Está en la página 1de 5
- Like This For Getting More Updates : Rrerwietce mn? neaeintel Visit : www.jntufastupdates.com | www.jntukfastupdates.com 4-year 1ST SEM 28° MID ES 1. White dynamic testing is:->Testing running system while looking at code schematic ete Identify which is correct for boundary condition testing:->Testing situations at edge of pl: operational limits of software 3. Identify which is correct for data testing:->Ciecking information of user inputs and ‘4, Dynamic testing is done:->When the system is running 5, The main goal of testing and assuring the quality of system are:->Finding bugs esign 6. Identify the correct sentence regarding data testing:->Checking information of @ser Miputs and outputs 7. Identify which one is correct zegarding boundary scan testing:->Testing siffatioms at edge of planed operational limits of software 8. White box static testing is:->Testing is invalid data Re 9, Static testing is done:->Testing situations at edge of planed ove fits of software 10. Voltmeter is used for:->voltage differences mH is used for measuring resistance:->ohm meter & 6 > an ere 12. Tm allogic analyzer can capture traces:->state mod 13. ‘will work with any microprocessor:->logic anal} 14, TCB stands for:->In-Cireuit Emulator 15, Boundary condition testing is used for:->Testing g s at edge of planed operational limits of software 16. Data testing is used for:->Checking infor jer Muputs and outputs 17. SDL stands for:->serial data line 18, Analog device is:-oseilloscope 19, In____allogic analyzer can capture state mode i 20. Linker/locators use__to ah put different parts of the code and data:>segments | 21. Simulator disadvantage is:>shay bugs ige as a native compiler.:->eross-compiler 22. A___understands the 23. A common feature of in-cl tor is:->overlay memory 24, captures data yy ice to any events on the circuit itis examining.:->self- collected 25. Linker/locators use’ decide where to put different parts of the code and data.;->segments \ 26. A re ely compiled and assembly modules into an executable image. inkerogger ul "as assembly language that is specific 1o your lurgel inicroprocessor.:->er0ss- igns for:->both voltage and resistance difference ich on@ is correct regarding multimeter: >both voltage and resistance difference 30. ‘which one is correct regarding ohmmeter:->resistance difference 1g voltmeter:->voltage difference ;oal of typical testing process is:->develop reusable, repeatable tests RA device that replaces the ROM in the target system is:>Mash . ‘use a combination of software and hardware to give you standard debugging capabilities.- Smonitors 135. The goal of typical testing process is:->exerecise all code 36. Identify the correct utility tool in embedded design:->VCS 37. Identify the correct utility tool in embedded design:->Eaditors 38, Development tools can be used:->Within the development environment 39. VCS stand for:>version control software 40. Identify the correct utility tool in embedded design:->profiler This Original Online Bits Is Proudly Presenting By www.jntukfastupdates.com \ www jntukresult.com www.techpeworld.com www.jfujobs.com — y Like This For Getting More Updates “www.fb.com/jntukin: : www.jntufastupdates.com | .jntukfastupdates.c 41, SPICE stands for:->simulation program with integrated circuit emphasis 42. CAD stands for:->computer aided design 43, Identify the incorrect sentence regarding features of simulatot bug from shared data 44, Identify the correct sentence for sirmulator:->Simt processors in the decision lab >A simulator may fail to show tors are readily available for differen 45, Stethoscope is:-~To helps a doctor in diagnosis 46. Develop environment is typically made up of:>Both target and host 47. Identify the correct sentence for regarding drawback of simulator:->A simulator, to show bug from shared data oS 48. IDE stand for:=>Integrated development environment 49. Identify in which ease debugging tools are used:->To track down and oye in the system 50. Translation tools are used:->To convert code a developer intends fo fet in to a form the target can execute a 51. The key development tools in embedded design can be located er the host or the target or can exist stand alone 52. Host system is:->A pe or work station or laptop 53. Identify the correct sentence regarding system cost:->Cost are and hardware 54. System cost is:->Cost for software and hardware 55. Device programme is:->A device used for burnin; les 56. -xecution after an eveynt 57. ‘mefnory manager 58. ted per unit time bytes <>Preprocess output file the cross compilation of embedded c project which tion: >Objeet file ene is used to verifying the operation; 61, Which of the following file gener holds data records for symbplic j 62. Which of the following fil machine code correspond 63. Which of the following, tool 64. Identify which is aXe regarding simulate based debugging:->Purely hardware based 65. ‘The main job of ffStyptt is:-Line by line translation to machine executable codes 66. ‘The proces 's machine codes into high level language is known as:->Decompiler 67. Which of the ing is true about a emulator:->It is self contained hardware drive 68. Ba 5 sree i ete ese OME 9. {tor's:>Input signal simulation tool 70. ‘>To Measure the electrical quantities like voltage, current resistance ete n is:->For wave form capturing 2. -embler is:->process of converting a machine code into assembly code TadeGXoS compilation is:->process of converting a source code to machine code ich of the following intermediate file generated during the cross compilation of embedded Ciles holds the information about the link/locate process in the multiple object modules of the project:->map file 's. ‘The process that converts source codes into machine code is known as:->Cross compiler 76. The process that converts machine codes into target process specific assembly code is known as:~ >A Disassembler. 77. Decompiler is:->Translating machine code into corresponding high level language 78. Identify which one is hardware debugging tool:->OCD This Original Online Bits Is Proudly Presenting By www.jntukfastupdates.com www.jntukresult.com www.techpeworld.com www.jfujobs.com _ Like This For Getting More Update: ww.fb.com/jntukinfo Visit : www.jntufastupdates.com | www.jntukfastupdates.com 79. Which format is used to represent BSDL file:->.bsd format 80. identify which mode is not regarding boundary scan cell:->sleep 81, Identify which tool is not used for hardware debugging tool:->CRO 82. Identify which one is hardware debugging tool:->Logic analyzer 83. Logic anlyser is:->For eapturing digital data 84. The magnifying glass is used:->To View the minute components 85. Identify which tool is used for onchip firmware debugging:->BDM interface 86. The TDI pin of TAP of the PCB is connected to the TDI pin of:->First device 87, Boundary scan is a technique used for:->Testing the interconnections among various chi 88. ‘can be used as program memory.:->NVRAM 89. Inthe normal mode , the i/p of boundary scan cell appears:->directly at its o/p 90. ‘The boundary scan cell is:->Multipurpose memory cell 91. Identify which instruction used for producing a pass/fail result:->Run bist 92. Identify which instruction is used for self test on the internal functions of th iSrpibis 93. BSDL stands for:->boundary scan description language 94. Boundary scan description language is used for:->implementing boundagfpcalPtests using STAG 95. is a software application that precisely duplicates the target ferifiee the various Features and instructions supported by the target CPU:->Simulato, 96, _is an erasable program memory.:>FLASH 97. In ISP with SPI protocol, the program data is sent to the ___ et device:->MOST 98. ___ model is generally used for modeling reactive or ev edded systems whose processing behaviour are dependent on state transition iachine 99. isa self contained hardware device which is ar the target CPU which receives ‘various signals from target board through a device a fonnected between board and PC:- >Emulator 100. VLIW stands for >Very Lon; Pn ‘Word 101. HCESM stands for ->Hierar¥icaConcurrent Finite State Machine 102. language is used for softwace ighplet@ntation.:->JAVA 103. In___architecture, the processing el ste different instructions at a given point of time -=>MIMD 104. are used for capturing esas the system characteristics consisting of objects and compiga rates opis xX 105. ‘model is used for ;pplications involving conditional program execution.:- CDFG 106, ‘The length of instructiShgis Red in architecture.:->RISC 107 language is us ardware implementations. 108. language(s uged Ypr software implementation. ->C 109. ar combines the controller architecture with datapath architecture:->FSMD_ no. mode! sa complex software requirement into simple well defined pieces.:- SObject OriGuted 1. s also called as communicating process model :->Concurrent 112. ge is generally used to capture HCFSM:->State Charts 113. 1 describes the system behavior with states, events, actions and transitions.:->FSM. 114, 3¢ following programming techniques consumes more development time?:->Out of Programming 115, The file is generally embedded into the device for programming.:>.hex 116. In which of the following programming methods, the processor or memory chip into which the firmware needs to be embedded is taken out of the target board.:->Out of Circuit Programming 117. Which of the following is generally not used for storing embedded firmware?:->RAM_ 118. A ZIF Socket is used to program package:->DIP This O1 al Online Bits Is Proudly Presenting By www.jntukfastupdates.cor www.jotukresult.com www.techpeworld.com www.jfujobs.com — Like This For Getting More Updates fb.com/jntukin Visit : www.jntufastupdates.com | w intukfastupdates.c 119, JTAG stands for :->Joint Test Action Group 120. In ISP, the device acknowledgement is generally sent from pin of the device.:->MISO 121. isa technique used by the firmware running on the target device for modifying a selected portion of the code memory.:->IAP 122, is a program which takes control of the OS and application firmware embedding ‘copying of the OS image to the RAM of the system for execution.:->Boot Loader 123. The key player behind ISP is a factory programmed memory called as >Bo 124, is Motorolas file format for locator file output:->.S_record 125, the Intels file format for locator file output.:->.hex 126. The program performs the task of reallocating the codes after fe physical ‘memory addresses available at a given instant.:->Loader 127. links the compiled codes of application software, object Nake os Kemel>Linker 128. language is generally used for programming and implement ->State charts 129, EPROM stands for:->Electrically Programmable Read Only Ni 130, 1MIPS=____Dhrystones/second:$1737 BL. in Endian, the lower byte is present first in an inte Dive 32. A is allocated a memory block fora data = i ollection of pairs of a key and ‘a corresponding value.:->Hash table 133. A is a memory block from which a data el Iways read in a LIFO mode by the proveor->Stuck 134. the amount of time spent by a process ly queue waiting to get the CPU time for execution.:->Waiting Time 135, gives an indication of the number. othe executed per unit of time.:->Throughput 136. Ia multitasking, a task/process g to execute only when the current executing task voluntarily relinquishes the CPU.:- prative 137, The act of switching CPU amongghe 6 or changing the current execution reyister, memory, system resource usage is called as >Context Saving 138. In order to keep the CPU always scheduler runs a dummy process called process.->IDLE, 139, The technique of gradually, -P3 with estimated completion fime 10,5, 7milliseconds ‘queue together, then the waiting time for process P3 using SJF selieduling algoril Sms 111, __approigs Wie otal virtual memory (paged memory) in Kilobytes used by the process.:>V 142, In schei¥jing, each process in the ready queue is executed for a predefined time slot:- >Round Rypi® 143, is used for accessing the task manager.:->CtrlAlt+Del 14, 8 deterministic timing behavior.:->Real time ie ‘of loading the code into and out of the main memory is termed as__:->Swapping 140. 146 generally acts as a primary memory.:->RAM 1 __ is the core of the OS and is responsible for managing the system resources and the ‘communication among the hardware and other system services.:->Kernel is an example of synchronous interrupts:->Divide by zero . deals with sharing the CPU among various tasks /processes:->Scheduling 150, Hard real time systems does not contain____ which produces unexpected delay:->HITL 151, is used for holding the information corresponding to a task:->Task Control Block 152, RTOS that strictly adhere to the timing constraints for a task is referred as__system:->Hard real time al Online Bits Is Proudly Presenting By www.jntukfastupdates.com www.jntukresult.com www.techpeworld.com www.jfujobs.com Ss T Like TI . vi For Getting More Updates ;.www.fb.com/jntukinfo : www.jntufastupdates.com | www.jntukfastupdates.com 153. If the system time register is Sbits wide and the Timer Tick internal is Second, then the system time register will reset after (Assume initial value of timer is 0x00h):->256 s 154, In MicroC/OS-II kernel ‘Slate represents the created state.-> DORMANT 155. In VxWorks, the. State represents a state in which task/process is sleeping.->DELAY 156. state refers to a state where a running process is temporarily suspended from exceution and does not have immediate access to resources.;-> BLOCKED 157, The state where a process is incepted into the memory and awaiting the processor time for (~) execution is known as, state->READY 158. A do not have Rs own data memory and heap memory. 159, InPOSIX thread calls, areturn value of generally indicates the success of the call 160. A isa single flow of control within a process. ->Thread ; 161 Slands for Portable Operating System Interface.:->POSIX G 162 threads donot have OS support and they exist solely in the running prog@@p.;->Oser Level 163, ‘The thread remains in the wait state until another thread invokes the etily() 164. _ is apiece of software that acts as a bridge between thOS andware.- SDevice driver 16s. primitive is used for assigning a socket to a port:->BINI 166. ‘API call is used to send a message using mess “>PostMessage 167. ‘sed for passing system calls to an Operatingifysipm:->API 168. anon functional requirement for choosing an, Cost 168. is a functional requirement for choosin rocessor support 110. & Semaphore can be used for both exclusfig ae8esb and limited access.->Counting 171. The Biggest drawback of priority ceiling is that it ce >Hidden Priority Inversion 172. Producer consumer problem is generally sqjve .>Semaphores 173. ‘object is a synchronization tedpiqué Which uses the notification mechanism for fa tw frouizalion.>Event 174, a logical end poi vay communication link between two applications running on a network.:-> 175. is the solution for version problem.:->Priority Inheritance 176. socke' jon oriented.:->Stream 17. dont carry any dat 178. In ___condit 1 value of the shared data depends on the process which acted on the data finally.:aRa 179. is an al@jgai¥form of message queue.:->Mail box 180. In esses, data is exchanged through shared resources.:->Cooperation through sharin condition a situation arises where none of the processes are able to make ir execution:->Deadlock language defines the interfaces for remote procedure call:->IDL. is the condition in which a high priority task needs to wait for a low priority fe a resource which is shared between the high priority , low priority and the medium :->Priority Inversion 181, In 182. 183. This Original Online Bits Is Proudly Presenting By www.jntukfastupdates.con www.jotukresult.com www.techpeworld.com www.jfujobs.com

También podría gustarte