Deck 2: Embedded Systems and Communication Protocols
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
Play
Full screen (f)
Deck 2: Embedded Systems and Communication Protocols
1
What does an IC that initiate or enable the data transfer on bus can be regarded as, in accordance to the I2c protocol specifications?
A)bus slaves
B)bus master
C)bus drivers
D)bus data carriers
A)bus slaves
B)bus master
C)bus drivers
D)bus data carriers
bus master
2
______ is a technology that allows telephone calls to be made over computer networks like the Internet.
A)voip
B)gsm
C)modem
D)cdma
A)voip
B)gsm
C)modem
D)cdma
voip
3
Which development tool can facilitate the creation and modification of source programs in addition to assembly and higher -level languages?
A)compiler
B)linker
C)assembler
D)editor
A)compiler
B)linker
C)assembler
D)editor
editor
4
Which types of an embedded systems involve the coding at a simple level in an embedded 'C', without any necessity of RTOS?
A)sophisticated embedded systems
B)medium scale embedded systems
C)small scale embedded systems
D)all of the above
A)sophisticated embedded systems
B)medium scale embedded systems
C)small scale embedded systems
D)all of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
While designing an embedded system, which sub-task oriented process allocates the time steps for various modules that share the similar resources?
A)simulation and validation
B)iteration
C)hardware-software partitioning
D)scheduling
A)simulation and validation
B)iteration
C)hardware-software partitioning
D)scheduling
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
The step where in the results stored in the temporary register is transferred into the permanent register is called as ______
A)final step
B)commitment step
C)last step
D)inception step
A)final step
B)commitment step
C)last step
D)inception step
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
If an exception is raised and the succeeding instructions are executed completely, then the processor is said to have ______
A)exception handling
B)imprecise exceptions
C)error correction
D)none of the mentioned
A)exception handling
B)imprecise exceptions
C)error correction
D)none of the mentioned
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
For applications that demand very high data-processing requirements, or if double precision floating point calculation is needed, then best choice will be
A)cortex-m0 processor
B)cortex-m3 processor
C)cortex-m7 processor
D)cortex-m0+ processor
A)cortex-m0 processor
B)cortex-m3 processor
C)cortex-m7 processor
D)cortex-m0+ processor
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
Which scheme/ strategy is suitable to establish the communication between the access point (AP) and the infrastructure of LANs?
A)non-reception of frame & necessity of retransmission
B)no necessity of working in duplex mode for the host
C)no necessity to prevent the signal fading
D)all of the above
A)non-reception of frame & necessity of retransmission
B)no necessity of working in duplex mode for the host
C)no necessity to prevent the signal fading
D)all of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
Unauthorised access of information from a wireless device through a bluetooth connection is called _________
A)bluemaking
B)bluestring
C)bluestring.
D)bluesnarfing.
A)bluemaking
B)bluestring
C)bluestring.
D)bluesnarfing.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is numbered 10001. What is the sequence number of the segment if all data is sent in only one segment?
A)10001
B)12001
C)14000
D)12002
A)10001
B)12001
C)14000
D)12002
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
Bytes of data being transferred in each connection are numbered by TCP. These numbers start with a _________
A)fixed number
B)random sequence of 0's and 1's
C)one
D)sequence of zero's and one's
A)fixed number
B)random sequence of 0's and 1's
C)one
D)sequence of zero's and one's
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following are external pins whose logic state can be controlled by the processor to either be a logic zero or logic one is known as
A)analogue value
B)display values
C)binary values
D)time derived digital outputs
A)analogue value
B)display values
C)binary values
D)time derived digital outputs
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following has a quadruple buffered receiver and a double buffered transmitter?
A)intel 8250
B)16450
C)16550
D)mc68681
A)intel 8250
B)16450
C)16550
D)mc68681
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
process that is based on IPC mechanism which executes on different systems and can communicate with other processes using message based communication, is called ________
A)local procedure call
B)inter process communication
C)remote procedure call
D)remote machine invocation
A)local procedure call
B)inter process communication
C)remote procedure call
D)remote machine invocation
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
Which abstraction level undergo the compilation process by converting a sequential program into finite-state machine and register transfers while designing an embedded system?
A)system
B)behaviour
C)rt
D)logic
A)system
B)behaviour
C)rt
D)logic
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
Which characteristics of an embedded system exhibit the responsiveness to the assortments or variations in system's environment by computing specific results for real-time applications without any kind of postponement ?
A)single-functioned characteristic
B)tightly-constraint characteristics
C)reactive & real time characteristics
D)all of the above
A)single-functioned characteristic
B)tightly-constraint characteristics
C)reactive & real time characteristics
D)all of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
Which potential mode of operation indicate the frequent sending of byte to the slave corresponding to the reception of an acknowledge signal when it becomes desirable for the master to write to the slave during data transmission in I2C bus?
A)master in master-transmit mode & slave in slave-receive mode
B)slave in slave-transmit mode & master in master-receive mode
C)master in master-transmit mode as well as master-receive mode
D)slave in slave-transmit mode as well as slave-receive mode
A)master in master-transmit mode & slave in slave-receive mode
B)slave in slave-transmit mode & master in master-receive mode
C)master in master-transmit mode as well as master-receive mode
D)slave in slave-transmit mode as well as slave-receive mode
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
Which method of multiple secondary communication in TDMA is acquired/adopted by bluetooth especially where data integrity becomes more crucial than avoiding latency?
A)synchronous connection-oriented (sco) link
B)asynchronous connectionless link (acl)
C)both A &B a & b
D)none of the above
A)synchronous connection-oriented (sco) link
B)asynchronous connectionless link (acl)
C)both A &B a & b
D)none of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
The upper 128 bytes of an internal data memory from 80H through FFH usually represent ___________.
A)general-purpose registers
B)special function registers
C)stack pointers
D)program counters
A)general-purpose registers
B)special function registers
C)stack pointers
D)program counters
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
Which standard govern parallel communications?
A)RS232
B)RS-232a
C)CAT 5
D)IEEE 1284
A)RS232
B)RS-232a
C)CAT 5
D)IEEE 1284
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
Which common bus specification provides the fastest data transfer rate?
A)VL bus
B)ISA
C)PCI
D)All of the above
A)VL bus
B)ISA
C)PCI
D)All of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
Devices that use the ____ bus are self-configuring.
A)EISA
B)ISA
C)MCA
D)PCI
A)EISA
B)ISA
C)MCA
D)PCI
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
Which of following is not a valid bus in computer system ?
A)Data Bus
B)Memory Bus
C)Address Bus
D)System Bus
A)Data Bus
B)Memory Bus
C)Address Bus
D)System Bus
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
The AT bus is also known as the ____ bus.
A)286
B)8-bit ISA
C)16-bit ISA
D)ISA
A)286
B)8-bit ISA
C)16-bit ISA
D)ISA
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck