Deck 2: Embedded Systems and Communication Protocols

ملء الشاشة (f)
exit full mode
سؤال
What does an IC that initiate or enable the data transfer on bus can be regarded as, in accordance to the I2c protocol specifications?

A)bus slaves
B)bus master
C)bus drivers
D)bus data carriers
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
______ is a technology that allows telephone calls to be made over computer networks like the Internet.

A)voip
B)gsm
C)modem
D)cdma
سؤال
Which development tool can facilitate the creation and modification of source programs in addition to assembly and higher -level languages?

A)compiler
B)linker
C)assembler
D)editor
سؤال
Which types of an embedded systems involve the coding at a simple level in an embedded 'C', without any necessity of RTOS?

A)sophisticated embedded systems
B)medium scale embedded systems
C)small scale embedded systems
D)all of the above
سؤال
While designing an embedded system, which sub-task oriented process allocates the time steps for various modules that share the similar resources?

A)simulation and validation
B)iteration
C)hardware-software partitioning
D)scheduling
سؤال
The step where in the results stored in the temporary register is transferred into the permanent register is called as ______

A)final step
B)commitment step
C)last step
D)inception step
سؤال
If an exception is raised and the succeeding instructions are executed completely, then the processor is said to have ______

A)exception handling
B)imprecise exceptions
C)error correction
D)none of the mentioned
سؤال
For applications that demand very high data-processing requirements, or if double precision floating point calculation is needed, then best choice will be

A)cortex-m0 processor
B)cortex-m3 processor
C)cortex-m7 processor
D)cortex-m0+ processor
سؤال
Which scheme/ strategy is suitable to establish the communication between the access point (AP) and the infrastructure of LANs?

A)non-reception of frame & necessity of retransmission
B)no necessity of working in duplex mode for the host
C)no necessity to prevent the signal fading
D)all of the above
سؤال
Unauthorised access of information from a wireless device through a bluetooth connection is called _________

A)bluemaking
B)bluestring
C)bluestring.
D)bluesnarfing.
سؤال
Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is numbered 10001. What is the sequence number of the segment if all data is sent in only one segment?

A)10001
B)12001
C)14000
D)12002
سؤال
Bytes of data being transferred in each connection are numbered by TCP. These numbers start with a _________

A)fixed number
B)random sequence of 0's and 1's
C)one
D)sequence of zero's and one's
سؤال
Which of the following are external pins whose logic state can be controlled by the processor to either be a logic zero or logic one is known as

A)analogue value
B)display values
C)binary values
D)time derived digital outputs
سؤال
Which of the following has a quadruple buffered receiver and a double buffered transmitter?

A)intel 8250
B)16450
C)16550
D)mc68681
سؤال
process that is based on IPC mechanism which executes on different systems and can communicate with other processes using message based communication, is called ________

A)local procedure call
B)inter process communication
C)remote procedure call
D)remote machine invocation
سؤال
Which abstraction level undergo the compilation process by converting a sequential program into finite-state machine and register transfers while designing an embedded system?

A)system
B)behaviour
C)rt
D)logic
سؤال
Which characteristics of an embedded system exhibit the responsiveness to the assortments or variations in system's environment by computing specific results for real-time applications without any kind of postponement ?

A)single-functioned characteristic
B)tightly-constraint characteristics
C)reactive & real time characteristics
D)all of the above
سؤال
Which potential mode of operation indicate the frequent sending of byte to the slave corresponding to the reception of an acknowledge signal when it becomes desirable for the master to write to the slave during data transmission in I2C bus?

A)master in master-transmit mode & slave in slave-receive mode
B)slave in slave-transmit mode & master in master-receive mode
C)master in master-transmit mode as well as master-receive mode
D)slave in slave-transmit mode as well as slave-receive mode
سؤال
Which method of multiple secondary communication in TDMA is acquired/adopted by bluetooth especially where data integrity becomes more crucial than avoiding latency?

A)synchronous connection-oriented (sco) link
B)asynchronous connectionless link (acl)
C)both A &B a & b
D)none of the above
سؤال
The upper 128 bytes of an internal data memory from 80H through FFH usually represent ___________.

A)general-purpose registers
B)special function registers
C)stack pointers
D)program counters
سؤال
Which standard govern parallel communications?

A)RS232
B)RS-232a
C)CAT 5
D)IEEE 1284
سؤال
Which common bus specification provides the fastest data transfer rate?

A)VL bus
B)ISA
C)PCI
D)All of the above
سؤال
Devices that use the ____ bus are self-configuring.

A)EISA
B)ISA
C)MCA
D)PCI
سؤال
Which of following is not a valid bus in computer system ?

A)Data Bus
B)Memory Bus
C)Address Bus
D)System Bus
سؤال
The AT bus is also known as the ____ bus.

A)286
B)8-bit ISA
C)16-bit ISA
D)ISA
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 2: Embedded Systems and Communication Protocols
1
What does an IC that initiate or enable the data transfer on bus can be regarded as, in accordance to the I2c protocol specifications?

A)bus slaves
B)bus master
C)bus drivers
D)bus data carriers
bus master
2
______ is a technology that allows telephone calls to be made over computer networks like the Internet.

A)voip
B)gsm
C)modem
D)cdma
voip
3
Which development tool can facilitate the creation and modification of source programs in addition to assembly and higher -level languages?

A)compiler
B)linker
C)assembler
D)editor
editor
4
Which types of an embedded systems involve the coding at a simple level in an embedded 'C', without any necessity of RTOS?

A)sophisticated embedded systems
B)medium scale embedded systems
C)small scale embedded systems
D)all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
5
While designing an embedded system, which sub-task oriented process allocates the time steps for various modules that share the similar resources?

A)simulation and validation
B)iteration
C)hardware-software partitioning
D)scheduling
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
6
The step where in the results stored in the temporary register is transferred into the permanent register is called as ______

A)final step
B)commitment step
C)last step
D)inception step
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
7
If an exception is raised and the succeeding instructions are executed completely, then the processor is said to have ______

A)exception handling
B)imprecise exceptions
C)error correction
D)none of the mentioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
8
For applications that demand very high data-processing requirements, or if double precision floating point calculation is needed, then best choice will be

A)cortex-m0 processor
B)cortex-m3 processor
C)cortex-m7 processor
D)cortex-m0+ processor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which scheme/ strategy is suitable to establish the communication between the access point (AP) and the infrastructure of LANs?

A)non-reception of frame & necessity of retransmission
B)no necessity of working in duplex mode for the host
C)no necessity to prevent the signal fading
D)all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
10
Unauthorised access of information from a wireless device through a bluetooth connection is called _________

A)bluemaking
B)bluestring
C)bluestring.
D)bluesnarfing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
11
Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is numbered 10001. What is the sequence number of the segment if all data is sent in only one segment?

A)10001
B)12001
C)14000
D)12002
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
12
Bytes of data being transferred in each connection are numbered by TCP. These numbers start with a _________

A)fixed number
B)random sequence of 0's and 1's
C)one
D)sequence of zero's and one's
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following are external pins whose logic state can be controlled by the processor to either be a logic zero or logic one is known as

A)analogue value
B)display values
C)binary values
D)time derived digital outputs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following has a quadruple buffered receiver and a double buffered transmitter?

A)intel 8250
B)16450
C)16550
D)mc68681
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
15
process that is based on IPC mechanism which executes on different systems and can communicate with other processes using message based communication, is called ________

A)local procedure call
B)inter process communication
C)remote procedure call
D)remote machine invocation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which abstraction level undergo the compilation process by converting a sequential program into finite-state machine and register transfers while designing an embedded system?

A)system
B)behaviour
C)rt
D)logic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which characteristics of an embedded system exhibit the responsiveness to the assortments or variations in system's environment by computing specific results for real-time applications without any kind of postponement ?

A)single-functioned characteristic
B)tightly-constraint characteristics
C)reactive & real time characteristics
D)all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which potential mode of operation indicate the frequent sending of byte to the slave corresponding to the reception of an acknowledge signal when it becomes desirable for the master to write to the slave during data transmission in I2C bus?

A)master in master-transmit mode & slave in slave-receive mode
B)slave in slave-transmit mode & master in master-receive mode
C)master in master-transmit mode as well as master-receive mode
D)slave in slave-transmit mode as well as slave-receive mode
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which method of multiple secondary communication in TDMA is acquired/adopted by bluetooth especially where data integrity becomes more crucial than avoiding latency?

A)synchronous connection-oriented (sco) link
B)asynchronous connectionless link (acl)
C)both A &B a & b
D)none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
20
The upper 128 bytes of an internal data memory from 80H through FFH usually represent ___________.

A)general-purpose registers
B)special function registers
C)stack pointers
D)program counters
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
21
Which standard govern parallel communications?

A)RS232
B)RS-232a
C)CAT 5
D)IEEE 1284
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which common bus specification provides the fastest data transfer rate?

A)VL bus
B)ISA
C)PCI
D)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
23
Devices that use the ____ bus are self-configuring.

A)EISA
B)ISA
C)MCA
D)PCI
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
24
Which of following is not a valid bus in computer system ?

A)Data Bus
B)Memory Bus
C)Address Bus
D)System Bus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
25
The AT bus is also known as the ____ bus.

A)286
B)8-bit ISA
C)16-bit ISA
D)ISA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.