Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

Which writing mechanism forms the backbone of the bus snooping mechanism?(a) write-back(b) write-through(c) no caching of write cycles(d) write bufferI had been asked this question by my college director while I was bunking the class.The question is from Writing Scheme of Cache Memory in division Memory Systems of Embedded Systems

Answer»

The correct choice is (c) no caching of write cycles

The explanation: The no caching of write cycle SEEMS to be wasteful because it does not update the cache, and if any PREVIOUS data is cached, that entry might be an error and is not used. So the processor access data from the main memory but this WRITING scheme forms the backbone of the bus SNOOPING system for the coherency issue.

2.

In which writing scheme does all the data writes go through to main memory and update the system and cache?(a) write-through(b) write-back(c) write buffering(d) no caching of writing cycleThe question was asked in an international level competition.I'd like to ask this question from Writing Scheme of Cache Memory topic in division Memory Systems of Embedded Systems

Answer»

The correct CHOICE is (a) write-through

To elaborate: There are different WRITING scheme in the CACHE memory which increases the cache efficiency and one such is the write-through in which all the data GO to the main memory and can update the system as well as the cache.

3.

Which of the following protocol matches the MC68040?(a) MCM62486(b) US 5729504 A(c) HyperBus(d) MCM62940I have been asked this question in final exam.The question is from Burst Interfaces in division Memory Systems of Embedded Systems

Answer»

The correct OPTION is (d) MCM62940

The explanation is: The MCM62940 and MCM62486 are the specific PROTOCOLS developed by Motorola, in which the MCM62940 has an on-chip COUNTER which matches the wrap-around BURST interfacing of the MC68040.

4.

How can gate delays be reduced?(a) synchronous memory(b) asynchronous memory(c) pseudo asynchronous memory(d) symmetrical memoryThis question was addressed to me in an interview for internship.I would like to ask this question from Burst Interfaces in chapter Memory Systems of Embedded Systems

Answer»

Correct option is (a) synchronous MEMORY

To explain: The burst INTERFACED is associated with the SRAM and for the efficiency of the SRAM, it uses a synchronous memory on-chip LATCHES to REDUCE the gate DELAYS.

5.

What does MESI stand for?(a) modified exclusive stale invalid(b) modified exclusive shared invalid(c) modified exclusive system input(d) modifies embedded shared invalidThis question was posed to me in an interview for job.The above asked question is from Writing Scheme of Cache Memory in chapter Memory Systems of Embedded Systems

Answer»

The correct option is (b) MODIFIED exclusive shared invalid

To explain I WOULD say: The MESI protocol supports a shared state which is a formal mechanism for CONTROLLING the cache coherency by using the BUS snooping techniques. MESI refers to the states that cached data can ACCESS. In MESI protocol, multiple processors can cache shared data.

6.

How does the memory management unit provide the protection?(a) disables the address translation(b) enables the address translation(c) wait for the address translation(d) remains unchangedI have been asked this question in class test.Asked question is from Memory Protection Unit topic in portion Memory Systems of Embedded Systems

Answer»

Right choice is (a) disables the address translation

The best explanation: The MEMORY MANAGEMENT unit can be USED as a PROTECTION unit by disabling the address translation that is, the PHYSICAL address and the logical address are the same.

7.

Which of the following bits are used to control the cache behaviour?(a) cacheable bit(b) buffer bit(c) cacheable bit and buffer bit(d) cacheable bit, buffer bit and permission access bitThe question was posed to me during an interview for a job.I'd like to ask this question from Memory Protection Unit topic in chapter Memory Systems of Embedded Systems

Answer»

Correct choice is (c) cacheable bit and buffer bit

To EXPLAIN: The cacheable bit and the buffer bit are USED to CONTROL the behaviour of cache. Depending on the cacheable bit and the buffer bit, the memory access will complete successfully.

8.

How many regions are created by the memory range in the ARM architecture?(a) 4(b) 8(c) 16(d) 32The question was posed to me in quiz.The doubt is from Memory Protection Unit topic in chapter Memory Systems of Embedded Systems

Answer»

Correct option is (b) 8

The explanation is: The MEMORY protection unit in the ARM ARCHITECTURE divides the memory into eight separate regions. Each REGION can be small as well as big ranging from 4 Kbytes to 4 Gbytes.

9.

How many bits does the memory region in the ARM memory protection unit have?(a) 1(b) 2(c) 3(d) 4This question was addressed to me in an online interview.I need to ask this question from Memory Protection Unit topic in chapter Memory Systems of Embedded Systems

Answer»

The correct answer is (C) 3

The best I can explain: The MEMORY REGION possesses three bits which are the cacheable bit, bufferable bit and access PERMISSION bit.

10.

Which of the following is the biggest challenge in the cache memory design?(a) delay(b) size(c) coherency(d) memory accessThe question was posed to me in class test.My query is from Writing Scheme of Cache Memory in division Memory Systems of Embedded Systems

Answer»

Correct CHOICE is (c) coherency

To elaborate: The coherency is a major challenge in designing the cache memory. The cache has to be designed by SOLVING the problem of data coherency while REMAINING hardware and SOFTWARE compatible.

11.

What is the disadvantage of a fully associative cache?(a) hardware(b) software(c) memory(d) peripheralsI have been asked this question in an interview for internship.I want to ask this question from Size of Cache in division Memory Systems of Embedded Systems

Answer» CORRECT choice is (a) hardware

Explanation: The major disadvantage of the fully associative cache is the amount of hardware needed for the comparison INCREASES in proportion to the cache SIZE and hence, LIMITS the fully associative cache.
12.

Which of the following cache has a separate comparator for each entry?(a) direct mapped cache(b) fully associative cache(c) 2-way associative cache(d) 16-way associative cacheThis question was posed to me in class test.This question is from Size of Cache in division Memory Systems of Embedded Systems

Answer»

Right CHOICE is (B) fully ASSOCIATIVE CACHE

Easy explanation: A fully associative cache have a COMPARATOR for each entry so that all the entries can be tested simultaneously.

13.

Which cache mapping have a sequential execution?(a) direct mapping(b) fully associative(c) n way set associative(d) burst fillThe question was asked by my college professor while I was bunking the class.The above asked question is from Size of Cache topic in section Memory Systems of Embedded Systems

Answer» CORRECT ANSWER is (d) burst fill

To explain I would say: The burst fill mode of cache mapping have a SEQUENTIAL nature of executing instructions and data access. The instruction fetches and execution accesses to sequential memory locations until it has a jump instruction or a branch instruction. This KIND of cache mapping is seen in the MC68030 processor.
14.

In which writing scheme does the cache is updated but the main memory is not updated?(a) write-through(b) write-back(c) no caching of writing cycle(d) write bufferingThe question was posed to me during an interview.My question is based upon Writing Scheme of Cache Memory topic in portion Memory Systems of Embedded Systems

Answer»

Correct answer is (b) write-back

For explanation: The cache write-back mechanism needs a BUS SNOOPING SYSTEM for the coherency. In this write-back scheme, the cache is UPDATED first and the main memory is not updated.

15.

Which of the following is a Motorola’s protocol product?(a) MCM62940(b) Avalon(c) Slave interfaces(d) AXI slave interfacesI had been asked this question in an international level competition.I'm obligated to ask this question of Burst Interfaces topic in section Memory Systems of Embedded Systems

Answer» RIGHT choice is (a) MCM62940

To explain I WOULD SAY: MCM62940 protocol is developed by Motorola, whereas SLAVE INTERFACES, AXI slave interfaces are for ARM. Avalon is developed by Altera.
16.

Which of the following uses a wrap around burst interfacing?(a) MC68030(b) MC68040(c) HyperBus(d) US 5729504 AThis question was addressed to me during an internship interview.My question is based upon Burst Interfaces in portion Memory Systems of Embedded Systems

Answer» CORRECT choice is (b) MC68040

Explanation: MC68040is DEVELOPED by the Motorola which uses a WRAP around burst interfacing. MC68030 is also developed by Motorola but it uses a linear line fill burst. HYPERBUS can switch to both linear and wrap around burst. US 5729504 A uses a linear burst fill.
17.

How many comparators present in the direct mapping cache?(a) 3(b) 2(c) 1(d) 4I had been asked this question by my college director while I was bunking the class.This intriguing question originated from Size of Cache topic in portion Memory Systems of Embedded Systems

Answer»

The correct answer is (c) 1

For EXPLANATION: The direct mapping cache have only one COMPARATOR so that only one location POSSIBLY have all the DATA irrespective of the cache size.

18.

What does “G” in the descriptor entry describe?(a) gain(b) granularity(c) gate voltage(d) global descriptorThe question was posed to me in an online interview.This interesting question is from Segmentation and Paging topic in section Memory Systems of Embedded Systems

Answer»

The correct option is (b) granularity

Easiest explanation: The granularity bit controls the resolution of the segmented MEMORY. When it is SET to LOGIC one, the resolution is 4 KB. When the granularity bit is set to logic ZERO, the resolution is 1 byte.

19.

Which of the following have an 8 KB page?(a) DEC Alpha(b) ARM(c) VAX(d) PowerPCThis question was posed to me in exam.Question is from Segmentation and Paging in chapter Memory Systems of Embedded Systems

Answer»

Right choice is (a) DEC Alpha

To explain: DEC Alpha DIVIDES its memory into 8KB PAGES whereas VAX is a small PAGE which is only 512 bytes in size. PowerPC pages are normally 4 KB and ARM is having 4 KB and 64 KB pages.

20.

Which of the following memory access can reduce the clock cycles?(a) bus interfacing(b) burst interfacing(c) dma(d) dramThe question was posed to me in homework.The origin of the question is Burst Interfaces topic in portion Memory Systems of Embedded Systems

Answer»

Right option is (B) BURST interfacing

The explanation: The burst interfaces reduces the clock CYCLES. For fetching four words with a three clock memory, it will take 12 clock cycle but in the burst interface, it will only take FIVE clocks to ACCESS the data.

21.

What leads to the development of MESI and MEI protocol?(a) cache size(b) cache coherency(c) bus snooping(d) number of cachesThis question was posed to me during an online interview.Asked question is from Writing Scheme of Cache Memory topic in chapter Memory Systems of Embedded Systems

Answer»

Correct CHOICE is (b) cache COHERENCY

For explanation I would say: The problem of cache coherency lead to the formation of two STANDARD mechanisms called MESI and MEI PROTOCOL. MC88100 have MESI protocol and MC68040 USES an MEI protocol.

22.

Which of the following uses a bus snooping mechanism?(a) MC88100(b) 8086(c) 8051(d) 80286The question was posed to me in an interview for job.This is a very interesting question from Writing Scheme of Cache Memory topic in portion Memory Systems of Embedded Systems

Answer»

Right choice is (a) MC88100

To explain: The bus snooping MECHANISM uses a combination of cache tag STATUS, write policies and bus monitoring to ENSURE coherency. MC88100 or MC88200 uses bus snooping mechanism.

23.

Which of the following cache mapping can prevent bus thrashing?(a) fully associative(b) direct mapping(c) n way set associative(d) 2 way associativeI got this question in an interview for job.This question is from Size of Cache in chapter Memory Systems of Embedded Systems

Answer»

The correct choice is (c) n way set ASSOCIATIVE

To explain: Only one data can be accessed in direct mapping that is, if one word is accessed at a time, all other words are discarded at the same time. This is known as BUS thrashing which can be SOLVED by splitting up the caches so there are 2,4,..n possible entries AVAILABLE. The major advantage of the set associative cache is its capability to prevent the bus thrashing at the EXPENSE of hardware.

24.

In which memory does the burst interfaces act as a part of the cache?(a) DRAM(b) ROM(c) SRAM(d) Flash memoryI had been asked this question in an online interview.My enquiry is from Burst Interfaces in chapter Memory Systems of Embedded Systems

Answer»

Right answer is (c) SRAM

For EXPLANATION I WOULD SAY: The BURST interface is ASSOCIATED with the static RAM.

25.

Which of the following has a separate cache for the data and instructions?(a) unified(b) harvard(c) logical(d) physicalI have been asked this question during an online interview.The above asked question is from Size of Cache topic in portion Memory Systems of Embedded Systems

Answer»

The correct option is (B) harvard

The explanation is: The Harvard cache have a separate cache for the data and the instruction WHEREAS the UNIFIED cache has a same cache for the data and instructions.

26.

What does MEI stand for?(a) modified embedded invalid(b) modified embedded input(c) modified exclusive invalid(d) modified exclusive inputI have been asked this question during an interview.Query is from Writing Scheme of Cache Memory in chapter Memory Systems of Embedded Systems

Answer»

The CORRECT ANSWER is (c) modified EXCLUSIVE invalid

The best explanation: MEI protocol is less complex and is EASY to IMPLEMENT. It does not allow shared state for the cache.

27.

In which of the following the data is preserved within the cache?(a) logical cache(b) physical cache(c) unified cache(d) harvard cacheThis question was posed to me in a national level competition.This interesting question is from Size of Cache in division Memory Systems of Embedded Systems

Answer»

Correct CHOICE is (b) physical cache

Explanation: In the physical cache, the data is preserved within the cache because it does not flush out during the context switching but on the other HAND, the logical cache FLUSHES out the data and clear it during a context switching.

28.

What is the disadvantage of the physical address?(a) debugging(b) delay(c) data preservation(d) data clearedThis question was posed to me by my college professor while I was bunking the class.The above asked question is from Size of Cache in section Memory Systems of Embedded Systems

Answer»
29.

Which mapping of cache is inefficient in software viewpoint?(a) fully associative(b) 2 way associative(c) 16 way associative(d) direct mappingI have been asked this question by my college professor while I was bunking the class.This intriguing question originated from Size of Cache in division Memory Systems of Embedded Systems

Answer»

The correct choice is (d) direct mapping

The BEST I can explain: The direct mapping CACHE organization is simple from the hardware DESIGN aspects but it is inefficient in the SOFTWARE viewpoint.

30.

The modified bit is also known as(a) dead bit(b) neat bit(c) dirty bit(d) invalid bitI had been asked this question at a job interview.Question is from Segmentation and Paging in chapter Memory Systems of Embedded Systems

Answer»

Right answer is (c) dirty BIT

The explanation is: The dirty bit is said to be set if the processor MODIFIES its MEMORY. This bit indicates that the associative set of blocks REGARDING the memory is modified and has not yet saved to the STORAGE.

31.

Which of the following include special address generation and data latches?(a) burst interface(b) peripheral interface(c) dma(d) input-output interfacingThe question was posed to me in semester exam.The doubt is from Burst Interfaces in chapter Memory Systems of Embedded Systems

Answer» RIGHT answer is (a) BURST interface

The explanation: The burst interfacing has special memory interfaces which include special address GENERATION and data latches that help in the high PERFORMANCE of the processors. It takes the advantages of both the nibble mode memories and paging.
32.

What type of timing is required for the burst interfaces?(a) synchronous(b) equal(c) unequal(d) symmetricalI got this question in examination.This intriguing question originated from Burst Interfaces topic in portion Memory Systems of Embedded Systems

Answer» RIGHT answer is (C) UNEQUAL

Explanation: The burst interfacing USES an unequal timing. It takes two clocks for the FIRST access and only one for the remaining accesses which make it an unequal timing.
33.

What is the main idea of the writing scheme in the cache memory?(a) debugging(b) accessing data(c) bus snooping(d) write-allocateThe question was posed to me during an online interview.I'm obligated to ask this question of Writing Scheme of Cache Memory topic in section Memory Systems of Embedded Systems

Answer»

The correct CHOICE is (c) bus snooping

Explanation: There are four main writing scheme in the cache MEMORY which is, write-through, write-back, no CACHING of the write cycle and write BUFFER. All these writing schemes are designed for bus snooping which can reduce the coherency.

34.

In which scheme does the data write via a buffer to the main memory?(a) write buffer(b) write-back(c) write-through(d) no caching of the write cycleThis question was addressed to me by my college director while I was bunking the class.Origin of the question is Writing Scheme of Cache Memory topic in chapter Memory Systems of Embedded Systems

Answer»

Correct choice is (a) write BUFFER

For EXPLANATION I would say: The write-buffer is slightly similar to the write-through MECHANISM in which data is written to the main memory but in write buffer mechanism data WRITES to the main memory via a buffer.

35.

Which of the following approach uses more silicon area?(a) unified(b) harvard(c) logical(d) physicalI have been asked this question in an international level competition.I would like to ask this question from Size of Cache in section Memory Systems of Embedded Systems

Answer»

Correct choice is (b) HARVARD

Easy explanation: The Harvard architecture have a separate BUS for data and instruction, therefore, it REQUIRES more AREA. It also uses more silicon area for the second SET of tags and the comparators.

36.

In which writing scheme does the cache is not updated?(a) write-through(b) write-back(c) write buffering(d) no caching of writing cycleI have been asked this question in an interview for internship.My enquiry is from Writing Scheme of Cache Memory in division Memory Systems of Embedded Systems

Answer»

The correct choice is (d) no CACHING of WRITING cycle

For explanation: The no caching write cycle does not update the cache but the DATA is written to the cache. If the previous data had cached, that ENTRY is invalid and will not use. This makes the processor fetch data DIRECTLY from the main memory.

37.

Which of the following includes a tripped down memory management unit?(a) memory protection unit(b) memory real mode(c) memory management unit(d) bus interface unitThe question was posed to me by my school principal while I was bunking the class.The question is from Memory Protection Unit topic in division Memory Systems of Embedded Systems

Answer»

Correct choice is (a) MEMORY protection UNIT

Explanation: The memory protection unit allows a tripped memory down memory MANAGEMENT unit in which the memories are partitioned and PROTECTED without any address translation. This can remove the time consumption in the address translation thereby INCREASES the speed.

38.

Which of the following makes use of the burst fill technique?(a) burst interfaces(b) dma(c) peripheral interfaces(d) input-output interfacesI have been asked this question at a job interview.Query is from Burst Interfaces topic in division Memory Systems of Embedded Systems

Answer»

Correct ANSWER is (a) burst interfaces

Best explanation: The burst interfaces use the burst FILL TECHNIQUE in which the processor will access four words in succession, which fetches the COMPLETE cache line or WRITTEN out to the memory.

39.

Which of the following is necessary for the address translation in the protected mode?(a) descriptor(b) paging(c) segmentation(d) memoryThis question was posed to me in quiz.The doubt is from Segmentation and Paging topic in chapter Memory Systems of Embedded Systems

Answer»

Correct choice is (a) descriptor

The explanation is: The address translation from the LOGICAL address to physical address partitions the main MEMORY into different blocks which is CALLED segmentation. Each of these blocks have a descriptor which possesses a descriptor table. So the size of every BLOCK is very IMPORTANT for the descriptor.

40.

What arises when a copy of data is held both in the cache and in the main memory?(a) stall data(b) stale data(c) stop data(d) wait for the stateThis question was posed to me in an international level competition.This is a very interesting question from Writing Scheme of Cache Memory in chapter Memory Systems of Embedded Systems

Answer» CORRECT option is (b) STALE data

Easy explanation: The stale data arises when the copy is held both in the cache memory and in the MAIN memory. If EITHER copy is modified, the other data become stale and the system coherency can be DESTROYED.
41.

Which type of cache is used the SPARC architecture?(a) unified(b) harvard(c) logical(d) physicalI have been asked this question during an internship interview.I would like to ask this question from Size of Cache in portion Memory Systems of Embedded Systems

Answer»

Right answer is (C) logical

For EXPLANATION: The SPARC architecture USES logical cache whereas most of the INTERNAL cache designed now, uses physical cache because DATA is not flushed out in this cache.

42.

Which cache memory solve the cache coherency problem?(a) physical cache(b) logical cache(c) unified cache(d) harvard cacheThe question was posed to me during a job interview.The question is from Size of Cache in portion Memory Systems of Embedded Systems

Answer»

Correct ANSWER is (a) physical cache

To explain: The physical cache is more efficient and can provide the cache COHERENCY problem solved and MMU delay is kept to a MINIMUM. PowerPC is an EXAMPLE for this ADVANTAGE.

43.

Which of the following support virtual memory?(a) segmentation(b) descriptor(c) selector(d) pagingI got this question in an interview for internship.I need to ask this question from Segmentation and Paging topic in division Memory Systems of Embedded Systems

Answer»

Correct option is (d) paging

For explanation I would say: The paging mechanism SUPPORTS the virtual memory. Paging HELPS in creating virtual ADDRESS SPACE which has a major role in memory management.

44.

What does GDTR stand for?(a) global descriptor table register(b) granularity descriptor table register(c) gate register(d) global direct table registerThe question was asked in unit test.This is a very interesting question from Segmentation and Paging topic in portion Memory Systems of Embedded Systems

Answer»

The CORRECT choice is (a) global DESCRIPTOR table register

To ELABORATE: The global descriptor table register is a special register which have the linear address and the SIZE of its own GDT. Both the global descriptor table register and local descriptor table register are located in the global descriptor table.

45.

What happens when a task attempts to access memory outside its own address space?(a) paging fault(b) segmentation fault(c) wait(d) remains unchangedThe question was posed to me in an online quiz.This question is from Memory Protection Unit topic in division Memory Systems of Embedded Systems

Answer»

The correct option is (b) SEGMENTATION fault

To explain: DIFFERENT tasks ASSIGN their own address SPACE and whenever a task access memory outside its own address space, a segmentation fault result and which in turn results in the termination of the offending application.

46.

Which of the following can reduce the chip size?(a) memory management unit(b) execution unit(c) memory protection unit(d) bus interface unitI got this question by my school teacher while I was bunking the class.I need to ask this question from Memory Protection Unit topic in division Memory Systems of Embedded Systems

Answer»

Right option is (C) memory protection unit

Explanation: The memory protection unit have many advantages over the other units. It can REDUCE the chip size, cost and POWER consumption.

47.

What does “S” bit describe in a descriptor?(a) descriptor type(b) small type(c) page type(d) segmented typeThis question was addressed to me in exam.This intriguing question comes from Segmentation and Paging in section Memory Systems of Embedded Systems

Answer»
48.

What does DPL in the descriptor describes?(a) descriptor page level(b) descriptor privilege level(c) direct page level(d) direct page latchThe question was asked in an online quiz.Origin of the question is Segmentation and Paging in portion Memory Systems of Embedded Systems

Answer»

The CORRECT answer is (b) descriptor privilege level

For EXPLANATION: The descriptor privilege level is used to restrict access to the segment which helps in PROTECTION mechanism. It ACQUIRES two bit of the descriptor.

49.

Which of the following modes offers segmentation in the memory?(a) virtual mode(b) real mode(c) protected mode(d) memory modeThe question was asked during an internship interview.My query is from Segmentation and Paging topic in chapter Memory Systems of Embedded Systems

Answer» CORRECT OPTION is (C) protected mode

The best EXPLANATION: The main memory can split into small BLOCKS by the method of paging and segmentation and these mechanisms are possible only in protected mode.
50.

Which of the following protocol matches the Intel 80486?(a) MCM62940(b) MCM62486(c) US 74707 B2(d) Hyper BusI had been asked this question during an interview for a job.Enquiry is from Burst Interfaces in chapter Memory Systems of Embedded Systems

Answer»