Exam 2: Embedded Systems and Communication Protocols
Exam 1: Chip Design, Protocols, and Communication24 Questions
Exam 2: Embedded Systems and Communication Protocols25 Questions
Exam 3: Computer Bus and IO Operations22 Questions
Exam 4: ISA, Communication Modes, Wlan, Serial Protocols, ARM Processors, and Real-Time Systems25 Questions
Exam 5: Real Time Operating Systems and Scheduling Techniques25 Questions
Exam 6: Real-Time Operating System Scheduling and Job Management14 Questions
Select questions type
Which of the following are external pins whose logic state can be controlled by the processor to either be a logic zero or logic one is known as
(Multiple Choice)
4.8/5
(36)
Which types of an embedded systems involve the coding at a simple level in an embedded 'C', without any necessity of RTOS?
(Multiple Choice)
4.8/5
(42)
Which method of multiple secondary communication in TDMA is acquired/adopted by bluetooth especially where data integrity becomes more crucial than avoiding latency?
(Multiple Choice)
4.8/5
(35)
The upper 128 bytes of an internal data memory from 80H through FFH usually represent ___________.
(Multiple Choice)
4.9/5
(43)
Unauthorised access of information from a wireless device through a bluetooth connection is called _________
(Multiple Choice)
4.8/5
(33)
Showing 21 - 25 of 25
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)