-
Like This For Getting More Updates : Rrerwietce mn? neaeintel
Visit : www.jntufastupdates.com | www.jntukfastupdates.com
4-year 1ST SEM 28° MID
ES
1. White dynamic testing is:->Testing running system while looking at code schematic ete
Identify which is correct for boundary condition testing:->Testing situations at edge of pl:
operational limits of software
3. Identify which is correct for data testing:->Ciecking information of user inputs and
‘4, Dynamic testing is done:->When the system is running
5, The main goal of testing and assuring the quality of system are:->Finding bugs esign
6. Identify the correct sentence regarding data testing:->Checking information of @ser Miputs and
outputs
7. Identify which one is correct zegarding boundary scan testing:->Testing siffatioms at edge of
planed operational limits of software
8. White box static testing is:->Testing is invalid data Re
9, Static testing is done:->Testing situations at edge of planed ove fits of software
10. Voltmeter is used for:->voltage differences
mH is used for measuring resistance:->ohm meter &
6 >
an ere
12. Tm allogic analyzer can capture traces:->state mod
13. ‘will work with any microprocessor:->logic anal}
14, TCB stands for:->In-Cireuit Emulator
15, Boundary condition testing is used for:->Testing g s at edge of planed operational limits
of software
16. Data testing is used for:->Checking infor jer Muputs and outputs
17. SDL stands for:->serial data line
18, Analog device is:-oseilloscope
19, In____allogic analyzer can capture state mode i
20. Linker/locators use__to ah put different parts of the code and data:>segments |
21. Simulator disadvantage is:>shay bugs
ige as a native compiler.:->eross-compiler
22. A___understands the
23. A common feature of in-cl tor is:->overlay memory
24, captures data yy ice to any events on the circuit itis examining.:->self-
collected
25. Linker/locators use’ decide where to put different parts of the code and data.;->segments \
26. A re ely compiled and assembly modules into an executable image.
inkerogger
ul
"as assembly language that is specific 1o your lurgel inicroprocessor.:->er0ss-
igns for:->both voltage and resistance difference
ich on@ is correct regarding multimeter: >both voltage and resistance difference
30. ‘which one is correct regarding ohmmeter:->resistance difference
1g voltmeter:->voltage difference
;oal of typical testing process is:->develop reusable, repeatable tests
RA device that replaces the ROM in the target system is:>Mash
. ‘use a combination of software and hardware to give you standard debugging capabilities.-
Smonitors
135. The goal of typical testing process is:->exerecise all code
36. Identify the correct utility tool in embedded design:->VCS
37. Identify the correct utility tool in embedded design:->Eaditors
38, Development tools can be used:->Within the development environment
39. VCS stand for:>version control software
40. Identify the correct utility tool in embedded design:->profiler
This Original Online Bits Is Proudly Presenting By www.jntukfastupdates.com
\ www jntukresult.com www.techpeworld.com www.jfujobs.com— y
Like This For Getting More Updates “www.fb.com/jntukin:
: www.jntufastupdates.com | .jntukfastupdates.c
41, SPICE stands for:->simulation program with integrated circuit emphasis
42. CAD stands for:->computer aided design
43, Identify the incorrect sentence regarding features of simulatot
bug from shared data
44, Identify the correct sentence for sirmulator:->Simt
processors in the decision lab
>A simulator may fail to show
tors are readily available for differen
45, Stethoscope is:-~To helps a doctor in diagnosis
46. Develop environment is typically made up of:>Both target and host
47. Identify the correct sentence for regarding drawback of simulator:->A simulator, to
show bug from shared data oS
48. IDE stand for:=>Integrated development environment
49. Identify in which ease debugging tools are used:->To track down and oye in the
system
50. Translation tools are used:->To convert code a developer intends fo fet in to a form
the target can execute a
51. The key development tools in embedded design can be located er the host or the target
or can exist stand alone
52. Host system is:->A pe or work station or laptop
53. Identify the correct sentence regarding system cost:->Cost are and hardware
54. System cost is:->Cost for software and hardware
55. Device programme is:->A device used for burnin; les
56. -xecution after an eveynt
57. ‘mefnory manager
58. ted per unit time
bytes
<>Preprocess output file
the cross compilation of embedded c project which
tion: >Objeet file
ene
is used to verifying the operation;
61, Which of the following file gener
holds data records for symbplic j
62. Which of the following fil
machine code correspond
63. Which of the following,
tool
64. Identify which is aXe regarding simulate based debugging:->Purely hardware based
65. ‘The main job of ffStyptt is:-Line by line translation to machine executable codes
66. ‘The proces 's machine codes into high level language is known as:->Decompiler
67. Which of the ing is true about a emulator:->It is self contained hardware drive
68. Ba 5 sree i ete ese OME
9. {tor's:>Input signal simulation tool
70. ‘>To Measure the electrical quantities like voltage, current resistance ete
n is:->For wave form capturing
2. -embler is:->process of converting a machine code into assembly code
TadeGXoS compilation is:->process of converting a source code to machine code
ich of the following intermediate file generated during the cross compilation of embedded
Ciles holds the information about the link/locate process in the multiple object modules of the
project:->map file
's. ‘The process that converts source codes into machine code is known as:->Cross compiler
76. The process that converts machine codes into target process specific assembly code is known as:~
>A Disassembler.
77. Decompiler is:->Translating machine code into corresponding high level language
78. Identify which one is hardware debugging tool:->OCD
This Original Online Bits Is Proudly Presenting By www.jntukfastupdates.com
www.jntukresult.com www.techpeworld.com www.jfujobs.com_
Like This For Getting More Update: ww.fb.com/jntukinfo
Visit : www.jntufastupdates.com | www.jntukfastupdates.com
79. Which format is used to represent BSDL file:->.bsd format
80. identify which mode is not regarding boundary scan cell:->sleep
81, Identify which tool is not used for hardware debugging tool:->CRO
82. Identify which one is hardware debugging tool:->Logic analyzer
83. Logic anlyser is:->For eapturing digital data
84. The magnifying glass is used:->To View the minute components
85. Identify which tool is used for onchip firmware debugging:->BDM interface
86. The TDI pin of TAP of the PCB is connected to the TDI pin of:->First device
87, Boundary scan is a technique used for:->Testing the interconnections among various chi
88. ‘can be used as program memory.:->NVRAM
89. Inthe normal mode , the i/p of boundary scan cell appears:->directly at its o/p
90. ‘The boundary scan cell is:->Multipurpose memory cell
91. Identify which instruction used for producing a pass/fail result:->Run bist
92. Identify which instruction is used for self test on the internal functions of th iSrpibis
93. BSDL stands for:->boundary scan description language
94. Boundary scan description language is used for:->implementing boundagfpcalPtests using
STAG
95. is a software application that precisely duplicates the target ferifiee the various
Features and instructions supported by the target CPU:->Simulato,
96, _is an erasable program memory.:>FLASH
97. In ISP with SPI protocol, the program data is sent to the ___ et device:->MOST
98. ___ model is generally used for modeling reactive or ev edded systems whose
processing behaviour are dependent on state transition iachine
99. isa self contained hardware device which is ar the target CPU which receives
‘various signals from target board through a device a fonnected between board and PC:-
>Emulator
100. VLIW stands for >Very Lon; Pn ‘Word
101. HCESM stands for ->Hierar¥icaConcurrent Finite State Machine
102. language is used for softwace ighplet@ntation.:->JAVA
103. In___architecture, the processing el ste different instructions at a given point of
time -=>MIMD
104. are used for capturing esas the system characteristics consisting of objects and
compiga rates opis xX
105. ‘model is used for ;pplications involving conditional program execution.:-
CDFG
106, ‘The length of instructiShgis Red in architecture.:->RISC
107 language is us ardware implementations.
108. language(s uged Ypr software implementation. ->C
109. ar combines the controller architecture with datapath architecture:->FSMD_
no. mode! sa complex software requirement into simple well defined pieces.:-
SObject OriGuted
1. s also called as communicating process model :->Concurrent
112. ge is generally used to capture HCFSM:->State Charts
113. 1 describes the system behavior with states, events, actions and transitions.:->FSM.
114, 3¢ following programming techniques consumes more development time?:->Out of
Programming
115, The file is generally embedded into the device for programming.:>.hex
116. In which of the following programming methods, the processor or memory chip into which the
firmware needs to be embedded is taken out of the target board.:->Out of Circuit Programming
117. Which of the following is generally not used for storing embedded firmware?:->RAM_
118. A ZIF Socket is used to program package:->DIP
This O1 al Online Bits Is Proudly Presenting By www.jntukfastupdates.cor
www.jotukresult.com www.techpeworld.com www.jfujobs.com—
Like This For Getting More Updates fb.com/jntukin
Visit : www.jntufastupdates.com | w intukfastupdates.c
119, JTAG stands for :->Joint Test Action Group
120. In ISP, the device acknowledgement is generally sent from pin of the device.:->MISO
121. isa technique used by the firmware running on the target device for modifying a
selected portion of the code memory.:->IAP
122, is a program which takes control of the OS and application firmware embedding
‘copying of the OS image to the RAM of the system for execution.:->Boot Loader
123. The key player behind ISP is a factory programmed memory called as >Bo
124, is Motorolas file format for locator file output:->.S_record
125, the Intels file format for locator file output.:->.hex
126. The program performs the task of reallocating the codes after fe physical
‘memory addresses available at a given instant.:->Loader
127. links the compiled codes of application software, object Nake os
Kemel>Linker
128. language is generally used for programming and implement ->State charts
129, EPROM stands for:->Electrically Programmable Read Only Ni
130, 1MIPS=____Dhrystones/second:$1737
BL. in Endian, the lower byte is present first in an inte Dive
32. A is allocated a memory block fora data =
i
ollection of pairs of a key and
‘a corresponding value.:->Hash table
133. A is a memory block from which a data el Iways read in a LIFO mode by the
proveor->Stuck
134. the amount of time spent by a process ly queue waiting to get the CPU time
for execution.:->Waiting Time
135, gives an indication of the number. othe executed per unit of time.:->Throughput
136. Ia multitasking, a task/process g to execute only when the current executing
task voluntarily relinquishes the CPU.:- prative
137, The act of switching CPU amongghe 6 or changing the current execution reyister,
memory, system resource usage is called as >Context Saving
138. In order to keep the CPU always scheduler runs a dummy process called
process.->IDLE,
139, The technique of gradually,
-P3 with estimated completion fime 10,5, 7milliseconds
‘queue together, then the waiting time for process P3 using SJF
selieduling algoril Sms
111, __approigs Wie otal virtual memory (paged memory) in Kilobytes used by the
process.:>V
142, In schei¥jing, each process in the ready queue is executed for a predefined time slot:-
>Round Rypi®
143, is used for accessing the task manager.:->CtrlAlt+Del
14, 8 deterministic timing behavior.:->Real time
ie ‘of loading the code into and out of the main memory is termed as__:->Swapping
140.
146 generally acts as a primary memory.:->RAM
1 __ is the core of the OS and is responsible for managing the system resources and the
‘communication among the hardware and other system services.:->Kernel
is an example of synchronous interrupts:->Divide by zero
. deals with sharing the CPU among various tasks /processes:->Scheduling
150, Hard real time systems does not contain____ which produces unexpected delay:->HITL
151, is used for holding the information corresponding to a task:->Task Control Block
152, RTOS that strictly adhere to the timing constraints for a task is referred as__system:->Hard
real time
al Online Bits Is Proudly Presenting By www.jntukfastupdates.com
www.jntukresult.com www.techpeworld.com www.jfujobs.comSs T
Like TI .
vi
For Getting More Updates ;.www.fb.com/jntukinfo
: www.jntufastupdates.com | www.jntukfastupdates.com
153. If the system time register is Sbits wide and the Timer Tick internal is Second, then the system
time register will reset after (Assume initial value of timer is 0x00h):->256 s
154, In MicroC/OS-II kernel ‘Slate represents the created state.-> DORMANT
155. In VxWorks, the. State represents a state in which task/process is sleeping.->DELAY
156. state refers to a state where a running process is temporarily suspended from exceution
and does not have immediate access to resources.;-> BLOCKED
157, The state where a process is incepted into the memory and awaiting the processor time for (~)
execution is known as, state->READY
158. A do not have Rs own data memory and heap memory.
159, InPOSIX thread calls, areturn value of generally indicates the success of the call
160. A isa single flow of control within a process. ->Thread ;
161 Slands for Portable Operating System Interface.:->POSIX G
162 threads donot have OS support and they exist solely in the running prog@@p.;->Oser
Level
163, ‘The thread remains in the wait state until another thread invokes the etily()
164. _ is apiece of software that acts as a bridge between thOS andware.-
SDevice driver
16s. primitive is used for assigning a socket to a port:->BINI
166. ‘API call is used to send a message using mess “>PostMessage
167. ‘sed for passing system calls to an Operatingifysipm:->API
168. anon functional requirement for choosing an, Cost
168. is a functional requirement for choosin rocessor support
110. & Semaphore can be used for both exclusfig ae8esb and limited access.->Counting
171. The Biggest drawback of priority ceiling is that it ce >Hidden
Priority Inversion
172. Producer consumer problem is generally sqjve .>Semaphores
173. ‘object is a synchronization tedpiqué Which uses the notification mechanism for
fa tw
frouizalion.>Event
174, a logical end poi vay communication link between two
applications running on a network.:->
175. is the solution for version problem.:->Priority Inheritance
176. socke' jon oriented.:->Stream
17. dont carry any dat
178. In ___condit 1 value of the shared data depends on the process which acted
on the data finally.:aRa
179. is an al@jgai¥form of message queue.:->Mail box
180. In esses, data is exchanged through shared resources.:->Cooperation
through sharin
condition a situation arises where none of the processes are able to make
ir execution:->Deadlock
language defines the interfaces for remote procedure call:->IDL.
is the condition in which a high priority task needs to wait for a low priority
fe a resource which is shared between the high priority , low priority and the medium
:->Priority Inversion
181, In
182.
183.
This Original Online Bits Is Proudly Presenting By www.jntukfastupdates.con
www.jotukresult.com www.techpeworld.com www.jfujobs.com