All Exams  >   Computer Science Engineering (CSE)  >   Embedded Systems (Web)  >   All Questions

All questions of Embedded System Software for Computer Science Engineering (CSE) Exam

Which of the following provides a buffer between the user and the low-level interfaces to the hardware?
  • a)
    operating system
  • b)
    kernel
  • c)
    software
  • d)
    hardware
Correct answer is option 'A'. Can you explain this answer?

Explanation: The operating system is software which provides a buffer between the low-level interfaces to the hardware within the system and the user.
1 Crore+ students have signed up on EduRev. Have you? Download the App

Which of the following are not dependent on the actual hardware performing the physical task?
  • a)
    applications
  • b)
    hardware
  • c)
    registers
  • d)
    parameter block
Correct answer is option 'D'. Can you explain this answer?

Explanation: The kernel can locate the parameter block by using an address pointer which is stored in the predetermined address register. These parameter blocks are standard throughout the operating system, that is, they are not dependent on the actual hardware performing the physical task.

Which of the following schedulers take decisions at run-time?
  • a)
    preemptive scheduler
  • b)
    non preemptive scheduler
  • c)
    dynamic scheduler
  • d)
    static scheduler
Correct answer is option 'C'. Can you explain this answer?

Raj Datta answered
Schedulers that take decisions at run-time

The scheduler in an operating system is responsible for determining which processes should be allocated CPU time and in what order. There are different types of schedulers, including preemptive and non-preemptive schedulers. However, the scheduler that takes decisions at run-time is the dynamic scheduler.

Dynamic Scheduler
A dynamic scheduler is a type of scheduler that makes decisions at run-time based on the current state of the system. It takes into account factors such as process priority, resource availability, and system load to determine the optimal scheduling decisions.

Key Features of Dynamic Scheduler:
1. Real-time Decision Making: The dynamic scheduler continuously monitors the system and makes scheduling decisions on the fly. It adapts to the changing conditions of the system and adjusts the allocation of resources accordingly.

2. Consideration of Process Priority: The dynamic scheduler considers the priority of processes when making scheduling decisions. Higher priority processes are given preferential treatment and are allocated CPU time before lower priority processes.

3. Resource Allocation: The dynamic scheduler takes into account the availability of system resources such as CPU, memory, and I/O devices. It ensures that processes are scheduled in a way that maximizes resource utilization and minimizes resource contention.

4. Load Balancing: The dynamic scheduler aims to balance the load across the system by distributing the workload evenly among the available CPUs. It prevents any single CPU from being overloaded while others are idle.

5. Adaptability: The dynamic scheduler adjusts its scheduling decisions based on the workload and system conditions. It can dynamically change the scheduling algorithm or parameters to optimize system performance.

Comparison with Other Schedulers:
- Preemptive Scheduler: A preemptive scheduler can interrupt a running process and allocate CPU time to another process with higher priority. However, the decision to preempt a process is made based on predefined rules and not at run-time. Therefore, it does not meet the criteria of taking decisions at run-time.

- Non-preemptive Scheduler: A non-preemptive scheduler allows a process to continue running until it voluntarily releases the CPU or completes its execution. It does not make decisions at run-time but rather follows a predefined scheduling algorithm.

- Static Scheduler: A static scheduler uses a fixed scheduling algorithm that is determined before the execution of the system. It does not adapt to the changing conditions of the system and cannot make decisions at run-time.

In conclusion, the dynamic scheduler is the only option among the given choices that takes decisions at run-time based on the current state of the system. It continuously monitors the system, considers process priority and resource availability, and dynamically adjusts the scheduling decisions to optimize system performance.

 Which of the following unit protects the memory?
  • a)
    bus interface unit
  • b)
    execution unit
  • c)
    memory management unit
  • d)
    peripheral unit
Correct answer is option 'C'. Can you explain this answer?

Kalyan Menon answered
Explanation: The resources have to be protected in an embedded system and the most important resource to be protected is the memory which is protected by the memory management unit through different programming.

Which of the following can make the application program hardware independent?
  • a)
    software
  • b)
    application manager
  • c)
    operating system
  • d)
    kernel
Correct answer is option 'C'. Can you explain this answer?

Priya Gupta answered
The correct answer is option 'C': the operating system.

The operating system is responsible for managing and controlling the hardware resources of a computer system. It provides a layer of abstraction between the application program and the underlying hardware, making the application program hardware independent.

Here is a detailed explanation of why the operating system can make the application program hardware independent:

1. Abstraction layer:
The operating system provides an abstraction layer that shields the application program from the hardware details. It presents a unified interface to the application program, hiding the complexities of different hardware architectures. This allows the application program to be written in a platform-independent manner.

2. Device drivers:
The operating system includes device drivers that enable communication between the application program and the hardware devices. These drivers handle the low-level details of interacting with specific hardware devices, such as printers, keyboards, or network cards. The application program can use the standardized interface provided by the operating system to access these devices, without having to worry about the specific hardware details.

3. Hardware resource management:
The operating system manages the allocation and sharing of hardware resources among multiple application programs. It ensures that each program gets fair access to the resources it needs, without interfering with other programs. This resource management includes memory management, CPU scheduling, and input/output operations. By providing this layer of abstraction, the operating system allows the application program to run on different hardware configurations without modification.

4. Portability:
Since the operating system provides a standardized interface to the application program, it enables portability across different hardware platforms. The same application program can run on different computers with different hardware configurations, as long as they are running the same operating system. This reduces the need for rewriting or modifying the application program for each specific hardware platform, saving time and effort.

In conclusion, the operating system plays a crucial role in making the application program hardware independent. It provides an abstraction layer, device drivers, hardware resource management, and portability, allowing the application program to run on different hardware configurations without modification.

 Which of the following does not uses a shared memory?
  • a)
    process
  • b)
    thread
  • c)
    task
  • d)
    kernel
Correct answer is option 'A'. Can you explain this answer?

Arka Bajaj answered
Explanation: The program in execution is known as the process. The process does not share the memory space but the threads have a shared memory address. When the CPU switches from process to another, the current information is stored in the process descriptor.

The special tale in the multitasking operating system is also known as
  • a)
    task control block
  • b)
    task access block
  • c)
    task address block
  • d)
    task allocating block
Correct answer is option 'A'. Can you explain this answer?

Explanation: When a context switch is performed, the current program or task is interrupted, so the processor’s registers are saved in a special table which is known as task control block.

Which of the following is an asynchronous bus?
  • a)
    VMEbus
  • b)
    timer
  • c)
    data bus
  • d)
    address bus
Correct answer is option 'A'. Can you explain this answer?

Asynchronous Bus

An asynchronous bus is a type of bus architecture used in computer systems, where data transfer between different components can occur independently of a clock signal. It allows for more flexibility and efficiency in data transfer, as components can communicate with each other without being synchronized to a common clock.

VMEbus

VMEbus stands for Versa Module Europa bus, which is a widely used bus standard in the embedded systems industry. It is a parallel bus architecture that allows for the interconnection of various modules, such as processors, memory units, and peripherals. VMEbus supports both synchronous and asynchronous data transfer modes, but in this case, it is specifically mentioned as an asynchronous bus.

Explanation

The VMEbus is considered an asynchronous bus because it supports asynchronous data transfer mode. In this mode, the data transfer between different modules can occur independently of a clock signal. The modules can send and receive data without waiting for a clock signal to synchronize their actions.

Benefits of Asynchronous Bus

1. Flexibility: Asynchronous bus allows components to communicate with each other at their own pace without being constrained by a common clock. This provides flexibility in designing and integrating different modules into a system.

2. Efficiency: Asynchronous data transfer eliminates the need for components to wait for a clock signal, resulting in more efficient utilization of system resources. Components can start the data transfer as soon as they are ready, increasing overall system performance.

3. Scalability: Asynchronous bus architecture is particularly suitable for systems with multiple components that operate at different speeds. Each component can operate at its own speed without affecting the overall system performance.

Conclusion

In conclusion, the VMEbus is an example of an asynchronous bus. It supports asynchronous data transfer mode, allowing components to communicate independently of a clock signal. This provides flexibility, efficiency, and scalability in system design and integration.

How many types of Linux files are typically used?
  • a)
    2
  • b)
    3
  • c)
    4
  • d)
    5
Correct answer is option 'C'. Can you explain this answer?

Amrutha Sharma answered
Explanation: There are four types of Linux files. These are regular, special, directories and named pipes.

 Which provides the TCP/IP communication over the ethernet and FDDI?
  • a)
    pSOS+m
  • b)
    pSOS+ kernel
  • c)
    pNA+ network manager
  • d)
    pSOS+
Correct answer is option 'C'. Can you explain this answer?

Explanation: The pNA+ network manager is a networking option which can provide the TCP/IP communication over a large variety of media such as the FDDI and the ethernet.

What happens to the interrupts in an interrupt service routine?
  • a)
    disable interrupt
  • b)
    enable interrupts
  • c)
    remains unchanged
  • d)
    ready state
Correct answer is option 'A'. Can you explain this answer?

Manisha Sharma answered
Interrupt Service Routine (ISR)

An Interrupt Service Routine (ISR) is a special type of subroutine or function that is invoked in response to an interrupt. When an interrupt occurs, the processor suspends its current execution and jumps to the ISR to handle the interrupt. The ISR performs the necessary tasks associated with the interrupt and then returns to the interrupted program.

Interrupts in an ISR

Interrupts can occur at any time during the execution of a program, including when the processor is executing an ISR. However, it is generally not desirable for an interrupt to occur while the ISR is still executing because it can lead to unexpected behavior and potentially corrupt the system state.

To prevent this, it is common practice to disable interrupts while executing an ISR. Disabling interrupts ensures that no new interrupts can occur until the ISR is completed, allowing the ISR to execute without any interruptions.

Disabling Interrupts

When an interrupt is triggered, the processor automatically disables interrupts before jumping to the ISR. This prevents any new interrupts from occurring while the ISR is executing. Disabling interrupts essentially means that the processor ignores any new interrupt requests until interrupts are enabled again.

Disabling interrupts is typically achieved by modifying the interrupt enable flag or register in the processor's control unit. This flag or register controls whether interrupts are allowed or not. By setting this flag to disable interrupts, the processor ensures that no new interrupts can occur.

Benefits of Disabling Interrupts

Disabling interrupts during an ISR provides several benefits:

1. Prevents nesting of interrupts: By disabling interrupts, the processor ensures that only one interrupt can be serviced at a time. This simplifies the handling of interrupts and prevents nested interrupts from causing unexpected behavior.

2. Ensures ISR completion: Disabling interrupts guarantees that the ISR can complete its execution without any interruptions. This helps maintain the integrity of the system state and prevents any potential conflicts or data corruption.

3. Priority handling: Disabling interrupts allows for proper handling of interrupt priorities. If multiple interrupts occur simultaneously, the processor can prioritize them based on their importance and handle them in the desired order.

Conclusion

In an interrupt service routine (ISR), interrupts are typically disabled to prevent new interrupts from occurring until the ISR completes its execution. This ensures that the ISR can execute without interruptions and allows for proper handling of the interrupt and maintenance of system integrity.

 Which file type of Linux is similar to the regular file type?
  • a)
    named pipe
  • b)
    directories
  • c)
    regular file
  • d)
    special file
Correct answer is option 'A'. Can you explain this answer?

Raghav Joshi answered
Regular Files in Linux

Regular files in Linux are the most common and basic type of files that we encounter in the file system. They contain data in the form of text, binary, or any other format. Regular files can be created, modified, and read by users and applications. These files are represented by the letter "f" in the file permission listings.

Named Pipes

Named pipes, also known as FIFOs (First In First Out), are a type of special file in Linux. They allow interprocess communication (IPC) between different processes on the same system or even across different systems. They act as temporary connections between processes, where one process writes data into the pipe and another process reads the data from the pipe.

Similarity between Regular Files and Named Pipes

The similarity between regular files and named pipes lies in the way they store and transfer data. Both regular files and named pipes can be used to store and transfer data between different processes. However, there are some differences in how they are accessed and used.

Differences between Regular Files and Named Pipes

- Access: Regular files are accessed using file descriptors or file pointers, while named pipes are accessed using special file names.
- Read/Write Operations: Regular files support random access, allowing reading and writing at any position within the file. Named pipes, on the other hand, only support sequential access, where data is read in the order it was written.
- Lifespan: Regular files exist until they are explicitly deleted, while named pipes are temporary and are automatically removed once all processes using them have closed.

Conclusion

In conclusion, while regular files and named pipes in Linux share similarities in terms of storing and transferring data, they are different in terms of access methods, read/write operations, and lifespan. Regular files are the most common file type, while named pipes are a special type of file used for interprocess communication. Therefore, the correct option for the file type in Linux that is similar to the regular file type would be "named pipe" (option A).

How many assumptions have to meet for a rate monotonic scheduling?
  • a)
    3
  • b)
    4
  • c)
    5
  • d)
    6
Correct answer is option 'D'. Can you explain this answer?

Rate Monotonic Scheduling (RMS) is a real-time scheduling algorithm used in systems where tasks have strict deadlines and fixed periodicity. It assigns priority to tasks based on their periods, with the shorter periods receiving higher priority. In order for RMS to be feasible, certain assumptions must be met.

Assumptions for Rate Monotonic Scheduling:

1. Periodic Tasks: All tasks in the system must be periodic, meaning they repeat at regular intervals. The period of a task is the time between two consecutive instances of the task being released.

2. Independent Tasks: The execution of tasks must be independent of each other, meaning there are no dependencies or interactions between tasks.

3. Preemptive Scheduling: The scheduling algorithm must be preemptive, allowing higher priority tasks to preempt lower priority ones. This ensures that tasks with shorter periods can meet their deadlines even if they are currently executing.

4. Static Priority Assignment: The priority of tasks must be assigned based on their periods, with shorter periods receiving higher priority. This priority assignment is done statically, meaning it does not change during runtime.

5. No Task Arrival Overhead: There should be no overhead or delay in the arrival of tasks. Tasks should be released exactly at their specified periods without any additional time overhead.

6. Known Execution Times: The execution time of each task must be known and deterministic. This allows for accurate scheduling calculations and ensures that deadlines can be met.

By meeting these assumptions, the feasibility of the Rate Monotonic Scheduling algorithm can be guaranteed. In the given options, option 'D' is correct as it states that six assumptions must be met for Rate Monotonic Scheduling to be applied successfully. The other options, 'A', 'B', and 'C', do not include all the necessary assumptions.

 Which of the following uses its own address space?
  • a)
    thread
  • b)
    process
  • c)
    task
  • d)
    kernel
Correct answer is option 'A'. Can you explain this answer?

Shalini Chopra answered
Process
A process is an instance of a running program. It consists of the program code, data, and resources required to execute the program. Each process has its own memory space, which means that it has its own address space.

Address Space
An address space is the range of memory addresses that a process can access. It includes the memory locations where the program's instructions and data are stored. Each process has its own unique address space, which is isolated from other processes.

Thread
A thread is a lightweight unit of execution within a process. Multiple threads can exist within a single process, and they share the same address space. This means that all threads within a process can access the same memory locations.

Task
In some operating systems, the term "task" is used interchangeably with "process." Both refer to an instance of a running program with its own memory space.

Kernel
The kernel is the core component of an operating system. It provides low-level services and manages system resources. The kernel operates in a privileged mode and has access to all memory addresses in the system. However, it does not have its own separate address space.

Explanation
Among the given options, thread, task, and kernel do not have their own address space. Threads share the same address space within a process, allowing them to access the same memory locations. Tasks, in the context of this question, are synonymous with processes, which have their own address space.

On the other hand, a process is an independent entity with its own address space. Each process has its own memory range, which is isolated from other processes. This separation ensures that processes do not interfere with each other's memory, providing protection and security.

Therefore, the correct answer is thread (option A) since it does not have its own address space, unlike processes.

Which of the following can periodically trigger the context switch?
  • a)
    software interrupt
  • b)
    hardware interrupt
  • c)
    peripheral
  • d)
    memory
Correct answer is option 'B'. Can you explain this answer?

Arpita Mehta answered
Explanation: The multitasking operating systems are associated with the multitasking kernel which controls the time slicing mechanism. The time period required for each task for execution before it is stopped and replaced during a context switch is known as the time slice. These are periodically triggered by a hardware interrupt from the system timer.

Who developed the OS-9?
  • a)
    Microwave
  • b)
    Microwave and Motorola
  • c)
    Motorola and IBM
  • d)
    Microwave and IBM
Correct answer is option 'B'. Can you explain this answer?

Palak Saini answered
Explanation: The OS-9 is developed by Motorola and Microwave as a real-time operating system. The operating system is developed for MC6809 which is an 8-bit processor.

Which of the following has the same instruction set as that of the Windows NT?
  • a)
    WIN32
  • b)
    WIN4
  • c)
    WIN24
  • d)
    WIN16
Correct answer is option 'A'. Can you explain this answer?

Athul Pillai answered
Explanation: WIN32 is used for the Windows NT applications and is also known as even native which uses the same instruction set as that of the Windows NT and therefore do not need to emulate a different architecture.

Which of the following are coupled in the Windows NT for the resource protection?
  • a)
    kernel mode and user mode
  • b)
    user mode and protected mode
  • c)
    protected mode and real mode
  • d)
    virtual mode and kernel mode
Correct answer is option 'A'. Can you explain this answer?

Alok Desai answered
Explanation: The user mode and the kernel mode are coupled with the resource protection and this resilience in Windows NT is a big advantage over the MS-DOS and the Windows 3.1.

For which of the following WCET can be computed?
  • a)
    C program
  • b)
    assembly language
  • c)
    VHDL
  • d)
    program without recursion
Correct answer is option 'D'. Can you explain this answer?

Subham Saha answered
Explanation: The WCET computing is a difficult task for assembly language and for computing WCTE for any high-level language without the knowledge of the generated assembly code is impossible.

Which of the following is an independent scheduling?
  • a)
    LL
  • b)
    LST
  • c)
    EDD
  • d)
    RMS
Correct answer is option 'D'. Can you explain this answer?

Explanation: The RMS or rate monotonic scheduling is the independent scheduling algorithm which is included in the assumptions of RMS, that is, all tasks should be independent.

 Which of the following provides an illusion of multitasking?
  • a)
    single task operating system
  • b)
    multitasking operating system
  • c)
    cooperative multitasking
  • d)
    pre-emption
Correct answer is option 'C'. Can you explain this answer?

Ankita Bose answered
Explanation: The cooperative multitasking co-operates between them which provides the illusion of multitasking. This is done by periodically executing the tasks.

Which process defines the allocation of the mass storage to the logical file system?
  • a)
    mounting
  • b)
    de-allocation
  • c)
    demounting
  • d)
    unmounting
Correct answer is option 'A'. Can you explain this answer?

Aaditya Ghosh answered
Explanation: The allocation of the mass storage to the logical file system is known as the mounting and its reverse operation, deallocation of the mass storage is known as unmounting.

Who had developed VRTX-32?
  • a)
    Microtec Research
  • b)
    Microwave
  • c)
    Motorola
  • d)
    IBM
Correct answer is option 'A'. Can you explain this answer?

Explanation: The VRTX-32 is developed by Microtec Research which is a high-performance real-time kernel.

 Which can provide more memory than the physical memory?
  • a)
    real memory
  • b)
    physical address
  • c)
    virtual memory
  • d)
    segmented address
Correct answer is option 'C'. Can you explain this answer?

Prateek Khanna answered
Explanation: The physical memory can provide more memory than the physical memory within the system. Such memories are divided into segments and pages.

Which of the following uses a swap file to provide the virtual memory?
  • a)
    windows NT
  • b)
    kernel
  • c)
    memory
  • d)
    memory management unit 
Correct answer is option 'A'. Can you explain this answer?

Pritam Goyal answered
Explanation: The Windows NT use a swap file for providing a virtual memory environment. This file is dynamic and varies with the amount of memory that all the software including the device driver, operating systems and so on.

 Which of the following must be used to isolate the access in the user mode?
  • a)
    device driver
  • b)
    software driver
  • c)
    on-chip memory
  • d)
    peripherals
Correct answer is option 'A'. Can you explain this answer?

Hiral Nair answered
Explanation: The device driver is used to control and isolate the access when it is in user mode. This is used to ensure that no conflict is caused.

What does LPC stand for?
  • a)
    local procedure call
  • b)
    local program call
  • c)
    local program code
  • d)
    local procedure code
Correct answer is option 'A'. Can you explain this answer?

Samridhi Joshi answered
Explanation: The LPC is defined as the local procedure call which is responsible for coordinating the system calls from the WIN32 subsystem and an application.

 Which filesystem is used by the OS/2?
  • a)
    FAT
  • b)
    VFAT
  • c)
    HPFS
  • d)
    NTFS
Correct answer is option 'C'. Can you explain this answer?

Explanation: The high performance file system is an alternative file system which possess 254 characters. It is used by the OS/2 and also write caching to disk technique that stores data temporarily and write it to the disk

How many file system does the Windows NT support?
  • a)
    4
  • b)
    5
  • c)
    3
  • d)
    2
Correct answer is option 'C'. Can you explain this answer?

Rohan Shah answered
Explanation: The Windows NT support three file system and these coexist with each other even though there are some restrictions.

Which of the following can own and control the resources ?
  • a)
    thread
  • b)
    task
  • c)
    system
  • d)
    peripheral
Correct answer is option 'B'. Can you explain this answer?

Anisha Ahuja answered
Explanation: The task and process have several characteristics and one such is that the task or process can own or control resources and it has threads of execution which are the paths through the code.

Which of the following works by dividing the processor’s time?
  • a)
    single task operating system
  • b)
    multitask operating system
  • c)
    kernel
  • d)
    applications
Correct answer is option 'B'. Can you explain this answer?

Ameya Basak answered
Explanation: The multitasking operating system works by dividing the processor’s time into different discrete time slots, that is, each application requires a defined number of time slots to complete its execution.

 Which of the following includes its own I/O routine?
  • a)
    hardware
  • b)
    kernel
  • c)
    operating system
  • d)
    application manager
Correct answer is option 'C'. Can you explain this answer?

Explanation: An operating system is a software which includes its own I/o routine in order to drive the serial ports and the parallel ports.

Which estimation approach is used by Jha and Dutt for hardware?
  • a)
    accurate cost and performance value
  • b)
    estimated cost and performance value
  • c)
    performance value
  • d)
    accurate cost
Correct answer is option 'B'. Can you explain this answer?

Ishaan Saini answered
Explanation: There are different estimation techniques used. One such is the estimated cost and performance value which is proposed by Jha and Dutt for hardware. The accurate cost and performance value is proposed by Jain et al for software.

 Who started Linux first as a personal project?
  • a)
    Linus Torvalds
  • b)
    Ken Thompson
  • c)
    Dennis Ritchie
  • d)
    John Dell
Correct answer is option 'A'. Can you explain this answer?

Explanation: The Linux was taken as a personal project by Linus Torvalds at the University of Helsinki in Finland that is similar to UNIX as an operating system.

Which algorithm is dynamic scheduling algorithm?
  • a)
    LL
  • b)
    LST
  • c)
    EDF
  • d)
    EDD
Correct answer is option 'C'. Can you explain this answer?

Explanation: The EDF or earliest deadline first can be implemented as a dynamic scheduling algorithm.

 Which algorithm requires the periodic checks of the laxity?
  • a)
    LST
  • b)
    LL
  • c)
    EDD
  • d)
    EFD
Correct answer is option 'B'. Can you explain this answer?

Shounak Sharma answered
Explanation: The LL scheduling algorithm requires the knowledge of the execution times and the periodic check of the laxity.

Which of the task are not periodic?
  • a)
    periodic task
  • b)
    unpredictable task
  • c)
    aperiodic task
  • d)
    job
Correct answer is option 'C'. Can you explain this answer?

Nishanth Roy answered
Explanation: The aperiodic task is the one in which the task are not periodic but the periodic task is the one in which are the task are periodic. Each execution of a periodic task is known as the job.

 Which directory is allocated on the hard disk 1 of the physical storage in a Linux operating system?
  • a)
    term
  • b)
    dev
  • c)
    etc
  • d)
    bin
Correct answer is option 'D'. Can you explain this answer?

Explanation: The bin directory is on the hard disk 1 of the physical storage whereas the term, dev, etc is on the hard disk 1 of the physical logical file system.

 Which of the following is an aperiodic task requesting the processor at unpredictable times?
  • a)
    job
  • b)
    aperiodic task
  • c)
    sporadic
  • d)
    periodic task
Correct answer is option 'C'. Can you explain this answer?

Explanation: The aperiodic tasks request the processor at unpredictable times if and only if there is a minimum separation between the times at which they request the processor which is called sporadic.

 Which estimate approach is more precise?
  • a)
    estimated cost and performance value
  • b)
    accurate cost and performance value
  • c)
    performance value and execution time
  • d)
    estimated cost
Correct answer is option 'B'. Can you explain this answer?

Explanation: The accurate cost and performance value is possible if interfaces to software synthesis tools and hardware synthesis tools exist and is more precise than the any other methods.

Which of the following is the base for scheduling algorithm?
  • a)
    WCET
  • b)
    time
  • c)
    execution time
  • d)
    address accessing time
Correct answer is option 'A'. Can you explain this answer?

Explanation: The base for scheduling algorithm is the WCET, worst case execution time which is a bound on the execution time of tasks. Such a computing is undecidable in the general case, so it is decidable for certain programs only such as programs without recursion, iteration count, while loops etc.

Which determines the sequence and the associated task’s priority?
  • a)
    scheduling algorithm
  • b)
    ready list
  • c)
    task control block
  • d)
    application register
Correct answer is option 'A'. Can you explain this answer?

Aarav Malik answered
Explanation: The scheduling algorithm determines the sequence and an associated task’s priority. It also determines the present status of the task.

What does TDL stand for?
  • a)
    task descriptor list
  • b)
    task design list
  • c)
    temporal descriptor list
  • d)
    temporal design list
Correct answer is option 'A'. Can you explain this answer?

Nishanth Roy answered
Explanation: TDL is a task descriptor list which contains the cyclic schedule for all activities of the node and the temporal control structure is encoded by the task descriptor table.

 Which scheduler take their designs at design time?
  • a)
    preemptive scheduler
  • b)
    non preemptive scheduler
  • c)
    dynamic scheduler
  • d)
    static scheduler
Correct answer is option 'D'. Can you explain this answer?

Tarun Saini answered
Explanation: The static scheduler take their designs at the design time and it also generates tables of start times which are forwarded to a simple dispatcher but the dynamic scheduler takes decision at the run-time.

Which file type of Linux has no restriction on size and can have any kind of data?
  • a)
    special
  • b)
    regular
  • c)
    directories
  • d)
    named pipes
Correct answer is option 'B'. Can you explain this answer?

Rajveer Sharma answered
Explanation: There are four types of Linux files. These are regular, special, directories and named pipes in which the regular file type can have any kind of data and does not have restrictions in size, the special file type represent certain terminals such as physical I/O device, the directories can hold lists of files, and the named pipes are similar to regular files but restricted in size.

Which filesystem of the Linux can be implemented on a system with two hard disks?
  • a)
    logical file system
  • b)
    physical file system
  • c)
    special file type system
  • d)
    regular file type system
Correct answer is option 'A'. Can you explain this answer?

Baishali Reddy answered
Explanation: The physical file system is allocated to the parts of the logical file system. The logical file system can be implemented on a system with two hard disks by the allocation of the bin directory under the hard disk 1 and the file subsystem under the hard disk 2.

What does WCTE stand for?
  • a)
    wait case execution time
  • b)
    wait case encoder time
  • c)
    worst case execution time
  • d)
    worst code execution time
Correct answer is option 'C'. Can you explain this answer?

Explanation: The WCTE is the worst case execution time which is an upper bound on the execution times of task. It can be computed for certain programs like while loops, programs without recursion, iteration count etc.

Chapter doubts & questions for Embedded System Software - Embedded Systems (Web) 2023 is part of Computer Science Engineering (CSE) exam preparation. The chapters have been prepared according to the Computer Science Engineering (CSE) exam syllabus. The Chapter doubts & questions, notes, tests & MCQs are made for Computer Science Engineering (CSE) 2023 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests here.

Chapter doubts & questions of Embedded System Software - Embedded Systems (Web) in English & Hindi are available as part of Computer Science Engineering (CSE) exam. Download more important topics, notes, lectures and mock test series for Computer Science Engineering (CSE) Exam by signing up for free.

Embedded Systems (Web)

47 videos|69 docs|65 tests

Signup to see your scores go up within 7 days!

Study with 1000+ FREE Docs, Videos & Tests
10M+ students study on EduRev