can generate an interrupt?

a) timer

b) trigger

c) delay

d) counter

Answer: a

Explanation: The timer can generate an interrupt to the processor at the rate of sampling frequency.

10. Which filter is used for filtering out the high frequency components?

a) bandpass filter

b) band reject filter

c) analogue filter

d) digital filter

Answer: c

Explanation: The higher frequency components can be filtered out by using an analog filter after sampling.

11. Which theorem describes the sampling rate with the frequency of the analogue signal?

a) Nyquist theorem

b) Bayes theorem

c) Sampling theorem

d) Parseval’s theorem

Answer: a

Explanation: The Nyquist theorem states that the minimum sampling rate frequency should be twice the maximum frequency of the analog signal.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Codecs”.


1. From which of the following words does codecs is derived?

a) coder

b) decoder

c) coder-decoder

d) coder-encoder

Answer: c

Explanation: The codec is derived coder-decoder and is coupled to perform the coding. It can support both analogue to digital conversion and digital to analogue conversion.

2. Which codec is used in digital audio?

a) A-law

b) µ-law

c) linear

d) PCM

Answer: c

Explanation: In the linear codec, the relationship between the analogue and digital values are linear. This method is commonly used in digital audio communication.

3. Which of the following have the same quantisation step throughout the range?

a) linear

b) PCM

c) DPCM

d) ADPCM

Answer: a

Explanation: The quantisation step is same throughout the dynamic range in the linear codec and thus any increase in the analogue value increases the digital value, that is, the overall performance is linear.

4. Which is used in the telecommunication applications which has a limited bandwidth of 300 to 3100 HZ?

a) linear codec

b) logarithmic codec

c) PCM

d) DPCM

Answer: b

Explanation: The logarithmic codec is frequently used in the telecommunication system which have a limited bandwidth of 300 to 3100 Hz. this can provide an 8-bit sample at 8 KHz, which are used in the telephones. The commonly used are A-law and µ-law.

5. Which codec is used in the UK?

a) a-law

b) µ-law

c) linear codec

d) PCM

Answer: a

Explanation: The a-law is a logarithmic codec which is commonly used in the UK whereas µ-law is used in the US.

6. What does PCM stand for?

a) pulse codec machine

b) pulse code modulation

c) peripheral code machine

d) peculiar code modulation

Answer: b

Explanation: The linear codec is also known as pulse code modulation which is commonly used in the telecommunications industry.

7. Which of the following conversion is performed by using a lookup table?

a) DPCM

b) ADPCM

c) Between DPCM and ADPCM

d) Linear cdec and a-law

Answer: d

Explanation: The conversion between a-law/µ-law and a linear digital signal or between µ-law and a-law is performed by a lookup table.

8. What does DPCM stand for?

a) differential pulse code modulation

b) data pulse code modulation

c) dynamic pulse code machine

d) dynamic pulse code modulation

Answer: a

Explanation: The differential pulse code modulation is similar to pulse code modulation, but DPCM uses an encoded value which is the difference between the current and the previous sample.

9. Which of the following have a 16-bit digital dynamic range?

a) PCM

b) DPCM

c) linear codec

d) logarithmic codec

Answer: b

Explanation: The differential pulse code modulation can improve the accuracy and resolution by having a 16-bit dynamic range. It works by the increasing dynamic range.

10. How many types of logarithmic codecs are used commonly?

a) 2

b) 3

c) 4

d) 5

Answer: a

Explanation: There are two types of logarithmic codec which are commonly used. They are a-law which is used in UK and µ-law codec which is used in the US.

11. What does ADPCM stand for?

a) address differential pulse code modulation

b) adaptive differential pulse code modulation

c) address dynamic pulse code machine

d) adaptive dynamic pulse code modulation

Answer: b

Explanation: The adaptive differential pulse code modulation is used in telecommunications and is based on non-linear quantisation values.

12. Which of the following uses a non-linear quantisation value?

a) PCM

b) DPCM

c) ADPCM

d) linear codec

Answer: c

Explanation: The adaptive differential pulse code modulation is based on non-linear quantisation values. In the ADPCM, instead of using all bit for encoding, only a few bits are used for encoding which makes it non linear.

13. Which of the following works by increasing the dynamic range?

a) logarithmic codec

b) linear codec

c) DPCM

d) PCM

Answer: c

Explanation: The differential pulse code modulation can improve the accuracy and resolution by having a 16-bit dynamic range. It works by the increasing dynamic range.

14. Which device can make the PWM operation easier?

a) timer

b) software

c) hardware

d) transistor

Answer: a

Explanation: The timer can be used for making up the PWM waveform far more easier and faster and it will free the processor to do other things without affecting the timing.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Power Controls”


1. Which of the following can be used for providing high gain?

a) transistor

b) darlington transistor pair

c) resistor

d) capacitor

Answer: b

Explanation: The darlington pair of transistors can provide high gain than a single transistor. This is one of the method used to avoid voltage mismatches that the system produces. By using high gain transistors the voltage mismatches can be reduced upto a limit.

2. Which devices have high drive capability?

a) transistor

b) fet

c) buffer pack

d) darlington amplifier

Answer: c

Explanation: The buffer pack is used to avoid the voltage mismatches which possesses a high drive capacity and it can also provide high drive currents than the normal logic outputs.

3. Which of the following is used to switch heavy loads?

a) fet

b) transistor

c) buffer pack

d) darlington pair

Answer: a

Explanation: The field effect transistor can be used to provide a very high effective gain and hence they can be used to switch heavy loads easily from a logic device. These are also voltage controlled transistors.

4. Which allows the switching of DC motor by using two outputs and four FETs?

a) transistor

b) H bridge

c) darlington pair

d) buffer pack

Answer: b

Explanation: The H bridge can be created by using several switches which allows a DC motor to be switched on and reversed in the direction. The switching can be done by using two outputs and four FETs.

5. Which of the following is used to create H bridge?

a) switches

b) led

c) capacitor

d) inductor

Answer: a

Explanation: The H bridge can be created by using several switches. This allows a DC motor to be switched on and reversed in the direction and the switching of DC motor can be done by using two outputs and four FETs.

6. Which of the following allows voltage reversing?

a) H bridge

b) Relays

c) LEDs

d) LCDs

Answer: a

Explanation: The H bridge is used in controlling DC motors or any other loads which need voltage reversing.

7. Which devices are used as indicators in a digital system?

a) LCD

b) LED

c) Varactor diode

d) Gunn diode

Answer: b

Explanation: The light emitting diodes are used as indicators in the digital system and can be directly driven from a logic output.

8. How is the biasing done in LEDs?

a) forward bias

b) no bias

c) supply voltage

d) reverse bias

Answer: d

Explanation: The LEDs will light up only when the diode reverse breakdown is achieved. It is usually about 2 to 2.2V.

9. Which of the following determines the brightness of LEDs?

a) current

b) voltage

c) resistance

d) conductance

Answer: a

Explanation: The current drive determines the brightness of the LEDs and it is usually associated with a current limiting resistor in series with the LED to prevent the overheating.

10. Which of the following is a current limiting device?

a) voltage

b) current

c) buffer

d) inductor

Answer: c

Explanation: A buffer can be used as a current limiting device. Similarly, a transistor can also be used as a current limiting device.

11. Which of the following can switch the current by a make or break contact?

a) transistor

b) relay

c) buffer

d) fet

Answer: b

Explanation: The relays are a kind of switching power in which the logic signal is used to energise the relay. The relay contacts are break or make accordingly and helps in switching the current.

12. Which of the following generates a back EMF?

a) relay

b) buffer

c) transistor

d) FET

Answer: a

Explanation: The relay generates a back voltage across its terminals when the logic output switches from a high to low state.

13. Which of the following is used to avoid the back EMF in the relay?

a) resistor

b) capacitor

c) inductor

d) diode

Answer:d

Explanation: In order to get rid of the back EMF which is generated by the relay a diode is connected across the terminals which operate in the reverse bias so that nothing can harm the relay.

14. Which of the following can provide a speed control technique in the DC motor interfacing?

a) PCM

b) DPCM

c) ADPCM

d) PWM

Answer: d

Explanation: The pulse width modulation can provide a speed control technique in the DC motor interfacing by changing its mark/space ratio.

Answer: b

Explanation: In the software system, certain loops perform the timing functions. A program is created to switch the motor on and it will start counting through a delay loop. When the count is finished, the motor is switched off. In the second delay loop, it can determine the motor-off period.

Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Introduction of Interrupts”.


1. The time taken to respond to an interrupt is known as

a) interrupt delay

b) interrupt time

c) interrupt latency

d) interrupt function

Answer: c

Explanation: The interrupts are the most important function of the embedded system and are responsible for many problems while debugging the system. The time taken to respond to an interrupt is called the interrupt latency.

2. Into how many parts does the interrupt can split the software?

a) 2

b) 3

c) 4

d) 5

Answer: a

Explanation: The software interrupt can split into two parts. These are foreground work and background work.

3. Which of the following allows the splitting of the software?

a) wait statement

b) ready

c) interrupt

d) acknowledgement

Answer: c

Explanation: The interrupt can make the software into two main parts and these are foreground work and background work.

4. Which part of the software is transparent to the interrupt mechanism?

a) background

b) foreground

c) both background and foreground

d) lateral ground

Answer: a

Explanation: The interrupt mechanism is transparent to the background software, that is, the background software is not aware of the existence of the foreground software.

5. Which part of the software performs tasks in response to the interrupts?

a) background

b) foreground

c) lateral ground

d) both foreground and background

Answer: b

Explanation: In the foreground work, the tasks are performed in response to the interrupts but in the background work, the tasks are performed while waiting for an interrupt.

6. In which of the following method does the code is written in a straight sequence?

a) method 1

b) timing method

c) sequence method

d) spaghetti method

Answer: d

Explanation: In the spaghetti method, the code is written in a straight sequence in which the analysis software goes and polls the port to see if there is data.

7. Which factor depends on the number of times of polling the port while executing the task?

a) data

b) data transfer rate

c) data size

d) number of bits

Answer: b

Explanation: The data transfer rate can determine the number of times the port is polled while executing the task.

8. Which of the following can improve the quality and the structure of a code?

a) polling

b) subroutine

c) sequential code

d) concurrent code

Answer: b

Explanation: The subroutine can improve the quality and the structure of the code. By using the polling method, as the complexity increases the software structure rapidly fall and it will become inefficient. So the subroutine method is adopted.

9. Which of the following are asynchronous to the operation?

a) interrupts

b) software

c) DMA

d) memory

Answer: a

Explanation: The interrupts are asynchronous to the operation and therefore can be used with systems that are the event as opposed to the time driven.

10. Which of the following can be used to create time-driven systems?

a) memory

b) input

c) output

d) interrupts

Answer: d

Explanation: The interrupts which are asynchronous can be used with systems that are the event as opposed to the time driven.

11. What does ISR stand for?

a) interrupt standard routine

b) interrupt service routine

c) interrupt software routine

d) interrupt synchronous routine

Answer: b

Explanation: The data transfer codes are written as part of the interrupt service routine which is associated with the interrupt generation by the hardware.

12. Which can activate the ISR?

a) interrupt

b) function

c) procedure

d) structure

Answer: a

Explanation: When the port receives the data, it will generate an interrupt which in turn activates the ISR.

13. Which code is written as part of the ISR?

a) data receive code

b) sequential code

c) data transfer code

d) concurrent code

Answer: c

Explanation: The data transfer codes are written as part of the interrupt service routine which is associated with the interrupt generation by the hardware.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Sources of Interrupts”.


1. Which interrupts are generated by the on-chip peripherals?

a) internal

b) external

c) software

d) hardware

Answer: a

Explanation: The internal interrupts are generated by the serial and parallel ports which are on-chip peripherals.

2. Which of the following is the common method for connecting the peripheral to the processor?

a) internal interrupts

b) external interrupts

c) software

d) exception

Answer: b

Explanation: The common method for connecting the peripheral to the processor is the external interrupts. The external interrupts are provided through the external pins which are connected to the peripherals.

3. Which interrupt can make a change in the processor’s mode?

a) internal interrupt

b) external interrupts

c) exceptions

d) software mode

Answer: c

Explanation: An exception is an event which changes the software flow to process the event. It includes both internal and external interrupts which cause the processor to change to a service routine.

4. How many exceptions does an MC68000 have?

a) 256

b) 128

c) 90

d) 70

Answer: c

Explanation: The MC68000 have 256 table entries which describe 90 exceptions.

5. Which interrupts allows a protected state?

a) internal interrupt

b) external interrupt

c) software interrupt

d) both internal and external interrupts

Answer: c

Explanation: The software interrupt can change the processor into a protected state by changing the program flow.

6. How a software interrupt is created?

a) instruction set

b) sequential code

c) concurrent code

d) porting

Answer: a

Explanation: The software interrupts includes a set of instructions for handling interrupts. The instruction set allows a currently executing program to change its flow.

7. What does SWI stand for?

a) standard interrupt instruction

b) sequential interrupt instruction

c) software interrupt instruction

d) system interrupt instruction

Answer: c

Explanation: The instruction set of software interrupts are provided by the special instruction set. One such is the SWI which is commonly used in Z80.

8. Which of the following use SWI as interrupt mechanism?

a) PowerPC

b) MC68000

c) Z80

d) IBM PC

Answer: c

Explanation: The PowerPC and MC68000 use TRAP instruction set for accessing software interrupt. IBM PC uses 8086 NMI. Z80 uses SWI for accessing software interrupts.

9. Which of the following supplies additional data to the software interrupt?

a) internal interrupt

b) external interrupt

c) software interrupt

d) nmi

Answer: c

Explanation: For using the software interrupt more effectively, the additional data are used, which specifies the type of the request and data parameters are passed to the specific ISR. This additional data are offered by certain registers.

10. Which software interrupt is used in MC68000?

a) Internal interrupt

b) TRAP

c) SWI

d) NMI

Answer: b

Explanation: The MC68000 uses a software interrupt mechanism for accessing interrupts from the peripheral in which the instruction are created using the TRAP mechanism.

11. Which of the following are accessible by the ISR in software interrupt mechanism?

a) register

b) interrupt

c) nmi

d) memory

Answer: a

Explanation: The additional data are offered by certain registers and these additional data are used to specify the type of the data parameter and the request with the specific ISR when running in the software interrupt mode.

12. What allows the data protection in the software interrupt mechanism?

a) Different mode

b) Same mode

c) SWI

d) TRAP

Answer: a

Explanation: The switching between user mode and supervisor mode provides protection for the processor, that is, the different modes in the software interrupt allows the memory and the associated code and data to be protected from each other.

13. What does NMI stand for?

a) non-machine interrupt

b) non-maskable interrupt

c) non-massive interrupt

d) non-memory interrupt

Answer: b

Explanation: The NMI stand for the non-maskable interrupt in which the external interrupts cannot be masked out.

14. Which NMI is used in the IBM PC?

a) SWI

b) TRAP

c) 80×86 NMI

d) Maskable interrupt

Answer: c

Explanation: The most commonly used non-maskable interrupt is the 80×86 NMI, which is implemented in the IBM PC.

Answer: a

Explanation: In order to use the software interrupt more effectively, the additional data are used to specify the type of the request and data parameters are passed to the specific ISR. This additional data are offered by certain registers. These registers are accessible by the ISR and it can also be used to pass the status information back to the calling software.

Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “The Mechanism of Interrupts”.


1. Which of the following uses clock edge to generate an interrupt?

a) edge triggered

b) level-triggered

c) software interrupt

d) nmi

Answer: a

Explanation: In the edge-triggered interrupt, the clock edge is used to generate an interrupt. The transition is from a logical low to high or vice versa.

2. In which interrupt, the trigger is dependent on the logic level?

a) edge triggered

b) level-triggered

c) software interrupt

d) nmi

Answer: b

Explanation: In the level-triggered interrupt, the trigger is completely dependent on the logic level. The processors may require the level to be in a certain clock width so that the shorter pulses which are shorter than the minimum pulse width are ignored.

3. At which point the processor will start to internally process the interrupt?

a) interrupt pointer

b) instruction pointer

c) instruction boundary

d) interrupt boundary

Answer: c

Explanation: After the recognition of the interrupt, and finds that it is not an error condition with the currently executing interrupt, then the interrupt will not be internally executed until the current execution has completed. This point is known as the instruction boundary. At this point, the processor will start to internally process the interrupt.

4. What does 80×86 use to hold essential data?

a) stack frame

b) register

c) internal register

d) flag register

Answer: a

Explanation: The MC68000 and 80×86 family use stack frame for holding the data whereas RISC processors use special internal registers.

5. What does the RISC processor use to hold the data?

a) flag register

b) accumulator

c) internal register

d) stack register

Answer: c

Explanation: The RISC processors uses special internal registers to hold data whereas the 80×86 and MC68000 family uses stack register to hold the data.

6. Which of the following is a stack-based processor?

a) MC68000

b) PowerPC

c) ARM

d) DEC Alpha

Answer: a

Explanation: The MC68000, Intel 80×86 and most of the b-bit controllers are based on the stack-based processors whereas PowerPC, DEC alpha, and ARM are RISC families which have a special internal register for holding the data.

7. Which of the following is used to reduce the external memory cycle?

a) internal hardware stack

b) internal software stack

c) external software stack

d) internal register

Answer: a

Explanation: Some of the processors use internal hardware stack which helps in reducing the external memory cycle necessary to store the stack frame.

8. How many interrupt levels are supported in the MC68000?

a) 2

b) 3

c) 4

d) 7

Answer: d

Explanation: The MC68000 has an external stack for holding the data. The MC68000 family supports a seven interrupt level which are encoded into three interrupt pins.

9. How many interrupt pins are used in MC68000?

a) 2

b) 3

c) 4

d) 5

Answer: b

Explanation: The MC68000 family supports a seven interrupt level which are encoded into three interrupt pins. These interrupt pins are IP0, IP1, and IP2.

10. Which priority encoder is used in MC68000?

a) 4-to-2 priority encoder

b) LS148 7-to-3

c) 2-to-4 priority encoder

d) LS148 3-to-7

Answer: b

Explanation: The LS148 7-to-3 priority encoder is used in MC68000. This converts the seven external pins into a three-bit binary code.

11. Which of the following converts the seven external pins into a 3-bit binary code?

a) priority encoder

b) 4-to-2 priority encoder

c) LS148 7-to-3

d) 2-to-4 priority encoder

Answer: c

Explanation: The LS148 7-to-3 priority encoder can convert the seven external pins into a three-bit binary code.

12. Which of the following ensures the recognition of the interrupt?

a) interrupt ready

b) interrupt acknowledge

c) interrupt terminal

d) interrupt start

Answer: b

Explanation: The interrupt level remains asserted until its interrupt acknowledgment cycle ensures the recognition of the interrupt.

Answer: a

Explanation: The internal interrupt mask is raised to the interrupt level, in order to prevent the multiple interrupt acknowledgments.

Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “RISC Exceptions”.


1. What does MSR stand for?

a) machine state register

b) machine software register

c) minimum state register

d) maximum state register

Answer: a

Explanation: The MSR is a machine state register. When the exception is recognised, the address of the instruction and the MSR are stored in the supervisor registers while handling an exception.

2. How many supervisor registers are associated with the exception mode?

a) 2

b) 3

c) 4

d) 5

Answer: a

Explanation: When the exception is recognised, the address of the instruction and the machine state register are stored in the supervisor registers in the exception mode. There are two supervisor registers SRR0 and SRR1.

3. What happens when an exception is completed?

a) TRAP instruction executes

b) SWI instruction executes

c) RFI instruction executes

d) terminal count increases

Answer: c

Explanation: When an exception is recognised, the address of the instruction and the MSR are stored in the supervisor registers and the processor moves to the supervisor mode and starts to execute the handler which is associated with the vector table. The handler examines the DSISR and FPSCR registers and carries out the required function. When it gets completed the RFI or return-from-interrupt instruction is executed.

4. How many general types of exceptions are there?

a) 2

b) 3

c) 6

d) 4

Answer: d

Explanation: There are four general types of exceptions. They are synchronous precise, asynchronous precise, synchronous imprecise and asynchronous imprecise.

5. In which of the exceptions does the external event causes the exception?

a) synchronous exception

b) asynchronous exception

c) precise

d) imprecise

Answer: b

Explanation: The asynchronous exception is the one in which an external event causes an exception and is independent of the instruction flow. On the other hand, the synchronous exceptions are synchronised, that is, it is caused by the instruction flow.

6. Which of the exceptions are usually a catastrophic failure?

a) imprecise exception

b) precise exception

c) synchronous exception

d) asynchronous exception

Answer: a

Explanation: An imprecise exception is a catastrophic failure in which the processor cannot continue processing or allow a particular task or program to continue.

7. Which of the exceptions allows the system reset or memory fault?

a) imprecise exception

b) precise exception

c) synchronous exception

d) asynchronous exception

Answer: a

Explanation: The system reset or memory fault falls into the category of imprecise exceptions while accessing the vector table.

8. Which registers are used to determine the completion status?

a) MSR

b) flag register

c) DSISR

d) index register

Answer: c

Explanation: The completion status can be determined by the information bits in the DSISR and FPSCR registers.

9. Which of the following does not support PowerPC architecture?

a) synchronous precise

b) asynchronous precise

c) synchronous imprecise

d) asynchronous imprecise

Answer: c

Explanation: The synchronous imprecise is usually not supported on the PowerPC architecture and also in the MPC601, MPC603 etc.

10. Which exceptions are used in the PowerPC for floating point?

a) synchronous imprecise

b) asynchronous imprecise

c) synchronous precise

d) synchronous imprecise

Answer: a

Explanation: The PowerPC can handle the floating point exception by making use of the synchronous imprecise mode.

11. Which exception is used in the external interrupts and decrementer-caused exceptions?

a) synchronous precise

b) asynchronous precise

c) synchronous imprecise

d) asynchronous imprecise

Answer: b

Explanation: The asynchronous precise type exception is used to handle the external interrupts and decrementer-caused exceptions. Both these can occur at any time within the instruction flow.

12. Which exception can be masked by clearing the EE bit to zero in the MSR?

a) synchronous imprecise

b) synchronous precise

c) asynchronous imprecise

d) asynchronous precise

Answer: d

Explanation: The asynchronous precise type exceptions can be masked by clearing the EE bits in the MSR. This bit is automatically cleared to zero in the MSR in order to prevent this interrupt causing an exception while other exceptions are being processed.

This set of Embedded Systems test focuses on “RISC Exceptions-II”.


1. Which of the following can be done to ensure that all interrupts are recognised?

a) reset pin

b) external ready pin

c) handshaking

d) acknowledgment

Answer: c

Explanation: The exception handler performs some kind of handshaking to ensure that all the interrupts are recognised.

2. How many types of exceptions are associated with the asynchronous imprecise?

a) 1

b) 2

c) 3

d) 4

Answer: b

Explanation: Two types of exceptions are associated with the asynchronous imprecise. These are system reset and machine checks.

3. How is the internal registers and memories are reset?

a) system reset

b) memory reset

c) peripheral reset

d) software reset

Answer: a

Explanation: By doing the system reset, all the current processing are stopped and the internal registers and the memories are reset.

4. How is the machine check exception is taken in an asynchronous imprecise?

a) ME bit

b) EE bit

c) FE0

d) FE1

Answer: a

Explanation: The machine check exception is taken only if the ME bit of the MSR is set. If it is cleared, the processor will enter into a check stop state.

5. Which of the following are the exceptions associated with the asynchronous imprecise?

a) decrementer interrupt

b) machine check

c) instruction dependent

d) external interrupt

Answer: b

Explanation: The machine check and the system reset are two types of exceptions which are associated with the asynchronous imprecise.

6. Which of the following possesses an additional priority?

a) asynchronous precise

b) asynchronous imprecise

c) synchronous precise

d) synchronous imprecise

Answer: c

Explanation: The synchronous precise exceptions provide additional priority because it is possible for an instruction to generate more than one exception.

7. Which of the following has more priority?

a) system reset

b) machine check

c) external interrupt

d) decrementer interrupt

Answer: a

Explanation: The system reset has the first priority then comes the machine reset, next priority moves for the instruction dependent, and the next priority is an external interrupt, and last priority level goes for the decrementer interrupt.

8. Which bit controls the external interrupts and the decrementer exceptions?

a) FE1

b) FE0

c) EE

d) ME

Answer: c

Explanation: The EE bit in the MSR controls the external interrupts and the decrementer exceptions.

9. Which bit controls the machine check exceptions?

a) ME

b) FE0

c) FE1

d) EE

Answer: a

Explanation: The ME bit in the MSR controls the machine check interrupts.

10. Which bits control the floating point exceptions?

a) EE

b) FE0

c) FE1

d) both FE1 and FE2

Answer: d

Explanation: The FE0 and FE1 control the floating point exceptions.

11. Which of the following is a 16 kbyte block?

a) register

b) vector table

c) buffer

d) lookaside buffer

Answer: b

Explanation: The vector table is a 16 kbyte block which is divided into 256 byte divisions in which each division is allocated for particular exceptions and it also contains the handler routine associated with the exceptions.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Fast Interrupts”.


1. Which processors use fast interrupts?

a) DSP processor

b) RISC processor

c) CISC processor

d) Harvard processor

Answer: a

Explanation: The fast interrupts are used in the DSP processors or in microcontrollers in which a small routine is executed without saving the context of the processor.

2. Which interrupts generate fast interrupt exception?

a) internal interrupt

b) external interrupt

c) software interrupt

d) hardware interrupt

Answer: b

Explanation: The external interrupts generates the fast interrupt routine exception in which the external interrupt is synchronised with the processor clock.

3. What is the disadvantage of the fast interrupts?

a) stack frame

b) delay

c) size of routine

d) low speed

Answer: c

Explanation: The disadvantages associated with the fast interrupt is the size of routine which can be executed and the resources allocated. In this technique, it allocates a couple of address registers for the fast interrupt routine.

4. Which of the following does not have a stack frame building?

a) hardware interrupt

b) software interrupt

c) non-maskable interrupt

d) fast interrupt

Answer: d

Explanation: The fast interrupt does not have stack frame building and it does not possess any such delays. This can be considered as the advantage of the fast interrupts.

5. What is programmed to generate a two instruction fast interrupt?

a) software

b) application

c) timer

d) sensor

Answer: c

Explanation: The SCI timer generates the two instruction fast interrupt. This increment the register R1.

6. Which of the following can auto increment the register R1?

a) SCI timer

b) interrupt

c) software interrupt

d) non-maskable interrupt

Answer: a

Explanation: The SCI timer is used to generate the two instruction fast interrupt that can increment the register R1 which acts as a simple counter.

7. Which of the following forces a standard service routine?

a) READY interrupt

b) IRQA interrupt

c) NMI

d) software interrupt

Answer: b

Explanation: The SCI timer is used to generate the two instruction fast interrupt which increments the register R1 that acts as a simple counter which times the period between the events. The events itself generates an IRQA interrupt, that forces the service routine.

8. Which of the following can be used as a reset button?

a) NMI

b) internal interrupt

c) external interrupt

d) software interrupt

Answer: a

Explanation: The non-maskable interrupt is used to generate an interrupt to try and recover control and therefore, the NMI can be used as a reset button.

9. Which of the following is connected to a fault detection circuit?

a) internal interrupt

b) external interrupt

c) NMI

d) software interrupt

Answer: c

Explanation: The non-maskable interrupt is used to generate an interrupt which can be connected to a fault detection circuit like watchdog timer or parity checker.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Operating Systems”.


1. Which of the following provides a buffer between the user and the low-level interfaces to the hardware?

a) operating system

b) kernel

c) software

d) hardware

Answer: a

Explanation: The operating system is software which provides a buffer between the low-level interfaces to the hardware within the system and the user.

2. Which of the following enables the user to utilise the system efficiently?

a) kernel

b) operating system

c) software

d) hardware

Answer: b

Explanation: The operating system is software that enables the users to utilise the system effectively.

3. Which of the following can make the application program hardware independent?

a) software

b) application manager

c) operating system

d) kernel

Answer: c

Explanation: The operating system allows the software to be moved from one system to another and therefore, it can make the application program hardware independent.

4. Which of the following speed up the testing process?

a) kernel

b) software

c) application manager

d) program debugging tools

Answer: d

Explanation: The program debugging tools can speed up the testing process which can make the processor faster.

5. Which of the following includes its own I/O routine?

a) hardware

b) kernel

c) operating system

d) application manager

Answer: c

Explanation: An operating system is a software which includes its own I/o routine in order to drive the serial ports and the parallel ports.

6. Which forms the heart of the operating system?

a) kernel

b) applications

c) hardware

d) operating system

Answer: a

Explanation: The kernel is the heart of the operating system. This can control the hardware and can deal with the interrupts, I/O systems, memory etc.

7. Which of the following locates a parameter block by using an address pointer?

a) OS

b) kernel

c) system

d) memory

Answer: b

Explanation: The kernel is the heart of the operating system which can control the hardware and can deal with the interrupts, I/O systems, memory etc. It can also locate the parameter block by using an address pointer which is stored in the predetermined address register.

8. Which of the following are not dependent on the actual hardware performing the physical task?

a) applications

b) hardware

c) registers

d) parameter block

Answer: d

Explanation: The kernel can locate the parameter block by using an address pointer which is stored in the predetermined address register. These parameter blocks are standard throughout the operating system, that is, they are not dependent on the actual hardware performing the physical task.

9. Which of the following bus can easily upgrade the system hardware?

a) control bus

b) data bus

c) VMEbus

d) bus interface unit

Answer: c

Explanation: The software can be easily moved from one system to another which is more important for designing embedded systems, especially for those which use an industry standard bus such as VMEbus, in which the system hardware can be expanded or upgraded.

10. Which of the following is the first widely used operating system?

a) MS-DOS

b) windows XP

c) android

d) CP/M

Answer:d

Explanation: The first widely used operating system is the CP/M which is developed for Intel 8080 and the 8”floppy disk system.

11. Which of the following is an example of a single task operating system?

a) android

b) windows

c) IOS

d) CP/M

Answer: d

Explanation: The CP/M is a single task operating system, that is, only one task or an application can be executed at a time.

12. Which of the following becomes a limiting factor while an application program has to be complete?

a) memory

b) peripheral

c) input

d) output

Answer: a

Explanation: The application program has to complete and the memory becomes a limiting factor, which can be solved by using program overlays.

13. Which of the following cannot carry implicit information?

a) semaphore

b) message passing

c) threads

d) process

Answer: a

Explanation: The kernel in the real-time operating system which deals with the flag but cannot carry implicit information are called semaphores or events.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Multitasking Operating Systems”.


1. Which of the following works by dividing the processor’s time?

a) single task operating system

b) multitask operating system

c) kernel

d) applications

Answer: b

Explanation: The multitasking operating system works by dividing the processor’s time into different discrete time slots, that is, each application requires a defined number of time slots to complete its execution.

2. Which of the following decides which task can have the next time slot?

a) single task operating system

b) applications

c) kernel

d) software

Answer: c

Explanation: The operating system kernel decides which task can have the next time slot. So instead of the task executing continuously until completion, the execution of the processor is interleaved with the other tasks.

3. Which of the following controls the time slicing mechanism in a multitasking operating system?

a) kernel

b) single tasking kernel

c) multitasking kernel

d) application manager

Answer: c

Explanation: The multitasking operating systems are associated with the multitasking kernel which controls the time slicing mechanism.

4. Which of the following provides a time period for the context switch?

a) timer

b) counter

c) time slice

d) time machine

Answer: c

Explanation: The time period required for each task for execution before it is stopped and replaced during a context switch is known as the time slice.

5. Which of the following can periodically trigger the context switch?

a) software interrupt

b) hardware interrupt

c) peripheral

d) memory

Answer: b

Explanation: The multitasking operating systems are associated with the multitasking kernel which controls the time slicing mechanism. The time period required for each task for execution before it is stopped and replaced during a context switch is known as the time slice. These are periodically triggered by a hardware interrupt from the system timer.

6. Which interrupt provides system clock in the context switching?

a) software interrupt

b) hardware interrupt

c) peripheral

d) memory

Answer: b

Explanation: The multitasking operating systems deals with the multitasking kernel which controls the time slicing mechanism and the time period required for each task for execution before it is stopped and replaced during a context switch is known as the time slice which are periodically triggered by a hardware interrupt from the system timer. This hardware interrupt provides the system clock in which several interrupts are executed and counted before a context switch is performed.

7. The special tale in the multitasking operating system is also known as

a) task control block

b) task access block

c) task address block

d) task allocating block

Answer: a

Explanation: When a context switch is performed, the current program or task is interrupted, so the processor’s registers are saved in a special table which is known as task control block.

8. Which of the following stores all the task information that the system requires?

a) task access block

b) register

c) accumulator

d) task control block

Answer: d

Explanation: The task control block stores all the task information that the system requires and this is done when the context switch is performed so that the currently running program is interrupted.

9. Which of the following contains all the task and their status?

a) register

b) ready list

c) access list

d) task list

Answer: b

Explanation: The ‘ready’ list possesses all the information regarding a task, that is, all the task and its corresponding status which is used by the scheduler to decide which task should execute in the next time slice.

10. Which determines the sequence and the associated task’s priority?

a) scheduling algorithm

b) ready list

c) task control block

d) application register

Answer: a

Explanation: The scheduling algorithm determines the sequence and an associated task’s priority. It also determines the present status of the task.

11. Which can control memory usage?

a) operating system

b) applications

c) hardware

d) kernel

Answer:d

Explanation: The kernel can control the memory usage and it can also prevent the tasks from corrupting each other.

12. Which can control the memory sharing between the tasks?

a) kernel

b) application

c) software

d) OS

Answer: a

Explanation: The kernel can control memory sharing between tasks which allow sharing common program modules.

13. Which of the following can implement the message passing and control?

a) application software

b) operating system

c) software

d) kernel

Answer: d

Explanation: The kernel can implement the message passing and control which acts as a message passer and controller between the tasks.

14. How many types of messages are associated with the real-time operating system?

a) 2

b) 3

c) 4

d) 5

Answer: a

Explanation: There are two basic types of messages associated with the real-time operating system. These are semaphores and messages.

15. Which of the following can carry information and control task?

a) semaphore

b) messages

c) flags

d) address message

Answer: b

Explanation: The messages can carry information and it can also control the task regarding the real-time operating systems. These are also known as events.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Task Swapping Methods”.


1. Which task swapping method does not require the time critical operations?

a) time slice

b) pre-emption

c) cooperative multitasking

d) schedule algorithm

Answer: a

Explanation: Time-critical operations are not essential in the time slice mechanism. Time slice mechanism describes the task switching in a particular time slot.

2. Which task swap method works in a regular periodic point?

a) pre-emption

b) time slice

c) schedule algorithm

d) cooperative multitasking

Answer: b

Explanation: The time slicing works by switching task in regular periodic points in time, that is, any task that needs to run next will have to wait until the current time slice is completed.

3. Which of the following determines the next task in the time slice method of task swapping?

a) scheduling program

b) scheduling application

c) scheduling algorithm

d) scheduling task

Answer: c

Explanation: The time slice mechanism can also be used as a scheduling method in which the task to run next is determined by the scheduling algorithm.

4. Which of the following can be used to distribute the time slice across all the task?

a) timer

b) counter

c) round-robin

d) task slicing

Answer: c

Explanation: The time slice based system uses fairness scheduler or round robin to distribute the time slices across all the tasks that need to run in a particular time slot.

5. What do a time slice period plus a context switch time of the processor determines?

a) scheduling task

b) scheduling algorithm

c) context task

d) context switch time

Answer: d

Explanation: The context switch time of the processor along with the time slice period determines the context switch time of the system which is an important factor in system response, that is, the time period can be reduced to improve the context switching of the system which will increase the number of task switches.

6. Which can increase the number of task switches?

a) time period

b) frequency

c) time rate

d) number of cycles

Answer: a

Explanation: The time period can be reduced to improve the context switching of the system which will increase the number of task switches.

7. Which mechanism is used behind the Windows 3.1?

a) time slice

b) pre-emption

c) cooperative multitasking

d) scheduling algorithm

Answer: c

Explanation: The cooperative multitasking mechanism is used the Windows 3.1 but it is not applicable to the real-time operating systems.

8. Which of the following provides an illusion of multitasking?

a) single task operating system

b) multitasking operating system

c) cooperative multitasking

d) pre-emption

Answer: c

Explanation: The cooperative multitasking co-operates between them which provides the illusion of multitasking. This is done by periodically executing the tasks.

9. Which task method follows a currently running task to be stopped by a higher priority task?

a) scheduling algorithm

b) time slice

c) cooperative multitasking

d) pre-emption

Answer: d

Explanation: The pre-emption is an alternative method of the time slice where the currently running task can be stopped or preempted or switched out by a higher priority active task.

10. Which of the following requires programming within the application?

a) time slice

b) scheduling algorithm

c) pre-emption

d) cooperative multitasking

Answer: d

Explanation: The cooperative multitasking requires programming within the application and the system can be destroyed by a single program which hogs all the processing power. Therefore, it is not applicable in the real-time operating system.

11. What does RMS stand for?

a) rate monotonic scheduling

b) rate machine scheduling

c) rate monotonic software

d) rate machine software

Answer: a

Explanation: The rate monotonic scheduling is a method that is used to assign priority for a pre-emptive system such that the correct execution can be guaranteed.

12. Which of the following task swapping method is a better choice in the embedded systems design?

a) RMS

b) pre-emptive

c) cooperative multitasking

d) time slice

Answer: b

Explanation: The pre-emptive method of task swapping is the first choice for embedded system design because of its better system response.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Priority Inversion”.


1. Which of the following allows a lower priority task to run despite the higher priority task is active and waiting to preempt?

a) message queue

b) message passing

c) semaphore

d) priority inversion

Answer: d

Explanation: The priority inversion mechanism where the lower priority task can continue to run despite there being a higher priority task active and waiting to preempt.

2. What happens to the interrupts in an interrupt service routine?

a) disable interrupt

b) enable interrupts

c) remains unchanged

d) ready state

Answer: a

Explanation: In the interrupt service routine, all the other interrupts are disabled till the routine completes which can cause a problem if another interrupt is received and held pending. This can result in priority inversion.

3. Which of the following is a part of RTOS kernel?

a) memory

b) input

c) ISR

d) register

Answer: c

Explanation: The ISR can send the message for the tasks and it is a part of RTOS kernel.

4. Which of the following is an industrial interconnection bus?

a) bus interface unit

b) data bus

c) address bus

d) VMEbus

Answer: d

Explanation: The VMEbus is an interconnection bus which is used in the industrial control and many other real-time applications.

5. Which of the following supports seven interrupt priority level?

a) kernel

b) operating system

c) VMEbus

d) data bus

Answer: c

Explanation: The VMEbus supports seven interrupt priority level which allows the prioritisation of the resources.

6. What type of interrupt handling is seen in multiprocessor applications?

a) centralised interrupt

b) handled by one MASTER

c) distributed handling

d) shared handling

Answer: c

Explanation: The multiprocessor applications allows distributed handling in which the direct communication with the individual masters is possible.

7. Which of the following is an asynchronous bus?

a) VMEbus

b) timer

c) data bus

d) address bus

Answer: a

Explanation: The VMEbus is based on Eurocard sizes and is asynchronous which is similar to the MC68000.

8. Which of the following is not a priority based?

a) priority inversion

b) message passing

c) fairness system

d) message queuing

Answer: c

Explanation: The fairness system allows the system which requires different characteristics from those originally provided and the system response that is not a priority based. The fairness system is not a priority based on where the bus access is distributed across the requesting processors.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Tasks, Threads and Process”.


1. Which of the following can be used to refer to entities within the RTOS?

a) threads

b) kernels

c) system

d) applications

Answer: a

Explanation: The threads and processes can be used to refer to entities within the RTOS. They provide an interchangeable replacement for the task. They have a slight difference in their function. A process is a program in execution and it has its own address space whereas threads have a shared address space. The task can be defined as a set of instructions which can be loaded into the memory.

2. Which of the following defines the set of instructions loaded into the memory?

a) process

b) task

c) thread

d) system hardware

Answer: b

Explanation: The task can be defined by the set of instructions which is loaded into the memory and it can split into two or more tasks.

3. Which of the following uses its own address space?

a) thread

b) process

c) task

d) kernel

Answer: a

Explanation: Threads uses shared memory space and it uses the memory space of the process.

4. Which of the following does not uses a shared memory?

a) process

b) thread

c) task

d) kernel

Answer: a

Explanation: The program in execution is known as the process. The process does not share the memory space but the threads have a shared memory address. When the CPU switches from process to another, the current information is stored in the process descriptor.

5. Which of the following can own and control the resources?

a) thread

b) task

c) system

d) peripheral

Answer: b

Explanation: The task and process have several characteristics and one such is that the task or process can own or control resources and it has threads of execution which are the paths through the code.

6. Which can be supported if the task or process maintains a separate data area for each thread?

a) single thread system

b) mono thread system

c) multiple threads

d) dual threads

Answer: c

Explanation: The multiple threads can be supported only if the process or task can maintain separate data areas for each thread.

7. Which of the following possesses threads of execution?

a) process

b) thread

c) kernel

d) operating system

Answer: a

Explanation: The process has threads of execution which are the paths through the code.

8. Which of the following is inherited from the parent task?

a) task

b) process

c) thread

d) kernel

Answer: c

Explanation: The threads are a part of the process, that is, it uses a shared memory of the process and therefore said that its resources are inherited from the parent process or task.

9. Which term is used to encompass more than a simple context switch?

a) process

b) single thread system

c) thread

d) multithread

Answer: a

Explanation: The process includes the additional information which is used to encompass more than a simple context switch. This is similar to the task switching, that is why it is said that process and task are interchangeable.

10. Which can be considered as the lower level in the multitasking operating system?

a) process

b) task

c) threads

d) multi threads

Answer: c

Explanation: In the multitasking operating system, the process and tasks form the higher level whereas the thread is the lower level. But in a simple operating system, there is no difference between the context switch of thread and the process.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Commercial Operating Systems”.


1. Which of the following kernel supports the MC68000 family?

a) pSOS+

b) pSOS+kernel

c) pNA+ network manager

d) pSOS multiprocessor kernel

Answer: a

Explanation: The pSOS+ kernel supports many processor families like Intel 80×86, M88000, MC68000 and i960 processors. The kernel is small in size and has a 15-20 Kbytes RAM.

2. What is the worst case figure for interrupt latency for an MC68020 running at 25MHz?

a) 19 microseconds

b) 6 microseconds

c) 20 microseconds

d) 8 microseconds

Answer: b

Explanation: The worst case figure for the interrupt latency for an MC68020 which runs at 25MHz is 6 microseconds and the context switch for the same is 19 microseconds.

3. Which of the following is the multiprocessing version of the kernel?

a) pSOS+

b) pSOS+ kernel

c) pSOS multiprocessor kernel

d) pSOS

Answer: c

Explanation: The pSOS+ is a multitasking real-time kernel of the operating system and pSOS+m or the pSOS+ multiprocessor kernel is the multiprocessing version of the kernel. It is virtually same as the single processor version except the ability to send and receiving system objects from the processors within the system.

4. Which of the following is a compiler independent run-time environment for C applications?

a) pSOS multiprocessor kernel

b) pSOS

c) pSOS+

d) pREC+ runtime support

Answer: d

Explanation: The pREC+ is a compiler independent runtime environment for the C program applications.

5. Which kernel provides 88 functions that can be called from the C programs?

a) pSOS multiprocessor kernel

b) pSOS

c) pSOS+

d) pREC+ runtime support

Answer: d

Explanation: The pREC+ is compatible with the ANSI X3J11 and can provide the 88 functions that can be called from the C programs.

6. Which of the following is not a standalone product?

a) pREC+ runtime support

b) pSOS+m

c) pSOS+

d) pSOS+ kernel

Answer: a

Explanation: The pREC+ is not a standalone product it uses pSOS+m or pSOS+ for the input/output devices and task functions and calls the PHILE+ for the file and disk I/O.

7. Which kernel allows the multiple tasks which use the same routine?

a) pREC+ runtime support

b) pSOS+m

c) pSOS+

d) pSOS+ kernel

Answer: a

Explanation: The pREC+ runtime support kernel’s routines are reentrant that allows the multiple tasks to use the same routine simultaneously.

8. Which provides the TCP/IP communication over the ethernet and FDDI?

a) pSOS+m

b) pSOS+ kernel

c) pNA+ network manager

d) pSOS+

Answer: c

Explanation: A pNA+ network manager is a networking option which can provide the TCP/IP communication over a large variety of media such as the FDDI and the ethernet.

This set of Embedded Systems Quiz focuses on “Commercial Operating Systems-II”.


1. Which can provide efficient downloading and debugging communication between the host and target system?

a) pSOS+

b) pSOS+ kernel

c) pHILE+ file system

d) pNA+ network manager

Answer: d

Explanation: The pNA+ network manager can provide efficient downloading and debugging communication between the host and target system.

2. Which of the following is a system level debugger which provides the low-level debugging facilities and the system debugging?

a) pROBE+ system level debugger

b) pNA+ network manager

c) pHILE+ file system

d) pNA+ network manager

Answer: a

Explanation: The pROBE+ system level debugger which can provide the system debugging and the low level debugging.

3. How is the pROBE+ system level debugger communicate with the outside world?

a) peripheral output

b) serial port

c) LCD display

d) LED

Answer: b

Explanation: The pROBE+ system level debugger can communicate with the outside world through the serial port or by installing pNA+, a TCP/IP link can be used instead.

4. Which of the following is a complementary product to pROBE+ system level debugger?

a) pSOS+ kernel

b) pSOS+

c) XRAY+ source level debugger

d) pSOS+m

Answer: c

Explanation: The XRAY+ source level debugger is a complementary product to pROBE+ system level debugger as it can use the debugger information and combine with the C source and other functions on the host that can provide an integrated debugging.

5. Which of the following supports the MS-DOS file?

a) pNA+ network manager

b) pSOS+ kernel

c) pSOS+ m

d) pHILE+ file system

Answer: d

Explanation: The pHILE+ file system supports the MS-DOS file structure and the product can provide input and output file.

6. Who developed the OS-9?

a) Microwave

b) Microwave and Motorola

c) Motorola and IBM

d) Microwave and IBM

Answer: b

Explanation: The OS-9 is developed by Motorola and Microwave as a real-time operating system. The operating system is developed for MC6809 which is an 8-bit processor.

7. Who had developed VRTX-32?

a) Microtec Research

b) Microwave

c) Motorola

d) IBM

Answer: a

Explanation: The VRTX-32 is developed by Microtec Research which is a high-performance real-time kernel.

8. Which provides the library interface to allow C programs to call standard I/O functions?

a) RTL

b) TNX

c) IFX

d) MPV

Answer: a

Explanation: The RTL is run-time library support for Microtec and the Sun compilers and can provide the library interface to allow the C programs to call the standard I/O functions.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Resource Protection”.


1. Which of the following unit protects the memory?

a) bus interface unit

b) execution unit

c) memory management unit

d) peripheral unit

Answer: c

Explanation: The resources have to be protected in an embedded system and the most important resource to be protected is the memory which is protected by the memory management unit through different programming.

2. Which unit protects the hardware?

a) MMU

b) hardware unit

c) bus interface unit

d) execution unit

Answer: a

Explanation: The hardware part is protected by the memory management unit. The memory part is also protected by the memory management unit. The hardware such as the input-output devices are protected and is prevented from the direct access.

3. Which mechanism can control the access?

a) in-situ

b) spin-lock

c) ex-situ

d) both in-situ and ex-situ

Answer: b

Explanation: Both the memory and the hardware part are protected by the memory management unit and the hardware such as the input-output devices are protected, These are prevented from the direct access. These accesses are made through a device driver and this device driver can control the serial port. Such a mechanism is called spin-lock mechanism which provides the control access.

4. Which of the following is very resilient to the system crashes?

a) Windows 3.1

b) MS-DOS

c) Windows NT

d) kernel

Answer: c

Explanation: The Windows NT is very resilient to the system crashes and the system will continue while the processes can crash. This is because of the user mode and the kernel mode which is coupled with the resource protection. This resilience is a big advantage over the MS-DOS and Windows 3.1.

5. Which of the following are coupled in the Windows NT for the resource protection?

a) kernel mode and user mode

b) user mode and protected mode

c) protected mode and real mode

d) virtual mode and kernel mode

Answer: a

Explanation: The user mode and the kernel mode are coupled with the resource protection and this resilience in Windows NT is a big advantage over the MS-DOS and the Windows 3.1.

6. Which of the following support multi-threaded software?

a) Windows NT

b) thread

c) process

d) task

Answer: a

Explanation: The Windows NT supports multi-threaded software in which the processes can support several independent paths or threads.

7. Which provides a 4 Gbyte virtual address space?

a) Windows 3.1

b) MS-DOS

c) pSOS+

d) Windows NT

Answer: d

Explanation: The virtual address spacing in the Windows NT is somewhat different from the MS-DOS and the Windows 3.1. The Windows NT provides 4 Gbytes virtual address space for each process and that is linearly addressed using 32-bit address values.

8. Which applications can be used with the Windows NT?

a) WIN16

b) WIN32

c) WIN4

d) WIN24

Answer: b

Explanation: The WIN32 is also known as 32-bit or even native. It is used for the Windows NT applications which uses the same instruction set as that of the Windows NT and therefore do not need to emulate a different architecture.

9. Which of the following has the same instruction set as that of the Windows NT?

a) WIN32

b) WIN4

c) WIN24

d) WIN16

Answer: a

Explanation: WIN32 is used for the Windows NT applications and is also known as even native which uses the same instruction set as that of the Windows NT and therefore do not need to emulate a different architecture.

10. Which can provide more memory than physical memory?

a) real memory

b) physical address

c) virtual memory

d) segmented address

Answer: c

Explanation: The physical memory can provide more memory than the physical memory within the system. Such memories are divided into segments and pages.

This set of Embedded Systems online quiz focuses on “Resource Protection-II”.


1. Which of the following uses a swap file to provide the virtual memory?

a) windows NT

b) kernel

c) memory

d) memory management unit

Answer: a

Explanation: The Windows NT use a swap file for providing a virtual memory environment. This file is dynamic and varies with the amount of memory that all the software including the device driver, operating systems and so on.

2. What is the size of the swap file in Windows 3.1?

a) 25 Mbytes

b) 30 Mbytes

c) 50 Mbytes

d) 100 Mbytes

Answer: b

Explanation: The Windows 3.1 have a swap file of size 25 Mbytes.

3. What is the nature of the swap file in the Windows NT?

a) static

b) dynamic

c) linear

d) non-linear

Answer: b

Explanation: The swap file used in the Windows NT is dynamic and it varies with the amount of memory that all the software including the device driver, operating systems and so on.

4. What limits the amount of virtual memory in Windows 3.1?

a) size of the swap file

b) nature of swap file

c) static file

d) dynamic file

Answer: a

Explanation: The swap file of Windows 3.1 have a size of 25 Mbytes and thus limits the amount of virtual memory that it can support.

5. Which of the following control and supervises the memory requirements of an operating system?

a) processor

b) physical memory manager

c) virtual memory manager

d) ram

Answer: c

Explanation: The virtual memory manager can control and supervises the memory requirements of the operating system.

6. What is the size of the linear address in the virtual memory manager?

a) 2 Gbytes

b) 12 Gbytes

c) 4 Gbytes

d) 16 Gbytes

Answer: c

Explanation: The virtual memory manager can allocate a linear address space of size 4 Gbytes to each process which is unique and cannot be accessed by the other processes.

7. How many modes are used to isolate the kernel and the other components of the operating system?

a) 2

b) 3

c) 4

d) 5

Answer: a

Explanation: There are two modes that are used for isolating the kernel and the other components of the operating system from any process and user applications that are running. These are kernel mode and the user mode.

8. Which are the two modes used in the isolation of the kernel and the user?

a) real mode and virtual mode

b) real mode and user mode

c) user mode and kernel mode

d) kernel mode and real mode

Answer: c

Explanation: The two modes are kernel mode and the user mode which are used for isolating the kernel and the other components of the operating system from any process and user applications that are running.

9. Which of the following must be used to isolate the access in the user mode?

a) device driver

b) software driver

c) on-chip memory

d) peripherals

Answer: a

Explanation: The device driver is used to control and isolate the access when it is in user mode. This is used to ensure that no conflict is caused.

10. Which mode uses 16 higher real-time class priority levels?

a) real mode

b) user mode

c) kernel mode

d) protected mode

Answer: c

Explanation: The kernel mode processes use the 16 higher real-time class priority levels and the operating system processes will take the preference over the user applications.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Characteristics of Windows NT”.


1. Which filesystem is used in the Windows 95?

a) FAT

b) HPFS

c) VFAT

d) NTFS

Answer: c

Explanation: The VFAT is used in the Windows 95 and it also supports long file names.

2. What does HPFS stand for?

a) high performance file system

b) high periodic file system

c) high peripheral file system

d) horse power file system

Answer: a

Explanation: The high performance file system is an alternative file system which possess 254 characters. It is used by the OS/2 and also writes caching to disk technique that stores data temporarily and write it to the disk.

3. Which filing system is used by the Windows NT?

a) FAT

b) VFAT

c) HPFS

d) NTFS

Answer: d

Explanation: The NT filing system or NTFS is used by the Windows NT, that is its own filing system which conforms to various security operations and allows system administrators to restrict access to files.

4. Which filesystem is used by the OS/2?

a) FAT

b) VFAT

c) HPFS

d) NTFS

Answer: c

Explanation: The high performance file system is an alternative file system which possess 254 characters. It is used by the OS/2 and also writes caching to disk technique that stores data temporarily and write it to the disk.

5. What do HAL stand for?

a) hardware abstraction layer

b) hardware address layer

c) hardware access layer

d) hardware address lead

Answer: a

Explanation: The HAL is the hardware abstraction layer. This provides the portability across the multiprocessor and different platforms.

6. Which of the following can provide portability across different processor-based platforms?

a) File system

b) HAL

c) NTFS

d) FAT

Answer: b

Explanation: The HAL or hardware abstraction layer is designed to provide portability across the different platform and different multiprocessor or single processor.

7. Which of the following defines the virtual hardware that the kernel uses?

a) HAL

b) NTFS

c) FAT

d) VFAT

Answer: a

Explanation: The HAL or hardware abstraction layer defines virtual hardware which the kernel uses when it needs to access the processor or hardware resources.

8. Which of the following provides a link between the user processes and threads and the hardware?

a) I/O driver

b) File system

c) Memory

d) LPC

Answer: a

Explanation: The I/O driver is also a part of the kernel. These can provide a link between the threads and the processes and the hardware. The Windows NT driver is not compatible with the MS-DOS and Windows 3.1 drivers.

This set of Embedded Systems Question Bank focuses on “Characteristics of Windows NT-II”.


1. What does LPC stand for?

a) local procedure call

b) local program call

c) local program code

d) local procedure code

Answer: a

Explanation: The LPC is defined as the local procedure call which is responsible for coordinating the system calls from the WIN32 subsystem and an application.

2. Which of the following is responsible for coordinating the system call within an application and the WIN32 subsystem?

a) kernel

b) file system

c) LPC

d) network support

Answer: c

Explanation: The local procedure call is responsible for coordinating the system calls from the WIN32 subsystem and an application. Depending upon the type of the system call, the application will be routed directly with the LPC without going through the WIN32 subsystem.

3. Which of the following is responsible for ensuring correct operation of all processes which are running within the system?

a) kernel

b) file system

c) lpc

d) user mode

Answer: a

Explanation: The kernel is responsible for ensuring the correct operation of all process which are running within the system. It also provides the synchronisation and the scheduling that the system needs.

4. How many level priority scheme does the scheduling used in the kernel?

a) 8

b) 16

c) 32

d) 64

Answer: c

Explanation: The scheduling support in the kernel support 32 level priority scheme and it can be used to schedule threads rather than processes.

5. Which procedure in the kernel allows the thread to wait until a specific resource is available?

a) synchronisation

b) scheduling

c) scheduling and synchronisation

d) lpc

Answer: a

Explanation: The synchronisation procedure will allow the thread to wait until a specific resource such as semaphore, object etc are available.

6. Which of the following can preempt the current thread and reschedule the high priority thread in the kernel?

a) interrupt

b) lpc

c) file system

d) memory

Answer: a

Explanation: The interrupts and the similar events such as exceptions can pass through the kernel which can preempt the current thread and the can reschedule the high priority thread to process.

7. How many file system does the Windows NT support?

a) 4

b) 5

c) 3

d) 2

Answer: c

Explanation: The Windows NT support three file system and these coexist with each other even though there are some restrictions.

8. What does FAT stand for?

a) file address table

b) file access table

c) file arbitrary table

d) file allocation table

Answer: d

Explanation: The FAT or file allocation table is a kind of file system which is used by the Windows 3.1 and the MS-DOS.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Linux”.


1. Who started Linux first as a personal project?

a) Linus Torvalds

b) Ken Thompson

c) Dennis Ritchie

d) John Dell

Answer: a

Explanation: The Linux was taken as a personal project by Linus Torvalds at the University of Helsinki in Finland that is similar to UNIX as an operating system.

2. Which of the following is similar to UNIX OS?

a) Windows NT

b) MS-DOS

c) Linux

d) Windows 3.1

Answer: c

Explanation: The Linux is similar to UNIX operating system but it is entirely different for the Windows NT, MS-DOS and the Windows 3.1

3. Who had first described UNIX in an article?

a) Ken Thompson

b) Dennis Ritchie and Ken Thompson

c) Dennis Ritchie

d) Linus Torvalds

Answer: b

Explanation: The UNIX was first described by Dennis Ritchie and Ken Thompson of Bell Research Labs in 1974 through an article.

4. What does MULTICS stand for?

a) multiplexed information and computing service

b) multiplexed information and code service

c) multiplexed inter-access code service

d) multiplexed inter-code sensor

Answer: a

Explanation: MULTICS is a multiplexed information and computing service which generate software that would allow a large number of users for accessing the computer simultaneously.

5. Which of the following is the first version of the UNIX operating system?

a) PDP-2

b) Linux

c) MS-DOS

d) PDP-7

Answer: d

Explanation: The PDP-7 processor is the first version of the UNIX which has a new filing system and new utilities.

6. Which of the following is a UNIX clone?

a) XENIX

b) Windows 3.1

c) Windows NT

d) Linux

Answer: a

Explanation: The XENIX is a UNIX clone developed by the Motorola in the year 2979 and is ported to many processors.

7. Which of the following is an alternate source of UNIX?

a) MS-DOS

b) Windows 3.1

c) Windows NT

d) Linux

Answer: a

Explanation: With the many disadvantages of the UNIX operating system, Linux was used as an alternative source. The UNIX operating system was more expensive operating system and most of the hardware was specific to the manufacturer, which restricted the use of UNIX and developed for an alternative one, the Linux.

8. Which of the following are grouped into directories and subdirectories?

a) register

b) memory

c) files

d) routines

Answer: c

Explanation: The files are grouped into directories and subdirectories. This file system contains all the data files, commands, programs and special files which allow the access to the physical computer system. The file system of the Linux operating system is similar to the UNIX operating system.

9. Which character is known as a root directory?

a) ^

b) &

c) &&

d) /

Answer: d

Explanation: The character / is used at the beginning of the file name or the path name which is used as the starting point and is known as the root directory or root.

10. How many types of Linux files are typically used?

a) 2

b) 3

c) 4

d) 5

Answer: c

Explanation: There are four types of Linux files. These are regular, special, directories and named pipes.

This set of Basic Embedded Systems Questions and Answers focuses on “Linux-II”.


1. Which filesystem of Linux has mass storage devices?

a) physical file system

b) temporary file system

c) ram

d) register

Answer: a

Explanation: The physical file system has mass storage devices such as hard disks and floppy which are allocated to parts of the logical file system.

2. Which file type of Linux has no restriction on size and can have any kind of data?

a) special

b) regular

c) directories

d) named pipes

Answer: b

Explanation: There are four types of Linux files. These are regular, special, directories and named pipes in which the regular file type can have any kind of data and does not have restrictions in size, the special file type represent certain terminals such as physical I/O device, the directories can hold lists of files, and the named pipes are similar to regular files but restricted in size.

3. Which file type of Linux is similar to the regular file type?

a) named pipe

b) directories

c) regular file

d) special file

Answer: a

Explanation: Among the Linux files, the regular file type is similar to the named pipe but these are restricted in size. On the other hand, the regular file does not have restrictions.

4. Which file type of the Linux hold lists of files rather than the actual data?

a) regular

b) special

c) directories

d) named pipes

Answer: c

Explanation: The directories can hold lists of files other than the actual data, but the other file type does not have this characteristic.

5. Which filesystem of the Linux can be implemented on a system with two hard disks?

a) logical file system

b) physical file system

c) special file type system

d) regular file type system

Answer: a

Explanation: The physical file system is allocated to the parts of the logical file system. The logical file system can be implemented on a system with two hard disks by the allocation of the bin directory under the hard disk 1 and the file subsystem under the hard disk 2.

6. Which directory is allocated on the hard disk 1 of the physical storage in a Linux operating system?

a) term

b) dev

c) etc

d) bin

Answer: d

Explanation: The bin directory is on the hard disk 1 of the physical storage whereas the term, dev, etc is on the hard disk 1 of the physical logical file system.

7. Which process defines the allocation of the mass storage to the logical file system?

a) mounting

b) de-allocation

c) demounting

d) unmounting

Answer: a

Explanation: The allocation of the mass storage to the logical file system is known as the mounting and its reverse operation, deallocation of the mass storage is known as unmounting.

8. Which commands can be used to access the removable media?

a) system calls

b) loop instruction

c) mount and unmount command

d) procedure commands

Answer: c

Explanation: The commands such as mount and unmount commands are used to access the removable media like the floppy disks, through the logical file system.

9. Which target directory is used in the file system of the Linux operating system?

a) /mnt

b) /etc

c) /term

d) /bin

Answer: a

Explanation: The /mnt is the target directory used in the file system of the Linux operating system but the special file names can vary from system to system.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Prediction of Execution Times”.


1. Identify the standard software components that can be reused?

a) application manager

b) operating system

c) application software

d) memory

Answer: b

Explanation: There are certain software components that can be reused in an embedded system design. These are the operating systems, real-time databases and some other forms of middleware.

2. What does WCTE stand for?

a) wait case execution time

b) wait case encoder time

c) worst case execution time

d) worst code execution time

Answer: c

Explanation: The WCTE is the worst case execution time which is an upper bound on the execution times of task. It can be computed for certain programs like while loops, programs without recursion, iteration count etc.

3. For which of the following WCET can be computed?

a) C program

b) assembly language

c) VHDL

d) program without recursion

Answer: d

Explanation: The WCET computing is a difficult task for assembly language and for computing WCTE for any high-level language without the knowledge of the generated assembly code is impossible.

4. The WCET of which component can be computed if the task is mapped to hardware?

a) hardware

b) task

c) both task and hardware

d) application manager

Answer: a

Explanation: The worst case execution time of the hardware can be computed if the task is mapped to the hardware which in turn requires the synthesis of the hardware.

5. Which estimation approach is used by Jha and Dutt for hardware?

a) accurate cost and performance value

b) estimated cost and performance value

c) performance value

d) accurate cost

Answer: b

Explanation: There are different estimation techniques used. One such is the estimated cost and performance value which is proposed by Jha and Dutt for hardware. The accurate cost and performance value is proposed by Jain et al for software.

6. Which estimate approach is more precise?

a) estimated cost and performance value

b) accurate cost and performance value

c) performance value and execution time

d) estimated cost

Answer: b

Explanation: The accurate cost and performance value is possible if interfaces to software synthesis tools and hardware synthesis tools exist and is more precise than any other methods.

7. Which estimate approach takes more time to consume?

a) accurate value

b) estimated value

c) accurate cost and performance value

d) estimated cost and performance value

Answer: c

Explanation: The accurate cost and the performance value method is time-consuming but the other estimating approaches are less time consuming.

8. Which estimation technique can be used if interfaces to software synthesis tools and hardware synthesis tools exist?

a) performance value

b) estimated cost

c) estimated cost and performance value

d) accurate cost and performance value

Answer: d

Explanation: The accurate cost and performance value is possible if interfaces to software synthesis tools and hardware synthesis tools exist.

9. Which of the following is the base for scheduling algorithm?

a) WCET

b) time

c) execution time

d) address accessing time

Answer: a

Explanation: The base for scheduling algorithm is the WCET, worst case execution time which is a bound on the execution time of tasks. Such computing is undecidable in the general case, so it is decidable for certain programs only such as programs without recursion, iteration count, while loops etc.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Classification of Scheduling Algorithm”.


1. Which classification is based on the extension to standard operating systems?

a) software and hardware deadline

b) aperiodic deadline

c) periodic deadline

d) static and dynamic deadline

Answer: a

Explanation: The real-time scheduling can be classified into various criteria. The fundamental classification is the software and hardware deadline which is based on the extension to standard operating systems.

2. Which of the following defines the task which must be executed at every defined unit of time?

a) aperiodic task

b) periodic task

c) job

d) process

Answer: b

Explanation: The periodic task is the one which must be executed in a defined unit of time say ‘p’ where p is called the period.

3. Which of the task are not periodic?

a) periodic task

b) unpredictable task

c) aperiodic task

d) job

Answer: c

Explanation: The aperiodic task is the one in which the task is not periodic but the periodic task is the one in which are the task are periodic. Each execution of a periodic task is known as the job.

4. Which of the following is an aperiodic task requesting the processor at unpredictable times?

a) job

b) aperiodic task

c) sporadic

d) periodic task

Answer: c

Explanation: The aperiodic tasks request the processor at unpredictable times if and only if there is a minimum separation between the times at which they request the processor which is called sporadic.

5. Which of the scheduling algorithm are based on the assumption that tasks are executed until they are done?

a) periodic task

b) aperiodic task

c) non-preemptive scheduling

d) preemptive scheduling

Answer: c

Explanation: The nonpreemptive scheduling is based on the assumptions that the tasks are executed until the task is done whereas the preemptive scheduling is used if the task has long execution times or for a short response time.

6. Which of the following schedulers take decisions at run-time?

a) preemptive scheduler

b) non preemptive scheduler

c) dynamic scheduler

d) static scheduler

Answer: c

Explanation: The dynamic schedulers take decisions at run-time and they are quite flexible but generate overhead at run-time whereas static scheduler is the ones in which the scheduler take their designs at the design time.

7. Which scheduler takes their designs at design time?

a) preemptive scheduler

b) non preemptive scheduler

c) dynamic scheduler

d) static scheduler

Answer: d

Explanation: The static scheduler take their designs at the design time and it also generates tables of start times which are forwarded to a simple dispatcher but the dynamic scheduler takes a decision at the run-time.

8. Which scheduler generates tables and forward to the dispatcher?

a) static scheduler

b) dynamic scheduler

c) aperiodic scheduler

d) preemptive scheduler

Answer: a

Explanation: The static scheduler generates tables of start times which are forwarded to a simple dispatcher and it can be controlled by a timer which makes the dispatcher analyze the table.

9. Which of the following systems are entirely controlled by the timer?

a) voltage triggered

b) time triggered

c) aperiodic task scheduler

d) periodic task scheduler

Answer: b

Explanation: The systems which are entirely controlled by a timer are known as entirely time-triggered systems. A temporal control structure is associated with the entirely time-triggered system which is encoded in a TDL, task descriptor list.

10. What does TDL stand for?

a) task descriptor list

b) task design list

c) temporal descriptor list

d) temporal design list

Answer: a

Explanation: TDL is a task descriptor list which contains the cyclic schedule for all activities of the node and the temporal control structure is encoded by the task descriptor table.

11. Which scheduling algorithm can be used in mixed software/hardware systems?

a) simple algorithm

b) complex algorithm

c) uniprocessor algorithm

d) multiprocessor algorithm

Answer: b

Explanation: The complex algorithm is used in mixed software/hardware systems. It can be used to handle multiple processors.

12. Which algorithm can distinguish homogeneous multiprocessor system and heterogeneous multiprocessor system?

a) complex algorithm

b) simple algorithm

c) scheduler algorithm

d) preemptive algorithm

Answer: a

Explanation: The simple algorithm can be used in handling single processors and the complex algorithm is used in mixed both in software and the hardware systems. It can also be used to distinguish homogeneous multiprocessor system and heterogeneous multiprocessor systems. The complex algorithm can be used to handle multiple processors whereas.

13. Which of the following scheduling test can be used to show that no scheduling exist?

a) sufficient test

b) necessary test

c) complex test

d) simple test

Answer: b

Explanation: The necessary and sufficient conditions are used in the schedulability test. For necessary condition, the test is based only on the necessary conditions and it also can be used to show that no schedule exists. The sufficient condition indicates that no schedule exists even if there exists one.

14. Which scheduling test is used to indicate that no scheduling exist even if there exist one?

a) complex test

b) simple test

c) sufficient test

d) necessary test

Answer: c

Explanation: The sufficient condition indicates that no schedule exists even if there exist one and the necessary condition indicates that no schedule exists even if a schedule exists.

15. Which algorithm can be used to schedule tasks at run-time?

a) online scheduler

b) offline scheduler

c) multiprocessor scheduler

d) uniprocessor scheduler

Answer: a

Explanation: The online scheduling algorithm schedule tasks at run-time which is based on the information regarding the task whereas offline algorithms schedule tasks take a priori knowledge about the execution times, arrival times and deadlines into account.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Aperiodic Scheduling”.


1. Which algorithm is based on Jackson’s rule?

a) EDD

b) LL

c) EDF

d) LST

Answer: a

Explanation: The EDD or earliest due date is based on Jackson’s rule. The Jackson’s rule states that for a given a set of n independent tasks, any algorithm that executes the tasks in the order of nondecreasing deadlines is optimal with respect to reducing the maximum lateness. EDF is the earliest deadline first, LL is the least laxity and the LST is the least slack time first.

2. What does EDD stand for?

a) earliest device date

b) earliest due date

c) earliest device deadline

d) earliest deadline device

Answer: b

Explanation: The earliest due date requires all tasks to be sorted by their deadlines and it is based on Jackson’s rule. If the deadlines are known, EDD algorithm can be used.

3. Which of the following can be implemented as static scheduling algorithm?

a) EDF

b) LL

c) EDD

d) LST

Answer: c

Explanation: The EDD can be implemented as static scheduling algorithm if the deadlines are known in advance and it follows Jackson’s rule.

4. What does EDF stand for?

a) earliest deadline fix

b) earliest due fix

c) earliest due first

d) earliest deadline first

Answer: d

Explanation: The EDF stands for earliest deadline first. This algorithm is optimal with respect to minimizing the maximum lateness and is implemented as dynamic scheduling algorithm for a set of n independent tasks with arbitrary arrival times, any algorithm that at any instant executes the task with the earliest absolute deadline among all the ready tasks is optimal with respect to minimizing the maximum lateness.

5. Which algorithm is dynamic scheduling algorithm?

a) LL

b) LST

c) EDF

d) EDD

Answer: c

Explanation: The EDF or earliest deadline first can be implemented as a dynamic scheduling algorithm.

6. In which scheduling, the task priorities are a monotonically decreasing function of laxity?

a) LL

b) EDD

c) EFD

d) LST

Answer: a

Explanation: In the least laxity algorithm, the laxity can be changed dynamically which shows that the task priorities are a monotonically decreasing function of laxity.

7. Which scheduling algorithm is an optimal scheduling policy for mono-processor system?

a) preemptive algorithm

b) LST

c) EDD

d) LL

Answer: d

Explanation: The least laxity algorithm is a dynamic scheduling algorithm and hence it can be implemented as an optimal scheduling policy for the mono-processor system. The LL scheduling algorithm is also preemptive scheduling.

8. Which scheduling algorithm cannot be used with a standard OS providing fixed priorities?

a) LL

b) LST

c) EDD

d) EFD

Answer: a

Explanation: The least laxity algorithm cannot be used with a standard OS providing fixed priorities because of its dynamic property.

9. Who proposed the LDF algorithm?

a) Bayes

b) Nyquist

c) Lawler

d) Stankovic

Answer: c

Explanation: The latest deadline first or LDF is proposed by Lawler which performs a topological sort. It is based on the total order compatible with the partial order with respect to the task graph.

10. What does LDF stand for?

a) last deadline first

b) least deadline first

c) list deadline first

d) latest deadline first

Answer: d

Explanation: The LDF or latest deadline first is a scheduling algorithm which is proposed by Lawler.

11. Which algorithm is non-preemptive and can be used with a mono processor?

a) LDF

b) pre-emptive

c) aperiodic

d) LL

Answer: a

Explanation: The latest deadline first or LDF is a non-preemptive scheduling algorithm and can be used with a mono processor whereas LL or least laxity is a preemptive scheduling algorithm.

12. Which algorithm requires the periodic checks of the laxity?

a) LST

b) LL

c) EDD

d) EFD

Answer: b

Explanation: The LL scheduling algorithm requires the knowledge of the execution times and the periodic check of the laxity.

13. Who developed the heuristic algorithm?

a) Stankovic and Ramamritham

b) Stankovic and Lawler

c) Lawler

d) Stankovic

Answer: a

Explanation: The heuristic algorithm is developed by Stankovic and Ramamritham in 1991.

14. Which algorithm can be used if the preemptive is not allowed?

a) heuristic algorithm

b) LL

c) EDD

d) LST

Answer: a

Explanation: The heuristic algorithm was proposed by Stankovic and Ramamritham in 1991 can be used if the preemption is not allowed.

15. Deadline interval – execution time =

a) laxity

b) execution time

c) deadline interval

d) period

Answer: a

Explanation: The laxity is defined as the deadline interval minus the execution time. It is also known as the slack.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Periodic Scheduling”.


1. The execution of the task is known as

a) process

b) job

c) task

d) thread

Answer: b

Explanation: The execution of the task is known as the job. The time for both the execution of the task and the corresponding job is same.

2. Which scheduling algorithm is can be used for an independent periodic process?

a) EDD

b) LL

c) LST

d) RMS

Answer: d

Explanation: The RMS os rate monotonic scheduling is periodic scheduling algorithm but EDD, LL, and LST are aperiodic scheduling algorithm.

3. What is the relationship between the priority of task and their period in RMS?

a) decreases

b) increases

c) remains unchanged

d) linear

Answer: a

Explanation: The priority of the task decreases monotonically with respect to their period in the rate monotonic scheduling, that is, the task with the long period will get a low priority but task with the short period will get a high priority.

4. Which of the following uses a preemptive periodic scheduling algorithm?

a) Pre-emptive scheduling

b) RMS

c) LL

d) LST

Answer: b

Explanation: The rate monotonic scheduling is a periodic scheduler algorithm which follows a preemptive algorithm. LL is also preemptive scheduling but it is aperiodic scheduling algorithm.

5. Which of the following is based on static priorities?

a) Periodic EDF

b) RMS

c) LL

d) Aperiodic EDF

Answer: b

Explanation: The rate monotonic scheduling is a periodic scheduler algorithm which follows a preemptive algorithm and have static priorities. EDF and LL have dynamic priorities.

6. How many assumptions have to meet for a rate monotonic scheduling?

a) 3

b) 4

c) 5

d) 6

Answer: d

Explanation: The rate monotonic scheduling has to meet six assumptions. These are: All the tasks should be periodic, all the tasks must be independent, the deadline should be equal to the period for all tasks, the execution time must be constant, the time required for the context switching must be negligible, it should hold the accumulation utilization equation.

7. Which of the following can be applied to periodic scheduling?

a) EDF

b) LL

c) LST

d) EDD

Answer: a

Explanation: The earliest deadline first can be applied both to the periodic and aperiodic scheduling algorithm. But LL, LST, and EDD are aperiodic scheduling. It is not applicable to the periodic scheduling.

8. Which of the following periodic scheduling is dynamic?

a) RMS

b) EDF

c) LST

d) LL

Answer: b

Explanation: The EDF or the earliest deadline first is a periodic scheduling algorithm which is dynamic but RMS or rate monotonic scheduling is the periodic algorithm which is static. The LL and LST are aperiodic scheduling algorithm.

9. Which of the following do the sporadic events are connected?

a) Interrupts

b) NMI

c) Software interrupt

d) Timer

Answer: a

Explanation: The sporadic events are connected to the interrupts thereby execute them immediately as possible since the interrupt priority is the highest in the system.

10. Which of the following can execute quickly, if the interrupt priority is higher in the system?

a) EDD

b) Sporadic event

c) LL

d) Aperiodic scheduling

Answer: b

Explanation: The sporadic events are connected to the interrupts and execute them immediately because the interrupt priority is the highest priority level in the system.

11. Which of the following are used to execute at regular intervals and check for ready sporadic tasks?

a) sporadic task server

b) sporadic task client

c) sporadic event application

d) sporadic register

Answer: a

Explanation: The special sporadic task servers are used that execute at regular intervals and check for ready sporadic tasks which improve the predictability of the whole system.

12. How is a sporadic task can turn into a periodic task?

a) scheduling algorithm

b) sporadic task event

c) sporadic register

d) sporadic task server

Answer: d

Explanation: The special sporadic task servers execute at regular intervals and check for ready sporadic tasks and by this, sporadic tasks are essentially turned into periodic tasks which can improve the predictability of the whole system.

13. Which of the following is more difficult than the scheduling independent task?

a) scheduling algorithm

b) scheduling independent task

c) scheduling dependent task

d) aperiodic scheduling algorithm

Answer: c

Explanation: The scheduling dependent task is more difficult than the independent scheduling task. The problem of deciding whether or not a schedule exists for a given set of dependent tasks and a given deadline is NP-complete.

14. Which scheduling is the basis for a number of formal proofs of schedulability?

a) LL

b) RMS

c) LST

d) EDD

Answer: b

Explanation: The rate monotonic scheduling which is an independent scheduling algorithm form the basis for a number of formal proofs of schedulability.

15. Which of the following is independent scheduling?

a) LL

b) LST

c) EDD

d) RMS

Answer: d

Explanation: The RMS or rate monotonic scheduling is the independent scheduling algorithm which is included in the assumptions of RMS, that is, all tasks should be independent.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Debugging Techniques”.


1. Which allows the parallel development of the hardware and software in the simulation?

a) high-level language simulation

b) low-level language simulation

c) cpu simulator

d) onboard simulator

Answer: a

Explanation: The high-level language simulation allows parallel development of the software and the hardware and when two parts are integrated, that will work. It can simulate I/O using the keyboard as the inputs or task which passes input data for other modules.

2. Which of the following are used to test the software?

a) data entity

b) data entry

c) data table

d) data book

Answer: c

Explanation: In the high-level language simulation, many techniques are used to simulate the system and one such is the data table which contains the data sequences which are used to test the software.

3. Which allows the UNIX software to be ported using a simple recompilation?

a) pSOS+

b) UNIX compatible library

c) pSOS+m

d) pOS+kernel

Answer: b

Explanation: The most of the operating system support or provide the UNIX-compatible library which supports the UNIX software to be ported using a simple recompilation.

4. Which of the following can simulate the processor, memory, and peripherals?

a) input simulator

b) peripheral simulator

c) memory simulator

d) cpu simulator

Answer: d

Explanation: The CPU simulator can simulate the memory, processor, and the peripherals and allow the low-level assembler code and the small HLL programs to be tested without the actual hardware.

5. How many categories are there for the low-level simulation?

a) 2

b) 3

c) 4

d) 5

Answer: a

Explanation: There are two categories for the low-level simulation. The first category simulates the memory system, programming model and can offer simple debugging tools whereas the second category simulation provides timing information based on the number of clocks.

6. Which of the following can simulate the LCD controllers and parallel ports?

a) memory simulator

b) sds

c) input simulator

d) output tools

Answer: b

Explanation: There are certain tools which provide powerful tools for simulation and one such is the SDS which can simulate the processor, memory systems, integrated processor, onboard peripherals such as LCD controllers and parallel ports.

7. Which of the following provides a low-level method of debugging software?

a) high-level simulator

b) low-level simulator

c) onboard debugger

d) cpu simulator

Answer: c

Explanation: The onboard debugger provides a very low-level method of simulating or debugging the software. It usually handles EPROMs which are plugged into the board or a set of application codes by providing a serial connection to communicate with the PC or workstation.

8. Which of the following has the ability to download code using a serial port?

a) cpu simulator

b) high-level language simulator

c) onboard debugger

d) low-level language simulator

Answer: c

Explanation: The onboard debugger has the ability to download code from a floppy disk or by using a serial port.

9. What does the processor fetch from the EPROM if the board is powered?

a) reset vector

b) ready vector

c) start vector

d) acknowledge vector

Answer: a

Explanation: The processor fetches its reset vector from the table which is stored in the EPROM when the board is powered and then starts the initialize the board.

10. Which of the following device can transfer the vector table from the EPROM?

a) ROM

b) RAM

c) CPU

d) peripheral

Answer: b

Explanation: When the board gets powered up, the reset vector from the table stored in the EPROM makes the initialisation of the board and is transferred to the RAM from the EPROM through the hardware where the EPROM memory address is temporarily altered.

11. Which of the following is used to determine the number of memory access in an onboard debugger?

a) timer

b) counter

c) input

d) memory

Answer: b

Explanation: The counter is used to determine a preset number of memory accesses, which is assumed that the table has been transferred by the debugger and the EPROM address can be safely be changed.

12. Which of the following has the ability to use the high-level language functions, instructions instead of the normal address?

a) task level debugging

b) low level debugging

c) onboard debugging

d) symbolic debugging

Answer: d

Explanation: The symbolic debugging has the ability to use high-level language functions, instructions and the variables instead of the normal addresses and their contents.

13. Which of the following debugger works at the operating system level?

a) task level debugging

b) low level debugging

c) onboard debugging

d) symbolic debugging

Answer: a

Explanation: The task level debugging has the ability to works at the operating level or at the particular tasks whereas the low-level debugger cannot set for particular task functions or operations, it can only set a breakpoint at the start of the routine which sends a message.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Debugging Technique:Xray”.


1. Which of the following has a single set of compiler and the debugger tools?

a) Xray

b) onboard debugger

c) emulation

d) high-level simulator

Answer: a

Explanation: The Xray debugging technique is a product from the Microtec which is having a complete set of compiler and debugger tools which will work with the simulator, debugger, emulator and the onboard debugger.

2. Who developed the Xray product?

a) IBM

b) Intel

c) Microtec

d) Motorola

Answer: c

Explanation: The Xray which is a product from the Microtec is having a complete set of compiler and debugger tools.

3. Which part of the Xray can interface with a simulator?

a) emulator

b) debugger

c) simulator

d) onboard debugger

Answer: b

Explanation: The Xray consists of the consistent debugger which can interface the emulator, simulator, task level debugger or onboard debugger.

4. Which can provide the consistent interface to the Xray?

a) emulator

b) simulator

c) memory simulator

d) debugger system

Answer: d

Explanation: The Xray consists of the debugger which interfaces with the emulator, simulator, onboard debugger that provides the consistent interface to the Xray product. This can improve the overall productivity of the product since it does not require any relearning.

5. Which of the following can access the information directly in the Xray?

a) emulator

b) debugger

c) simulator

d) hardware

Answer: c

Explanation: The Xray obtain its debugging information from a variety of sources and how it access these sources. The simulator can access direct information but the emulator can access the information via a serial line or via the ethernet or directly across a shared memory interface.

6. Which of the following access the information through the ethernet in a Xray?

a) simulator

b) debugger

c) onboard debugger

d) emulator

Answer: d

Explanation: The Xray obtain its debugging information from a variety of sources. The emulator can access the information via a serial line or via the ethernet or directly across a shared memory interface and the simulator can access the direct information.

7. Which tools help the Xray allows the software to be developed on the host system?

a) compiler tool

b) simulator tool

c) debugger tool

d) emulator tool

Answer: a

Explanation: The compiler tools allow the software to be developed on the host system and this system does not have to use the same processor as the target.

8. Which of the following is ideal for debugging codes at an early stage?

a) compiler

b) debugger

c) simulator

d) emulator

Answer: c

Explanation: There are a variety of ways for executing the codes. The simulator provides an ideal way for debugging the codes at an early stage, that is before the hardware is available and it can allow the software to proceed in parallel with the hardware.

9. How can we extend the power of Xray?

a) Xray interface

b) Xray memory

c) Xray input

d) Xray peripheral

Answer: a

Explanation: The power of the Xray product can be extended by the Xray interface method from the operating system debugger.

10. Which of the following uses the Xray interface method to provide the debugging interface?

a) pSOS+m

b) pSOS

c) pSOS+

d) NAP

Answer: c

Explanation: The pSOS+ uses the Xray interface method to provide the debugging interfaces which can extend the power of the Xray.

11. How is the processor enter into a BDM state?

a) BDM signal

b) Start signal

c) BDM acknowledge signal

d) Start signal of the processor

Answer: a

Explanation: The assertion of the BDM signal or by executing the special BDM instruction, the processor enter into the BDM state and when the processor enters into the BDM mode, low-level microcode takes the processor which allows the breakpoint to be set, registers to be accessed and so on.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Emulation Techniques”.


1. What does ICE stand for?

a) in-circuit emulation

b) in-code EPROM

c) in-circuit EPOM

d) in-code emulation

Answer: a

Explanation: The ICE or in-circuit emulation is one the traditional method used to emulate the processor in the embedded system so that the software can be downloaded and can be debugged in situ in the end application.

2. Which of the following is a traditional method for emulating the processor?

a) SDS

b) ICE

c) CPU simulator

d) Low-level language simulator

Answer: b

Explanation: The SDS is one of the simulation tool used in the embedded systems. CPU simulator and the low-level simulator are the other kinds of the simulator used in the embedded system design.

3. Which of the following does not have the ability to get hundred individual signal cables into the probe in the emulation technique?

a) OnCE

b) BDM

c) ICE

d) JTAG

Answer: c

Explanation: The in-circuit emulation does not have the ability to get a hundred individual signal cables into the probe. This problem comes under the physical limitation of the probe, that is as the density of the processor increases the available sockets which provide good electrical contacts is becoming harder which causes a restriction to the probe.

4. What does JTAG stand for?

a) joint tag address group

b) joint test address group

c) joint test access group

d) joint test action group

Answer: d

Explanation: The JTAG is a joint test action group which is an electronics industry association which developed the interfacing port that is standardised for testing the devices.

5. Which of the following allows access to all the hardware within the system?

a) debugger

b) JTAG

c) onboard debugger

d) simulator

Answer: b

Explanation: The JTAG can access all the hardware within the system. They provide a way of taking over the pins of a device and allows the different bit patterns to be imposed on the pins which allow other circuits to be tested with the imposed pins.

6. Which of the following works by using a serial port?

a) Simulator

b) JTAG

c) BDM

d) OnCE

Answer: b

Explanation: The JTAG works by using a serial port and clocking data into a shift register and the output of the shift register drives the pins under the control of the port.

7. What is meant by OnCE?

a) on-chip emulation

b) off-chip emulation

c) one-chip emulation

d) once-chip emulation

Answer: a

Explanation: The OnCE is an on-chip emulation which is a debugging facility used in the digital signal processor chips.

8. Which debugging facility is used in the Motorola’s DSP 56x0x family?

a) JTAG

b) ICE

c) OnCE

d) BDM

Answer: c

Explanation: The on-chip emulation provides a debugging facility in the DSP chips. The OnCE is developed for Motorola’s DSP 56x0x family.

9. Which facility provides the provision of the debug ports in the ICE technique?

a) simulator

b) emulator

c) debug support

d) jtag

Answer: c

Explanation: The debugging support to the processor enables the processor to be a single stepped and breakpoint under remote control from a host or the workstation. This facility can provide the provision of the debug ports.

10. How the additional registers are accessed in the OnCE?

a) parallel port

b) serial port

c) jtag

d) address register

Answer: b

Explanation: The on-chip emulation can access additional registers by using a special serial port within the device that provides control over the processor and access to its internal registers.

11. Which of the following emulators can provide its own in circuit emulation facility?

a) Simulator

b) Debugger

c) SDS

d) OnCE

Answer: d

Explanation: Every system can provide its own in circuit emulation facilities by hooking the port to an interface port in a workstation or in the PC while connecting the OnCE port to an external connector.

12. What does BDM stand for?

a) background debug mode

b) basic debug mode

c) basic debug microcode

d) background decode mode

Answer: a

Explanation: The BDM or background debug mode is similar to the on-chip emulator with a slight difference. BDM is provided on the Motorola MC683xx series of processors and for the 8-bit microcontroller like MC68HC12 etc.

13. Which emulator is used in MC68HC12?

a) JTAG

b) BDM

c) On-CE

d) SDS

Answer: b

Explanation: The BDM or the background debug mode is provided on the Motorola MC683xx series of processors and for several 8-bit microcontrollers. One such microcontroller is the MC68HC12.

14. Which of the following takes the processor, when the processor enters the BDM mode?

a) address code

b) high-level microcode

c) low-level microcode

d) data code

Answer: c

Explanation: When the processor enters into the BDM mode, low-level microcode takes the processor which allows the breakpoint to be set, registers to be accessed and so on.

15. Which of the following has the additional circuitry which supports the background debug mode?

a) memory

b) input

c) peripheral

d) processor

Answer: d

Explanation: The processor has the additional circuitry which can provide special support for the background debug mode and is under the control of the remote system connected to its BDM port.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Buffers”.


1. Which of these is an area for temporary memory storage?

a) buffer

b) register

c) table

d) flag

Answer: a

Explanation: The buffer is an area that is used to store data temporarily which can be used to compensate the timing problems.

2. Which of the following can be used as a collection point of data?

a) register

b) buffer

c) flag register

d) accumulator

Answer: b

Explanation: The buffer can be used as a collection point for data, that is all the important information can be collected and organised before processing.

3. Which device can compensate for the timing problems between the software?

a) index

b) register

c) buffer

d) memory

Answer: c

Explanation: The buffer is used to store data temporarily which can be used to compensate the timing problems between the software and it can also be used as a collection point for data, that is all the important information can be collected and organised before processing.

4. What do a buffer consist of?

a) memory and register

b) memory and peripheral

c) memory and flag register

d) memory and pointer

Answer: d

Explanation: The buffer consists of a pointer and memory which can be used to locate the next piece of data to be removed or accessed from the buffer.

5. Which of the following is a condition for buffer overrun?

a) cannot accept data

b) cannot receive data

c) cannot provide data

d) can provide data

Answer: a

Explanation: The buffer involves two conditions. These are the buffer overrun condition and the buffer underrun condition. If the buffer cannot accept any more data, it is said to be buffer overrun.

6. What is the state of the buffer if it asked for data and cannot provide it?

a) overrun

b) underrun

c) remains unchanged

d) beyond overrun

Answer: b

Explanation: The buffer is said to be overrun if the buffer cannot accept any more data and said to be underrun if it asked for data but not able to provide it.

7. Which of the following can remove data from the buffer?

a) memory

b) ram

c) pointer

d) slack

Answer: c

Explanation: The data can be removed from the buffer using a pointer. The pointer locates the next value and can move the data from the buffer and is moved to the next location by incrementing its value by the number of words or bytes.

8. How many bits does a 32-bit processor can access?

a) 32-bit char

b) 32-bit word

c) 32-bit double

d) 32-bit double word

Answer: b

Explanation: The 32-bit processor can access 32-bit word and hence the pointer is incremented by one.

9. What occurs first if data is stored in the buffer?

a) speed increases

b) linear shoot

c) overshoot

d) delay

Answer: d

Explanation: When the data is stored in the buffer, at first there will be a delay and the subsequent data is received from the buffer. This delay is known as buffer latency.

10. Which of the following defines the earliest information that is passed through the buffer?

a) buffer latency

b) memory

c) pointer

d) peripheral

Answer: a

Explanation: The buffer latency determines the earliest information that passes through the buffer and any response to that information will be delayed by the buffer latency irrespective of how fast the processor is.

11. Which of the following possesses a problem for data streams on the real-time operating system?

a) pointer

b) memory

c) latency

d) processor

Answer: c

Explanation: The latency will be a problem for the real-time operating system such as the digital audio system which must have a consistent and regular stream of data.

12. Which of the following determines the time to take a simple sample?

a) buffer

b) latency

c) pointer

d) memory

Answer: b

Explanation: The sampling is performed on a regular basis in which the filtering takes less time than the interval between the sample and this does not need a buffering and it will have very low latency. Each sample is received, processed and stored and the latency is the time take a single sample.

13. How is a stack created?

a) slack and pointer

b) stack and memory

c) memory and a pointer

d) memory and a register

Answer: d

Explanation: The slack is created in the same way as the buffer does, that is by using a memory and a pointer. The control associated with the buffer or memory is a register which acts as an address pointer.

14. Which of the following acts as an address pointer?

a) memory

b) pointer

c) stack

d) register

Answer: d

Explanation: The control associated with the buffer or memory is a register which acts as an address pointer.

15. Which of the following possesses an issue while concerning the memory size of the buffer?

a) digital signal processor

b) microprocessor

c) memory

d) pointer

Answer: a

Explanation: The digital signal processor with on-chip memory and the microcontroller possesses an issue on concerning the memory size of the buffer with small amounts of RAM. But with the large system, this is not a major issue.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Types of Buffers”.


1. Which of the buffers has a single piece of linear contiguous memory?

a) circular buffer

b) linear buffer

c) directional buffer

d) double buffer

Answer: b

Explanation: The linear buffer is contiguous memory which is a single piece memory that is controlled by the pointers whose address increments linearly.

2. Which buffer will lose data when it is full?

a) linear buffer

b) circular buffer

c) directional buffer

d) double buffer

Answer: a

Explanation: The linear buffer has a single piece of contiguous memory which is controlled by the pointers whose address increments linearly and it will lose data when it is full and fail to provide data when it is empty.

3. Which of the following buffers loses the incoming data when it is full?

a) circular buffer

b) double buffer

c) linear buffer

d) directional buffer

Answer: c

Explanation: The linear buffer will lose the incoming data when full such that the data it contains become older, which is known as the overrun condition.

4. Which state of the linear buffer will provide old data, when it is empty?

a) overrun

b) critical timing

c) peak overshoot

d) underrun

Answer: d

Explanation: In the linear buffer, when it is empty it will provide the old data, usually the last entry so that the processor will continue to process the incorrect data potentially, and this condition is known as underrun.

5. Which state of the linear buffer loses its incoming data when full?

a) underrun

b) overrun

c) critical time

d) pointer

Answer: b

Explanation: In the overrun condition, the linear buffer will lose the incoming data when the buffer is filled and the data it contains become older.

6. Which technique can solve the errors in the linear buffer?

a) low water mark

b) high water mark

c) low and high water mark

d) pointer

Answer: c

Explanation: The errors in the linear buffering include the loss of data especially during the regular sampling which can be avoided by the pointers that are checked against certain values and this result is used for fetching more data. These points are known as the low water mark and the high water mark.

7. Which of the following is similar to the high and low water marks at the coast?

a) minimum and maximum water level

b) low and high water mark

c) small and big water mark

d) medium and high water mark

Answer: b

Explanation: There are some errors in the linear buffering which includes the loss of data especially in the regular sampling. This can be avoided by the pointers that are checked against certain values and the result is used to fetch more data. These points are known as the low water mark and the high water mark. It is named so because it is similar to the high and low water marks seen at the coast which indicates the maximum and minimum levels that the tidal water will fall and rise.

8. Which of the following determines the number of entries in the buffer?

a) low water mark

b) high water mark

c) low and high water mark

d) small and big water mark

Answer: a

Explanation: The number of entries below the low water mark determines the number of entries the buffer has and the amount of time which is available to fill the buffer before empties and the condition is known as underrun.

9. Which of the following determines the number of empty entries?

a) low water tank

b) high water tank

c) small water tank

d) big water tank

Answer: b

Explanation: The high water tank measures the number of empty entries, that is the number of empty entries above the high water tank determines the length of time which is available to stop the filling of the buffer and it can prevent the data loss through overrunning.

10. In which case, the buffer is used by two software task?

a) single buffer

b) linear buffer

c) double buffer

d) directional buffer

Answer: a

Explanation: In the single buffer, the buffer is used by two software tasks to insert or extract information. The problem with this buffer is that the water level is above or below, and the free space that is used to fill the buffer does not lie in the correct location.

11. Which buffer is important for the signal data?

a) double buffer

b) single buffer

c) linear buffer

d) directional buffer

Answer: d

Explanation: The directional buffer is used for the signal data or for the data which is sampled periodically. The data must be kept in the same order in order to preserve it in chronological order.

12. Which of the following uses two buffers?

a) linear buffer

b) single buffer

c) double buffer

d) directional buffer

Answer: c

Explanation: The double buffer uses buffers as its name suggest, one buffer is for filling and the other buffer is for extraction.

13. Which of the following uses a single low water tank and a next data pointer?

a) single buffer

b) double buffer

c) directional buffer

d) linear buffer

Answer: a

Explanation: The single buffer uses a single low water tank and a next data pointer. The next data pointer is used for accessing the next entry that should be extracted.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Buffer Exchange”.


1. Which of the following allows the multiple tasks to process data simultaneously?

a) single buffer

b) double buffer

c) buffer exchange

d) directional buffer

Answer: c

Explanation: The buffer exchange allows the multiple tasks to process simultaneously without having to have control structures to supervise access and it is also used to simplify the control code.

2. Which buffering mechanism is common to the SPOX operating system?

a) buffer exchange

b) single buffer

c) linear buffer

d) directional buffer

Answer: a

Explanation: The buffer exchange can support the SPOX operating system which is used for the digital signal processors and it is easy to implement.

3. Which buffers exchange the empty buffers for full ones?

a) single buffer

b) buffer exchange

c) directional buffer

d) double buffer

Answer: b

Explanation: The buffer exchange can be used for exchanging the empty buffers with the full ones. It will have more than two buffers.

4. Which process takes place when the buffer is empty?

a) read

b) write

c) read and write

d) memory access

Answer: a

Explanation: The buffer exchange will contain the data in case of the writing process but the buffer will be emptied in the case of the read cycle.

5. Which process takes place when the buffer contains data?

a) read

b) read and write

c) acknowledge

d) write

Answer: d

Explanation: The buffer will be emptied in the case of the readin process and it will contain the data in case of the writing process.

6. Which of the following does not need to have a semaphore?

a) double buffer

b) single buffer

c) buffer exchange

d) directional buffer

Answer: c

Explanation: There are many advantages over the buffer exchange. One such is that it will not have a semaphore to control any shared memory or buffers.

7. Which buffer can assimilate a large amount of data before processing?

a) single buffer

b) double buffer

c) multiple buffers

d) directional buffer

Answer: c

Explanation: The requesting task can use multiple buffers which can assimilate large amounts of data before processing. This can be considered one of the advantages of the buffer exchange.

8. Which can reduce the latency?

a) partial filling

b) complete filling

c) no filling

d) multiple buffers

Answer: a

Explanation: The latency is introduced because of the size of the buffer. The partial filling of data can be used to reduce the latency but it requires some additional control signal.

9. Which of the following can indicate when the buffer is full or ready for collection?

a) intra-task communication

b) inter-task communication

c) memory task communication

d) peripheral task communication

Answer: b

Explanation: The level of the inter-task communication can indicate the buffer status, that is whether it is full or ready for collection.

10. What solution can be done for the inefficiency in the memory usage of small data?

a) same size buffer

b) single buffer

c) variable size buffer

d) directional buffer

Answer: c

Explanation: The buffer exchange becomes inefficient while concerning the memory usage for small and the simple data. In order to solve this problem, variable size buffers can be used but this requires a more complex operation to handle the length of the valid data.

11. Which processor has a different segment buffer?

a) 8051

b) 8086

c) ARM

d) MC68HC11

Answer: b

Explanation: The 8086 has a segmented architecture where the buffers are having a different segment. In such processors, the device drive is running in the supervisor mode, requesting task in the user mode and so on.

12. Which of the following can combine buffers in a regular and methodical way using pointers?

a) buffer exchange

b) directional buffer

c) linked lists

d) double buffer

Answer: c

Explanation: The linked lists are the way of combining buffers in a methodical way and regular method by using the pointers to point the next entry in the list. This can be maintained by adding an entry to the which contains the address of the next buffer.

13. Which entry will have a special value in the linked list?

a) first entry

b) last entry

c) second entry

d) second last entry

Answer: b

Explanation: The last entry will have a special value that indicates that the entry is the last one but the first entry uses the pointer entry to locate the position.

14. Which entry can use the pointer in the linked list?

a) first entry

b) last entry

c) second entry

d) third entry

Answer: a

Explanation: The first entry of the single linked list will use the pointer entry to point the location of the second entry and so on. The last entry will have a special value that indicates that the entry is the last one.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Buffer Memory”.


1. How a buffer memory allocate its memory through the linker?

a) statically

b) dynamically

c) linearly

d) non-linearly

Answer: a

Explanation: The buffer memory can be allocated mainly in two ways, statically and dynamically. Statically, the memory is allocated through the linker and dynamically it can allocate memory during runtime by calling an operating system.

2. How did a buffer memory allocate in the runtime?

a) linearly

b) non-linearly

c) statically

d) dynamically

Answer: d

Explanation: The buffer memory allocation is done in two ways, statically and dynamically. Dynamically, it can allocate memory during runtime by calling an operating system.

3. Which allocation requires the memory to be defined before building the application?

a) dynamic allocation

b) static allocation

c) linear allocation

d) straight allocation

Answer: b

Explanation: The static allocation requires the memory to be defined before building the application and allocates the memory through the special directives at the assembler level.

4. What factor depends on the allocation of buffer memory?

a) nature

b) size

c) variable type and definition

d) variable size and type

Answer: c

Explanation: The amount of allocated buffer memory depends on the variable type and the definition, the strings and the character arrays are the most commonly used types.

5. Which are the system calls which are used by the UNIX operating system?

a) malloc

b) unmalloc

c) malloc and unmalloc

d) proc and return

Answer: c

Explanation: The malloc and the unmalloc are the system calls which is used by the UNIX operating system which allocates the memory dynamically and returns it.

6. Which is the counterpart of the malloc?

a) unmalloc

b) proc

c) struc

d) return

Answer: a

Explanation: The malloc and unmalloc are the system calls in which the unmalloc is the counterpart of the malloc.

7. How is the UNIX operating system allocates its memory?

a) statically

b) linearly

c) non linearly

d) dynamically

Answer: d

Explanation: The malloc and the unmalloc are the system calls which is used by the UNIX operating system which allocates the memory dynamically and returns it.

8. Which term is used to describe a bug within the memory system?

a) memory leakage

b) buffer memory

c) system call

d) register leakage

Answer: a

Explanation: The memory leakage is used to describe the bug within the memory system.

9. What are the common errors that are seen in memory leakage?

a) memory size

b) memory type

c) stack frame error

d) stack register

Answer: c

Explanation: The stack frame errors are the common errors which are seen in the memory leakage and it is caused by the stack overflowing of its allocated memory space and the system call function failure.

10. How the stack frame errors are caused?

a) stack overflow

b) underrun

c) overrun

d) timing

Answer: a

Explanation: There are certain common errors called the stack frame errors which are responsible for the memory leakage and it is due to the stack overflowing of its allocated memory space and the system call function failure.

11. Which of the following clean up the stack?

a) interrupt handler

b) processor

c) exception handler

d) memory handler

Answer: c

Explanation: The exception handler cleans up the stack memory before returning to the previous executing software thread or the generic handler.

12. Which of the following stores the context of the exception?

a) stack

b) register

c) ROM

d) RAM

Answer: a

Explanation: The exception handler is the one which clean up the stack memory before returning to the previous executing software thread and the ROM stores the context of exception in the stack automatically or as a part of the exception routine.

13. Which of the following contains the return information of the stack?

a) table

b) vector

c) frame

d) block

Answer: c

Explanation: The stack contains certain frames which are used to store the return information of the stack and thus the frame need to be removed by adjusting the stack pointer accordingly. Normally this is done to avoid the memory leakage.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Introduction to Software and Hardware Implementation”.


1. Which of the following allows the reuse of the software and the hardware components?

a) platform based design

b) memory design

c) peripheral design

d) input design

Answer: a

Explanation: The platform design allows the reuse of the software and the hardware components in order to cope with the increasing complexity in the design of embedded systems.

2. Which of the following is the design in which both the hardware and software are considered during the design?

a) platform based design

b) memory based design

c) software/hardware codesign

d) peripheral design

Answer: c

Explanation: The software/hardware codesign is the one which having both hardware and software design concerns. This will help in the right combination of the hardware and the software for the efficient product.

3. What does API stand for?

a) address programming interface

b) application programming interface

c) accessing peripheral through interface

d) address programming interface

Answer: b

Explanation: The platform-based design helps in the reuse of both the hardware and the software components. The application programming interface helps in extending the platform towards software applications.

4. Which activity is concerned with identifying the task at the final embedded systems?

a) high-level transformation

b) compilation

c) scheduling

d) task-level concurrency management

Answer: d

Explanation: There are many design activities associated with the platforms in the embedded system and one such is the task-level concurrency management which helps in identifying the task that needed to be present in the final embedded systems.

5. In which design activity, the loops are interchangeable?

a) compilation

b) scheduling

c) high-level transformation

d) hardware/software partitioning

Answer: c

Explanation: The high-level transformation is responsible for the high optimizing transformations, that is, the loops can be interchanged so that the accesses to array components become more local.

6. Which design activity helps in the transformation of the floating point arithmetic to fixed point arithmetic?

a) high-level transformation

b) scheduling

c) compilation

d) task-level concurrency management

Answer: a

Explanation: The high-level transformation are responsible for the high optimizing transformations, that is, for the loop interchanging and the transformation of the floating point arithmetic to the fixed point arithmetic can be done by the high-level transformation.

7. Which design activity is in charge of mapping operations to hardware?

a) scheduling

b) high-level transformation

c) hardware/software partitioning

d) compilation

Answer: c

Explanation: The hardware/software partitioning is the activity which is in charge of mapping operations to the software or to the hardware.

8. Which of the following is approximated during hardware/software partitioning, during task-level concurrency management?

a) scheduling

b) compilation

c) task-level concurrency management

d) high-level transformation

Answer: a

Explanation: The scheduling is performed in several contexts. It should be approximated with the other design activities like the compilation, hardware/software partitioning, and task-level concurrency management. The scheduling should be precise for the final code.

9. Which of the following is a process of analyzing the set of possible designs?

a) design space exploration

b) scheduling

c) compilation

d) hardware/software partitioning

Answer: a

Explanation: The design space exploration is the process of analyzing the set of designs and the design which meet the specification is selected.

10. Which of the following is a meet-in-the-middle approach?

a) peripheral based design

b) platform based design

c) memory based design

d) processor design

Answer: b

Explanation: The platform is an abstraction layer which covers many possible refinements to a lower level and is mainly follows a meet-in-the-middle approach.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “High Level Optimization”.


1. What does FRIDGE stand for?

a) fixed-point programming design environment

b) floating-point programming design environment

c) fixed-point programming decoding

d) floating-point programming decoding

Answer: a

Explanation: Certain tools are available which are developed for the optimization programmes and one such tool is the FRIDGE or fixed-point programming design environment, commercially made by Synopsys System Studio.

2. Which of the following tool can replace the floating point arithmetic to fixed point arithmetic?

a) SDS

b) FAT

c) VFAT

d) FRIDGE

Answer: d

Explanation: There are certain tools available which are developed for the optimization programmes and one such tool is the FRIDGE or fixed-point programming design environment, commercially made available by Synopsys System Studio. This tool can is used in the transformation program, that is the conversion of floating point arithmetic to the fixed point arithmetic. This is widely used in signal processing.

3. Which programming algorithm is used in the starting process of the FRIDGE?

a) C++

b) JAVA

c) C

d) BASIC

Answer: c

Explanation: The FRIDGE tool uses C programming algorithm in the initial stage and is converted to a fixed-C algorithm which extends C by two extends.

4. In which loop transformation, a single loop is split into two?

a) loop tiling

b) loop fusion

c) loop permutation

d) loop unrolling

Answer: b

Explanation: Many loop transformation are done for the optimization of the program and one such loop transformation is the loop fusion in which a single loop is split and the loop fission includes the merging of the two separate loops.

5. Which loop transformations have several instances of the loop body?

a) loop fusion

b) loop unrolling

c) loop fission

d) loop tiling

Answer: b

Explanation: The loop unrolling is a standard transformation which creates several instances of the loop body and the number of copies of the loop is known as the unrolling factor.

6. The number of copies of a loop is called as

a) rolling factor

b) loop factor

c) unrolling factor

d) loop size

Answer: c

Explanation: The number of copies of the loop is known as the unrolling factor and it is a standard transformation that produces instances of the loop body.

7. Which of the following can reduce the loop overhead and thus increase the speed?

a) loop unrolling

b) loop tiling

c) loop permutation

d) loop fusion

Answer: a

Explanation: The loop unrolling can reduce the loop overhead, that is the fewer branches per execution of the loop body, which in turn increases the speed but is only restricted to loops with a constant number of iteration. The unrolling can increase the code size.

8. Which loop transformation can increase the code size?

a) loop permutation

b) loop fusion

c) loop fission

d) loop unrolling

Answer: d

Explanation: The loop unrolling can decrease the loop overhead, the fewer branches per execution of the loop body and this can increase the speed but is only restricted to loops with a constant number of iteration and thus the loop unrolling can increase the code size.

9. Which memories are faster in nature?

a) RAM

b) ROM

c) Scratch pad memories

d) EEPROM

Answer: c

Explanation: As the memory size decreases, it is faster in operation, that is the smaller memories are faster than the larger memories. The small memories are caches and the scratch pad memories.

10. Which loop transformation reduces the energy consumption of the memory systems?

a) loop permutation

b) loop tiling

c) loop fission

d) loop fusion

Answer: b

Explanation: The loop tiling can reduce the energy the consumption of the memory systems.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Hardware or Software Partitioning”.


1. What does COOL stand for?

a) coprocessor tool

b) codesign tool

c) code tool

d) code control

Answer: b

Explanation: The COOL is the codesign tool which is one of the optimisation technique for partitioning the software and the hardware.

2. How many inputs part does COOL have?

a) 2

b) 4

c) 5

d) 3

Answer: d

Explanation: The codesign tool consists of three input parts. These are target technology, design constraints and the behaviour and each input follows different functions. The target technology comprises the information about the different hardware platform components available within the system, design constraints are the second part of the input which contains the design constraints, and the behaviour part is the third input which describes the required overall behaviour.

3. Which part of the COOL input comprises information about the available hardware platform components?

a) target technology

b) design constraints

c) both behaviour and design constraints

d) behaviour

Answer: a

Explanation: The codesign tool consists of three input parts which are described as target technology, design constraints and the behavior. Each input does different functions. The target technology comprises information about the different hardware platform components available within the system.

4. What does the second part of the COOL input comprise?

a) behaviour and target technology

b) design constraints

c) behaviour

d) target technology

Answer: b

Explanation: The second part of the COOL input comprises of the design constraints such as the latency, maximum memory size, required throughput or maximum area for application-specific hardware.

5. What does the third part of the COOL input comprise?

a) design constraints and target technology

b) design constraints

c) behaviour

d) target technology

Answer: c

Explanation: The codesign tool consists of three input parts and the third part of the COOL input describes the overall behaviour of the system. The hierarchical task graphs are used for this.

6. How many edges does the COOL use?

a) 1

b) 2

c) 3

d) 4

Answer: b

Explanation: The codesign tool has 2 edges. These are timing edges and the communication edges. The timing edge provides the timing constraints whereas the communication edge contains the information about the amount of information to be exchanged.

7. Which edge provides the timing constraints?

a) timing edge

b) communication edge

c) timing edge and communication edge

d) special edge

Answer: a

Explanation: The codesign tool has 2 edges. They are timing edges and the communication edges. The timing edge provides the timing constraints.

8. Which edge of the COOL contains information about the amount of information to be exchanged?

a) regular edge

b) timing edge

c) communication edge

d) special edge

Answer: c

Explanation: The codesign tool has 2 edges and these are timing edges and the communication edges. The communication edge contains information about the amount of information to be exchanged.

9. What does Index set KH denotes?

a) processor

b) hardware components

c) task graph nodes

d) task graph node type

Answer: b

Explanation: There is a certain index set which is used in the IP or the integer programming model. The KH denotes the hardware component types.

10. What does Index set L denotes?

a) processor

b) task graph node

c) task graph node type

d) hardware components

Answer: c

Explanation: The index set is used in the IP or the integer programming model. The Index set KP denotes the processor, I denote the task graph nodes and the L denotes the task graph node type.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Compilers”.


1. Which of the following helps in reducing the energy consumption of the embedded system?

a) compilers

b) simulator

c) debugger

d) emulator

Answer: a

Explanation: The compilers can reduce the energy consumption of the embedded system and the compilers performing the energy optimizations are available.

2. Which of the following help to meet and prove real-time constraints?

a) simulator

b) debugger

c) emulator

d) compiler

Answer: d

Explanation: There are several reasons for designing the optimization and compilers and one such is that it could help to meet and prove the real-time constraints.

3. Which of the following is an important ingredient of all power optimization?

a) energy model

b) power model

c) watt model

d) power compiler

Answer: b

Explanation: Saving energy can be done at any stage of the embedded system development. The high-level optimization techniques can reduce power consumption and similarly compiler optimization also can reduce the power consumption and the most important thing in power optimization are the power model.

4. Who proposed the first power model?

a) Jacome

b) Russell

c) Tiwari

d) Russell and Jacome

Answer: c

Explanation: Tiwari proposed the first power model in the year 1974. The model includes the so-called bases and the inter-instruction instructions. Base costs of the instruction correspond to the energy consumed per instruction execution when an infinite sequence of that instruction is executed. Inter instruction costs model the additional energy consumed by the processor if instructions change.

5. Who proposed the third power model?

a) Tiwari

b) Russell

c) Jacome

d) Russell and Jacome

Answer: d

Explanation: The third model was proposed by Russell and Jacome in the year 1998.

6. Which compiler is based on the precise measurements of two fixed configurations?

a) first power model

b) second power model

c) third power model

d) fourth power model

Answer: c

Explanation: The third model was proposed by Russell and Jacome in the year 1998 and is based on the precise measurements of the two fixed configurations.

7. What does SPM stand for?

a) scratch pad memories

b) sensor parity machine

c) scratch pad machine

d) sensor parity memories

Answer: a

Explanation: The smaller memories provide faster access and consume less energy per access and SPM or scratch pad memories is a kind of small memory which access fastly and consume less energy per access and it can be exploited by the compiler.

8. Which model is based on precise measurements using real hardware?

a) encc energy-aware compiler

b) first power model

c) third power model

d) second power model

Answer: a

Explanation: The encc-energy aware compiler uses the energy model by Steinke et al. it is based on the precise measurements of the real hardware. The power consumption of the memory, as well as the processor, is included in this model.

9. What is the solution to the knapsack problem?

a) many-to-many mapping

b) one-to-many mapping

c) many-to-one mapping

d) one-to-one mapping

Answer: d

Explanation: The knapsack problem is associated with the size constraints, that is the size of the scratch pad memories. This problem can be solved by one-to-one mapping which was presented in an integer programming model by Steinke et al.

10. How can one compute the power consumption of the cache?

a) Lee power model

b) First power model

c) Third power model

d) CACTI

Answer: d

Explanation: The CACTI can compute the power consumption of the cache which is proposed by Wilton and Jouppi in the year 1996.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “The Compilation Process”.


1. Which of the following function can interpret data in the C language?

a) printf

b) scanf

c) proc

d) file

Answer: b

Explanation: The scanf and printf are the well-known functions in the C language which is used to interpret data and print data respectively.

2. What is the first stage of the compilation process?

a) pre-processing

b) post-processing

c) compilation

d) linking

Answer: a

Explanation: The pre-processing involves the first stage of the compilation process in which the include files are added. This file defines the standard functions, constants etc and the output is fed to the compiler.

3. Which of the following produces an assembler file in the compilation process?

a) pre-processor

b) assembler

c) compiler

d) post-processing

Answer: c

Explanation: The output of the pre-processor is given to the compiler in which it produces an assembler file from the instruction codes of the processor.

4. Which file is converted to an object file?

a) hex file

b) decoded file

c) coded file

d) assembly file

Answer: d

Explanation: The output of the pre-processor is given to the compiler which produces an assembler file from the instruction codes of the processor and this possesses libraries. The assembly file is then converted into the object file and this contains the hexadecimal coding.

5. Which of the following contains the hexadecimal coding?

a) object file

b) assembly file

c) coded file

d) decoded file

Answer: a

Explanation: The output of the pre-processor is given to the compiler which produces an assembler file from the instruction codes of the processor and this possesses libraries and then these assembly file is converted into the object file and this possesses the coding of hexadecimal.

6. Which of the following processes the source code before it goes to the compiler?

a) compiler

b) simulator

c) pre-processor

d) emulator

Answer: c

Explanation: The pre-processor is responsible for processing the source code before it goes to the compiler and this in turn allows the programmer to define variable types, constants, and much other information.

7. Which of the following allows the programmer to define constants?

a) pre-processor

b) compiler

c) emulator

d) debugger

Answer: a

Explanation: The pre-processor processes the source code before it goes to the compiler and this allows the programmer to define variable types, constants, and much other information.

8. Which statement replaces all occurrences of the identifier with string?

a) # define identifier string

b) # include

c) # define MACRO

d) # ifdef

Answer: a

Explanation: # define statement can replace all occurrences of the identifier with string. Similarly, it is able to define the constants, which also make the code easier to understand.

9. Which of the following has the include file?

a) emulator

b) debugger

c) pre-processor

d) simulator

Answer: c

Explanation: The pre-processor produces the source code before it goes to the compiler and this allows the programmer to define variable types, constants, and much other information. This pre-processor also has to include files and combines them into the program source.

10. Which statement is used to condense the code to improve the eligibility?

a) # define MACRO

b) # include

c) if

d) else-if

Answer: a

Explanation: The # define MACRO statement is used to condense the code for improving the code eligibility or for space reasons.

This set of Embedded Systems Multiple Choice Questions & Answers focuses on “The Compilation Process-II”.


1. Which of the following are header files?

a) #include

b) file

c) struct

d) proc

Answer: a

Explanation: The #include is a header file which defines the standard constants, variable types, and many other functions. This can also include some standard libraries.

2. Which is the standard C compiler used for the UNIX systems?

a) simulator

b) compiler

c) cc

d) sc

Answer: c

Explanation: The cc is the standard C compiler used in the UNIX system. Its command lines can be pre-processed, compiled, assembled and linked to create an executable file.

3. Which compiling option is used to compile programs to form part of a library?

a) -c

b) -p

c) -f

d) -g

Answer: a

Explanation: There are several options for the compilers. The option -c compiles the linking stage and then leaves the object file. This option is used to compile programs to form a part of the library.

4. Which compiling option can be used for finding which part of the program is consuming most of the processing time?

a) -f

b) -g

c) -p

d) -c

Answer: c

Explanation: The -p instructs the compiler to produce codes which count the number of times each routine is called and this is useful for finding the processing time of the programs.

5. Which compiling option can generate symbolic debug information for debuggers?

a) -c

b) -p

c) -f

d) -g

Answer: d

Explanation: The -g generates the symbolic debug information for the debuggers. Without this, the debugger cannot print the variable values, it can only work at the assembler level. The symbolic information is passed through the compilation process and stored in the executable file.

6. Which of the following is also known as loader?

a) locater

b) linker

c) assembler

d) compiler

Answer: b

Explanation: The linker is also known as a loader. It can take the object file and searches the library files to find the routine it calls.

7. Which of the following gives the final control to the programmer?

a) linker

b) compiler

c) locater

d) simulator

Answer: a

Explanation: The linker can give the final control to the programmer concerning how unresolved references are reconciled, where the sections are located in the memory, which routines are used, and so on.

8. Which command takes the object file and searches library files to find the routine calls?

a) simulator

b) emulator

c) debugger

d) linker

Answer: d

Explanation: The linker is also known as a loader. It can take the object file and searches the library files to find the routine it calls. The linker can give the final control to the programmer concerning how unresolved references are reconciled, where the sections are located in the memory, which routines are used, and so on.

9. Which assembler option is used to turn off long or short address optimization?

a) -n

b) -V

c) -m

d) -o

Answer: a

Explanation: The option -o puts the assembler into the file obj file, -V can write the assembler’s version number on the standard error output, -m runs the macro preprocessor on the source file and -n turns off the long or short address optimization.

10. Which assembler option runs the m4 macro preprocessor on the source file?

a) -n

b) -m

c) -V

d) -o

Answer: b

Explanation: The option -o puts the assembler into the file obj file, -V can write the assembler’s version number on the standard error output, -m runs the macro preprocessor on the source file and -n turns off the long or short address optimization.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Introduction to VHDL”.


1. Which of the following language can describe the hardware?

a) C

b) C++

c) JAVA

d) VHDL

Answer: d

Explanation: The VHDL is the hardware description language which describes the hardware whereas the C, C++ and JAVA are software languages.

2. What do VHDL stand for?

a) Verilog hardware description language

b) VHSIC hardware description language

c) very hardware description language

d) VMEbus description language

Answer: b

Explanation: VHDL is the VHSIC hardware description language which was developed by three companies, IBM, Intermetrics and Texas Instruments and the first version of the VHDL is established in the year 1984 and later on the VHDL is standardised by the IEEE.

3. What does VHSIC stand for?

a) very high speed integrated chip

b) very high sensor integrated chip

c) Verilog system integrated chip

d) Verilog speed integrated chip

Answer: a

Explanation: The VHSIC stands for very high speed integrated chip and VHDL was designed in the context of the VHSIC, developed by the department of defence in the US.

4. Each unit to be modelled in a VHDL design is known as

a) behavioural model

b) design architecture

c) design entity

d) structural model

Answer: c

Explanation: Each unit to be modelled in a VHDL design is known as the design entity or the VHDL entity. There are two types of ingredients are used. These are the entity declaration and the architecture declaration.

5. Which of the following are capable of displaying output signal waveforms resulting from stimuli applied to the inputs?

a) VHDL simulator

b) VHDL emulator

c) VHDL debugger

d) VHDL locater

Answer: a

Explanation: The VHDL simulator is capable of displaying the output signal waveforms which results from the stimuli or trigger applied to the input.

6. Which of the following describes the connections between the entity port and the local component?

a) port map

b) one-to-one map

c) many-to-one map

d) one-to-many maps

Answer: a

Explanation: The port map describes the connection between the entity port and the local component. The component is declared by component declaration and the entity ports are mapped with the port mapping.

7. Who proposed the CSA theory?

a) Russell

b) Jacome

c) Hayes

d) Ritchie

Answer: c

Explanation: The CSA theory is proposed by Hayes and this theory is based on the systematic way of building up value sets.

8. Which of the following is a systematic way of building up value sets?

a) CSA theory

b) Bayes theorem

c) Russell’s power mode;

d) first power model

Answer: a

Explanation: The CSA theory is proposed by Hayes. The theory is based on the systematic way of building up value sets, that is the electronics design system uses a variety of value sets, like 2, 3 etc. The goal of developing discrete value sets is to avoid the problems of solving network equations.

9. Which of the following is an abstraction of the signal impedance?

a) level

b) strength

c) size

d) nature

Answer: b

Explanation: The systems contain electrical signals of different strengths and it needs to compute the strength and the logic level resulting from a connection of two or more sources of electrical signals. The strength is the abstraction of the signal impedance.

10. Which of the following is an abstraction of the signal voltage?

a) level

b) strength

c) nature

d) size

Answer: a

Explanation: Most of the systems contain electrical signals of different strengths and levels. The level of the signal is the abstraction of the signal voltage and the strength is the abstraction of the signal impedance.

This set of Embedded Systems online test focuses on “Introduction to VHDL-II”.


1. How many kinds of wait statements are available in the VHDL design?

a) 3

b) 4

c) 5

d) 6

Answer: b

Explanation: There are four kinds of wait statements. These are wait on, wait for, wait until and wait.

2. Which wait statement does follow a condition?

a) wait for

b) wait until

c) wait

d) wait on

Answer: b

Explanation: The wait until follows a condition. The condition may be an arithmetic or logical one and the wait for statement follows time duration, it might be in microseconds or nanoseconds or any other time unit. Similarly, the wait on statement follows a signal list and the wait statement suspends indefinitely.

3. Which wait statement does follow duration?

a) wait for

b) wait

c) wait until

d) wait on

Answer: a

Explanation: The wait for statement follows time duration, it might be in microseconds or nanoseconds or any other time unit.

4. Which of the following is a C++ class library?

a) C++

b) C

c) JAVA

d) SystemC

Answer: d

Explanation: System C is a C++ class library which helps in solving the behavioural, resolution, simulation time problems.

5. Which model of SystemC uses floating point numbers to denote time?

a) SystemC 1.0

b) SystemC 2.0

c) SystemC 3.0

d) SystemC 4.0

Answer: a

Explanation: The SystemC includes several models of the time units. SystemC 1.0 uses floating point numbers which denote time.

6. Which model of SystemC uses the integer number to define time?

a) SystemC 1.0

b) SystemC 2.0

c) SystemC 3.0

d) SystemC 4.0

Answer: b

Explanation: The SystemC includes several models of the time. System 2.0 is an integer model to define time and this model also supports physical units such as microseconds, nanoseconds, picoseconds etc.

7. Which model of the SystemC helps in the communication purpose?

a) SystemC 2.0

b) SystemC 3.0

c) SystemC 1.0

d) SystemC 4.0

Answer: a

Explanation: The SystemC 2.0 provides the channel port and interface ports for the communication purpose.

8. Which C++ class is similar to the hardware description language like VHDL?

a) SystemC

b) Verilog

c) C

d) JAVA

Answer: a

Explanation: The SystemC is a C++ class which is similar to the hardware description languages like VHDL and Verilog. The execution and simulation time in the SystemC is almost similar to the VHDL.

9. What does ESL stand for?

a) EEPROM system level

b) Electronic-system level

c) Electrical system level

d) Electron system level

Answer: b

Explanation: The ESL is electronic-system level and the SystemC is associated with the ESL and TLM. The SystemC is also applied to the architectural exploration, performance modelling, software development and so on.

10. What to TLM stand for?

a) transfer level modelling

b) triode level modelling

c) transaction level modelling

d) transistor level modelling

Answer: c

Explanation: The TLM is transaction-level modelling and the SystemC is associated with the ESL and TLM.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Verilog and System Verilog in Embedded Systems”.


1. Which of the following is standardised as IEEE 1364?

a) C

b) C++

c) FORTRAN

d) Verilog

Answer: d

Explanation: The Verilog is a hardware description language which was developed for modelling hardware and electronic devices. This was later standardised by IEEE standard 1364.

2. Who developed the Verilog?

a) Moorby

b) Thomas

c) Russell and Ritchie

d) Moorby and Thomson

Answer: d

Explanation: The Verilog is a hardware description language which was developed by Moorby and Thomson in 1991 and it was standardised as IEEE standard 1364. The Verilog is modelled for the electronics devices.

3. Which versions of the Verilog is known as System Verilog?

a) Verilog version 3.0

b) Verilog version 1.0

c) Verilog version 1.5

d) Verilog version 4.0

Answer: a

Explanation: The Verilog versions 3.0 and 3.1 is called as the System Verilog. These include several extensions to the Verilog version 2.0.

4. Which of the following is a Verilog version 1.0?

a) IEEE standard 1394-1995

b) IEEE standard 1364-1995

c) IEEE standard 1394-2001

d) IEEE standard 1364-2001

Answer: b

Explanation: The IEEE standard 1364-1995 is the first version of the Verilog and IEEE standard 1394-2001 is the Verilog version 2.0.

5. Which of the following provides multiple-valued logic with eight signal strength?

a) Verilog

b) VHDL

c) C

d) C++

Answer: a

Explanation: The Verilog supports the multiple-valued logic with eight different signal strength but Verilog is less flexible compared to the VHDL, that is, it allows the hardware entities to be instantiated in loops which help to build up a structural description.

6. Which of the following is a superset of Verilog?

a) Verilog

b) VHDL

c) System Verilog

d) System VHDL

Answer: c

Explanation: The System Verilog is a superset of the Verilog. But later on, System Verilog and Verilog has merged into a new IEEE standard 1800-2009.

7. Which hardware description language is more flexible?

a) VHDL

b) Verilog

c) C

d) C++

Answer: a

Explanation: The Verilog is less flexible compared to the VHDL, that is, it allows the hardware entities to be instantiated in loops which help to build up a structural description. But Verilog, on the other hand, focuses more on the built-in features.

8. Which of the following provide more features for transistor-level descriptions?

a) C++

b) C

c) VHDL

d) Verilog

Answer: d

Explanation: The Verilog offers more features than the VHDL but VHDL is more flexible compared to the Verilog. The Verilog can provide transistor-level descriptions but the VHDL cannot provide this description.

9. Which hardware description language is popular in the US?

a) System Verilog

b) System log

c) Verilog

d) VHDL

Answer: c

Explanation: Verilog and VHDL are almost similar in their characteristics and have a similar number of users. The VHDL is more popular in Europe whereas Verilog is more popular in the US.

10. Which hardware description language is more popular in Europe?

a) VHDL

b) System log

c) Verilog

d) C

Answer: a

Explanation: The Verilog and VHDL are hardware description language and these are similar in their characteristics and have a similar number of users. The VHDL is more popular in Europe. The Verilog is more popular in the US.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Levels of Hardware Modelling”.


1. Which of the following is an analogue extension of the VHDL?

a) VHDL-AMS

b) System VHDL

c) Verilog

d) System Verilog

Answer: a

Explanation: The VHDL-AMS is the extension of the VHDL and this includes the analogue and mixed behaviour of the signals.

2. Which of the following support the modelling partial differentiation equation?

a) gate level

b) algorithmic level

c) system level

d) switch level

Answer: c

Explanation: There are a variety of levels for designing the embedded systems and each level has its own language. The system level is one such kind which has many peculiarities with respect to the other levels. The system model denotes the entire embedded system and includes the mechanical as well as the information processing aspects. This also supports the modelling of the partial differential equations, which is a key requirement in the modelling.

3. Which level simulates the algorithms that are used within the embedded systems?

a) gate level

b) circuit level

c) switch level

d) algorithmic level

Answer: d

Explanation: The algorithmic level simulates the algorithm which is used within in the embedded system.

4. Which level model components like ALU, memories registers, muxes and decoders?

a) switch level

b) register-transfer level

c) gate level

d) circuit level

Answer: b

Explanation: The register-transfer level modelling models all the components like the arithmetic and logical unit, memories, registers, muxes, decoders etc and this modelling is always cycled truly.

5. Which of the following is the most frequently used circuit-level model?

a) SPICE

b) VHDL

c) Verilog

d) System Verilog

Answer: a

Explanation: The SPICE is simulation program with integrated circuit emphasis, which is a frequently used circuit-level in the early days. It is used to find the behavior and the integrity of the circuit.

6. Which model includes geometric information?

a) switch-level model

b) layout model

c) gate level model

d) register-transfer level

Answer: b

Explanation: The layout reflects the actual circuit model. It includes the geometric information and cannot be simulated directly since it does not provide the information regarding the behavior.

7. Which model cannot simulate directly?

a) circuit level model

b) switch-level model

c) gate level model

d) layout model

Answer: d

Explanation: The layout model reflects the actual circuit model and this includes the geometric information and this model cannot be simulated directly because it does not provide the information regarding the behavior.

8. Which of the following models the components like resistors, capacitors etc?

a) register-transfer level

b) layout model

c) circuit level model

d) switch-level model

Answer: c

Explanation: The circuit-level model simulation is used for the circuit theory and its components such as the resistors, inductors, capacitors, voltage sources, current sources. This simulation also involves the partial differential equations.

9. Which model uses transistors as their basic components?

a) switch model

b) gate level

c) circuit level

d) layout model

Answer: a

Explanation: The switch model can be used in the simulation of the transistors since the transistor is the very basic component in a switch. It is capable of reflecting bidirectional transferring of the information.

10. Which model is used to denote the boolean functions?

a) switch level

b) gate level model

c) circuit level

d) layout model

Answer: b

Explanation: The gate level model is used to denote the boolean functions and the simulation only consider the behaviour of the gate.

11. Which model is used for the power estimation?

a) gate-level model

b) layout model

c) circuit model

d) switch model

Answer: a

Explanation: The gate level model is used to denote the boolean functions and the simulation only consider the behaviour of the gate. This model is also useful in the power estimation since it provides accurate information about the signal transition probabilities.

12. In which model, the effect of instruction is simulated and their timing is not considered?

a) gate-level model

b) circuit model

c) coarse-grained model

d) layout model

Answer: c

Explanation: The coarse-grained model is a kind of the instruction set level modelling in which only the effect of instruction is simulated and the timing is not considered. The information which is provided in the manual is sufficient for this type of modelling.

13. Which models communicate between the components?

a) transaction level modelling

b) fine-grained modelling

c) coarse-grained modelling

d) circuit level model

Answer: a

Explanation: The transaction level modelling is a type of instruction set level model. This modelling helps in the modelling of components which is used for the communication purpose. It also models the transaction, such as read and writes cycles.

14. Which of the following has a cycle-true set of simulation?

a) switch-level model

b) layout model

c) circuit-level

d) fine-grained model

Answer: d

Explanation: The fine-grained model has the cycle-true instruction set simulation. In this modelling, it is possible to compute the exact number of clock cycles which is required to run an application.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Testing”.


1. Which of the following is a set of specially selected input patterns?

a) test pattern

b) debugger pattern

c) bit pattern

d) byte pattern

Answer: a

Explanation: While testing any devices or embedded systems, we apply some selected inputs which is known as the test pattern and observe the output. This output is compared with the expected output. The test patterns are normally applied to the already manufactured systems.

2. Which is applied to a manufactured system?

a) bit pattern

b) parity pattern

c) test pattern

d) byte pattern

Answer: c

Explanation: For testing any devices or embedded systems, we use some sort of selected inputs which is known as the test pattern and observe the output and is compared with the expected output. These test patterns are normally applied to the manufactured systems.

3. Which of the following is based on fault models?

a) alpha-numeric pattern

b) test pattern

c) bit pattern

d) parity pattern

Answer: b

Explanation: The test pattern generation is normally based on the fault models and this model is also known as the stuck-at model. The test pattern is based on a certain assumption, that is why it is called the stuck-at model.

4. Which is also called stuck-at model?

a) byte pattern

b) parity pattern

c) bit pattern

d) test pattern

Answer: d

Explanation: The test pattern generation is basically based on the fault models and this type of model is also known as the stuck-at model. These test patterns are based on a certain assumption, hence it is known as the stuck-at model.

5. How is the quality of the test pattern evaluated?

a) fault coverage

b) test pattern

c) size of the test pattern

d) number of errors

Answer: a

Explanation: The quality of the test pattern can be evaluated on the basis of the fault coverage. It is the percentage of potential faults that can be found for a given test pattern set, that is fault coverage equals the number of detectable faults for a given test pattern set divided by the number of faults possible due to the fault model.

6. What is DfT?

a) discrete Fourier transform

b) discrete for transaction

c) design for testability

d) design Fourier transform

Answer: c

Explanation: The design of testability or DfT is the process of designing for the better testability.

7. Which of the following is also known as boundary scan?

a) test pattern

b) JTAG

c) FSM

d) CRC

Answer: b

Explanation: The JTAG is a technique for connecting scan chains of several chips and is also known as boundary scan.

8. What does BILBO stand for?

a) built-in logic block observer

b) bounded input bounded output

c) built-in loading block observer

d) built-in local block observer

Answer: a

Explanation: The BILBO or the built-in logic block observer is proposed as a circuit combining, test response compaction, test pattern generation, and serial input/output capabilities.

9. What is CRC?

a) code reducing check

b) counter reducing check

c) counting redundancy check

d) cyclic redundancy check

Answer: d

Explanation: The CRC or the cyclic redundancy check is the error detecting code which is commonly used in the storage device and the digital networks.

10. What is FSM?

a) Fourier state machine

b) finite state machine

c) fast state machine

d) free state machine

Answer: b

Explanation: The FSM is the finite state machine. It will be having a finite number of states and is used to design both the sequential logic circuit and the computer programs. It can be used for testing the scan design in the testing techniques.

11. Which of the following have flip-flops which are connected to form shift registers?

a) scan design

b) test pattern

c) bit pattern

d) CRC

Answer: a

Explanation: All the flip-flop storing states are connected to form a shift register in the scan design. It is a kind of test path.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Risk and Dependability Analysis”.


1. Which is a top-down method of analyzing risks?

a) FTA

b) FMEA

c) Hazards

d) Damages

Answer: a

Explanation: The FTA is Fault tree analysis which is a top-down method of analyzing risks. It starts with damage and comes up with the reasons for the damage. The analysis is done graphically by using gates.

2. What is FTA?

a) free tree analysis

b) fault tree analysis

c) fault top analysis

d) free top analysis

Answer: b

Explanation: The FTA is also known as the Fault tree analysis which is a top-down method of analyzing risks. The analysis starts with damage and comes up with the reasons for the damage. The analysis can be checked graphically by using gates.

3. Which gate is used in the geometrical representation, if a single event causes hazards?

a) AND

b) NOT

c) NAND

d) OR

Answer: d

Explanation: The fault tree analysis is done graphically by using gates mainly AND gates and OR gates. The OR gate is used to represent the single event which is hazardous. Similarly, AND gates are used in the graphical representation if several events cause hazards.

4. Which analysis uses the graphical representation of hazards?

a) Power model

b) FTA

c) FMEA

d) First power model

Answer: b

Explanation: The FTA is done graphically by using gates mainly AND gates and OR gates. The OR gate is used to represent the single event which is hazardous.

5. Which gate is used in the graphical representation, if several events cause hazard?

a) OR

b) NOT

c) AND

d) NAND

Answer: c

Explanation: The fault tree analysis is done graphically by using gates. The main gates used are AND gates and OR gates. The AND gates are used in the graphical representation if several events cause hazards.

6. What is FMEA?

a) fast mode and effect analysis

b) front mode and effect analysis

c) false mode and effect analysis

d) failure mode and effect analysis

Answer: d

Explanation: The FMEA is the failure mode and the effect analysis, in which the analysis starts at the components and tries to estimate their reliability.

7. Which of the following can compute the exact number of clock cycles required to run an application?

a) layout model

b) coarse-grained model

c) fine-grained model

d) register-transaction model

Answer: c

Explanation: The fine-grained model has the cycle-true instruction set simulation. In this modelling, it is possible to compute the exact number of clock cycles which is required to run an application.

8. Which model is capable of reflecting the bidirectional transfer of information?

a) switch-level model

b) gate level

c) layout model

d) circuit-level model

Answer: a

Explanation: The switch model can be used in the simulation of the transistors since the transistor is the very basic component in a switch. It is capable of reflecting bidirectional transferring of the information.

This set of Embedded Systems Multiple Choice Questions & Answers  focuses on “Formal Verification”.


1. What is meant by FOL?

a) free order logic

b) fast order logic

c) false order logic

d) first order logic

Answer: d

Explanation: Many formal verification techniques are used and these are classified on the basis of the logics employed. The techniques are propositional logic, first order logic, and higher order logic. The FOL is the abbreviated form of the first order logic which includes the quantification.

2. What is HOL?

a) higher order logic

b) higher order last

c) highly organised logic

d) higher order less

Answer: a

Explanation: The formal verification techniques are classified on the basis of the logics employed. The techniques are propositional logic, first order logic, and higher order logic. The HOL is the abbreviation of the higher order logic in which the proofs are automated and manually done with some proof support.

3. What is BDD?

a) boolean decision diagram

b) binary decision diagrams

c) binary decision device

d) binary device diagram

Answer: b

Explanation: The binary decision diagram is a kind of data structure which is used to represent the Boolean function.

4. Which formal verification technique consists of a Boolean formula?

a) HOL

b) FOL

c) Propositional logic

d) Both HOL and FOL

Answer: c

Explanation: The propositional logic technique is having the boolean formulas and the boolean function. The tools used in propositional logic is the tautology checker or the equivalence checker which in turn uses the binary decision diagrams which are also known as BDD.

5. Which of the following is also known as equivalence checker?

a) BDD

b) FOL

c) Tautology checker

d) HOL

Answer: c

Explanation: The propositional logic technique consists of the boolean formulas and the boolean function. The tools used in this type of logic is the tautology checker or the equivalence checker which in turn uses the BDD or the binary decision diagrams.

6. Which of the following is possible to locate errors in the specification of the future bus protocol?

a) EMC

b) HOL

c) BDD

d) FOL

Answer: c

Explanation: The model checking was developed using the binary decision diagram and the BDD and it was possible to locate errors in the specification of the future bus protocol.

7. Which of the following is a popular system for model checking?

a) HOL

b) FOL

c) BDD

d) EMC

Answer: d

Explanation: The EMC-system is developed by Clark and it describes the CTL formulas, which is the computational tree logics.

8. What is CTL?

a) computational tree logic

b) code tree logic

c) cpu tree logic

d) computer tree logic

Answer: a

Explanation: The EMC-system is a popular system for model checking which is developed by Clark that describes the CTL formulas, which is also known as computational tree logics. The CTL consist of two parts, a path quantifier, and a state quantifier.