Hardware & Software Concepts
FC-AL supports ______ MBps packet transmission in one direction, with a theoretical maximum of _______ devices in the loop.
100/127
If a cache access requires one clock cycle and dealing with cache misses requires an additional five clock cycles, which of the following cache hit rates results in an effective access time of 2 clock cycles?
80%
The embedded systems programmer typically writes programs exclusively in _____does not have the luxury o after-the-fact performance tuning.
Assembly language
The wireless protocol suitable for a piconet is:
Bluetooth
The device that functions primarily at layer 2 that can join two similar types of networks so they look like one network (subnet) is called a_______.
Bridge
The IPv4 address 64.122.34.252 is a _____ network address
Class A
The IPv4 address 136.11.22.116 is a ______network address.
Class B
Which of the following types of memory needs to be refreshed periodically to maintain its data?
DRAM
The ISO/OSI layer that organizes messages bytes into frames of suitable size for transmission along the physical medium is the _______ layer.
Data Link
Distance vector routing considers latency in the network before assigning a route to a packet. T/F
False
It is possible for a computer with a single logical address to have more than one NIC, each with a distinct MAC address. T/F
False
One problem with Flynn's taxonomy is with the MIMD category; there are very few, if any, applications for this type of architecture. True/False
False
Superpipelining occurs when a pipeline has stages that require less than two clock cycles to execute.
False
Switches handle only one packet at a time, while hubs handle multiple incoming and outgoing packets simultaneously. T/F
False
VDHL is an abbreviation for Very high-speed integrated system Hardware Design Language. True/False
False
The device that can connect networks having vastly different organizations and protocols is a ________.
Gateway
A Layer 1 device whose primary purpose is to receive incoming packages from one or more locations and broadcast the packets to one or more devices on the network is called a _______.
Hub
The organization that controls the names of the host computers on the Internet is (the)______
ICANN
Two interfaces that support hot plugging are USB and ________.
IEEE 1394 (FireWire)
Twisted pair cabling is twisted in order to reduce _________.
Inductance
The _______ is the core of the operating system
Kernel
_____ is the process of removing the beginning or ending statements from a loop.
Loop peeling
The class A address 127.x.x.x is a network address reserved for
Loopback testing
The unique physical address burned into every network interface card is its:
MAC address
The transmission mode whereby a single message is placed on the network to be read by multiple nodes is called________.
Multicasting
_____ allows multiple processes to run cocurrently.
Multitasking
Modern CPU's need only a few ______ to execute an instruction when all operands are in its registers
Nanoseconds
The ISO/OSI layer responsible for routing PUDs across intermediate nodes is the______ layer.
Network
The electrical phenomena that work against the accurate transmission of signals are called _______.
Noise
At gigabits speeds, a 65,535-byte IP datagram passes over a given point in less than _________
1ms
The theoretical maximum number of hosts under IPv6 is_______.
2^128
Assuming an 8-bit virtual address with pages of 32 bytes, the virtual address format is:
3 bits for the page and 5 bits for the offset
Java _____ are bytecode that runs in browsers
Applets
A network that covers more than one building that is entirely owned or controlled by the same entity is called a _______.
Campus network
Measures of ______ indicate to us the expected behavior of the samples system
Central tendency
_____ is EEPROM that can be written and erased in blocks
Flash memory
The early computer networking protocol that provided nearly instantaneous access between client terminals and host computers was:
SNA
IEEE 1394 supports all of the following transfer modes except________
Synchronous
DVDs rotate at about ____ times the speed of cds
Three
Quantum computers use quantum bits (quibits) that can be in multiple states simultaneously. T/F
True
Security experts caution that wired equivalent privacy (WEP) is insufficient to block all types of network intrusion. T/F
True
________contains constants and literals used by the embedded program and its stored here to protect them from accidental overwrites.
read-only memory
Many networks running at 100Mbps and above encode 4 bits in 5 baud using______ signaling.
PRML
The two ISO/OSI layers that do not have a direct correspondence with TCP/IP are the _____ later and the ______layer
Physical and data link
Systems that require high availability and must be able to tolerate more than on concurrent drive failure use:
RAID-6
____ memory allows data to be both read from and written to easily and rapidly
RAM
The basic difference between RAM and ROM memory is:
RAM is read/write while ROM is ready only
Only explicit load and store instructions are permitted access to memory in _________ machines.
RISC
Which of the following types of memory has the shortest (fastest) access time?
Registers
The main purpose of a ______ is to reduce attenuation, although some models provide other functions in addition to this.
Repeater
The Layer 3 device connected to at least two networks that determines the destination to which a packer should be forwarded is a ________.
Router
______delays the binding process until the process is actually running
Run-time binding
______ benchmarks are helpful to computer buyers whose prime concern is CPU performance
SPEC's CPU
_______ are divisions of concentric circles (tracks) on disk drives.
Sectors
_________schedules the processor giving preference to the job with the shortest execution time.
Shortest job first scheduling
SCSI is the acronym for _________.
Small Computer Systems Interface
SPEC stands for:
Standard Performance Evaluation Corporation
______routing works best in networks where a large number of users in one location use a centralized host, or gateway, in another location.
Static
A Layer 2 device whose primary purpose is to create a point-to-point connection between one of its input ports and one of its output ports is called a________.
Switch
_________Computers derive their name from drawing an analogy to how blood rhythmically flows through a biological heart.
Systolic array
Direct mapping is set associative mapping with a set size of 1. T/F
True
Embedded systems differ from general-purpose computers because they are designated to carry out a limited set of tasks. T/F
True
Embedded systems rarely use virtual memory
True
In embedded systems, one major challenge is that the events can happen asynchronously and can occur in any order, making it impossible to test all possible sequences of events. T/F
True
It is possible for a single host to support both IPV4 and IPv6. T/F
True
One of the problems that IPv6 is intended to solve is the lack of Class B address space. T/F
True
TCP is a connection-oriented protocol. T/F
True
The problem with unstructured code in embedded system is that it can be hard to maintain. True/False
True
The unstructured code is called "spaghetti" code. T/F
True
When a computer uses paging, there must be a page table for every process. T/F
True
aggregatable global unicast address format of IPv6 helps keep the size of router tables under control. T/F
True
Shared memory MIMD machines can be divided into two categories _________ and _________.
UMA, NUMA
What characteristic of RAM makes it unsuitable for permanent storage?
Volatile
Large computer systems use an intelligent type of DMA interface known as:
an I/O channel
Solid state drives:
are built using flash memory
Buses that require handshakes to take place every time the bus is accessed are called:
asynchronous buses
"Locality of reference" refers to:
clustering of memory references
The sole purpose of IP is to________.
correctly route diagrams across the network
When obsolete routes can persist in the routing tables, packets can be misrouted or lost. This problem is known as the ______ problem.
count-to-infinity
The computation sequence of a dataflow computer can be understood by examining its:
dataflow graph
Memory segmentation can result in____ fragmentation, which paging can result in _____ fragmentation.
external, internal
Information can be retrieved fastest from:
hard disk
When the requested data resides in a given level of memory, we call this a:
hit
The tag field of a main memory address is used to determine:
if the cache entry is the desired block
The first internetwork provided protocol translations for different systems including
interface message processors
A major advantage of direct mapped cache is its simplicity and ease of implementation. The main disadvantage of direct mapped cache is:
its performance is degraded if two or more blocks that map the same location are used alternately
Lineal spaces between the pits in a CD-ROM are called:
lands
It would be very easy for the computer buyer if there were some way to classify systems according to a _______.
metric
Cache memory is effective because:
of the principle of locality
(A) ____ is a precursor to modern operating systems that allowed programs to be processed without human interaction
resident monitor
Upon detecting an error, the ISO/OSI layer that requests transmission of a PDU is the_____layer.
session
Specially designed hardware units, known as __________, monitor inconsistencies in caches in a multiprocessor system.
snoopy cache controllers
The extra line used for synchronization in parallel data transmission is called a:
strobe
Cache memory is typically positioned between:
the CPU and RAM
The purpose of a TLB is
to cache page table entries
Cache replacement policies are necessary:
to determine which block in cache should be the victim block
