Top 150+ Solved Embedded and Real Time System MCQ Questions Answer
Q. The scheduler admits a process using
a. two phase locking protocol
b. admission control algorithm
c. busy wait polling
d. none of the mentioned
Q. Rate monotonic scheduling assumes that the
a. processing time of a periodic process is same for each cpu burst
b. processing time of a periodic process is different for each cpu burst
c. periods of all processes is the same
d. none of the mentioned
Q. In rate monotonic scheduling, a process with a shorter period is assigned
a. a higher priority
b. a lower priority
c. higher & lower priority
d. none of the mentioned
Q. Is it possible to schedule these tasks so that each meets its deadline using Rate monotonic scheduling?
a. yes
b. no
c. maybe
d. none of the mentioned
Q. If a set of processes cannot be scheduled by rate monotonic scheduling algorithm, then
a. they can be scheduled by edf algorithm
b. they cannot be scheduled by edf algorithm
c. they cannot be scheduled by any other algorithm
d. none of the mentioned
Q. A process P1 has a period of 50 and a CPU burst of t1 = 25, P2 has a period of 80 and a CPU burst of 35. Can the processes be scheduled without missing the deadlines?
a. yes
b. no
c. maybe
d. none of the mentioned
Q. What type of fault remains in the system for some period and then disappears?
a. permanent
b. transient
c. intermittent
d. all of the mentioned
Q. Which of the following approaches are used to achieve reliable systems?
a. fault prevention
b. fault removal
c. fault tolerance
d. all of the mentioned
Q. A system maintaining its integrity while accepting a temporary halt in its operation is said to be in a state of
a. full fault tolerance
b. graceful degradation
c. fail soft
d. fail safe
Q. Which of the following Error Detection checks is not a part of Application detection?
a. hardware checks
b. timing checks
c. reversal checks
d. coding checks
Q. Exception handling is a type of
a. forward error recovery mechanism
b. backward error recovery mechanism
c. all of the mentioned
d. none of the mentioned
Q. Non-occurrence of improper alteration of information is known as
a. available dependability
b. confidential dependability
c. maintainable dependability
d. integral dependability
Q. In N-version programming which is the independent generation of N, the value of N is
a. greater than 1
b. less than 1
c. greater than 2
d. less than 2
Q. Which of the following can carry information and control task?
a. semaphore
b. messages
c. flags
d. address message