Embedded systems memory management MCQ Quiz – Objective Question with Answer for Embedded systems memory management

121. Which of the following is the biggest challenge in the cache memory design?

A. delay
B. size
C. coherency
D. memory access

Answer: C

Coherency is a major challenge in designing cache memory. The cache has to be designed by solving the problem of data coherency while remaining hardware and software compatible.

 

122. What arises when a copy of data is held both in the cache and in the main memory?

A. stall data
B. stale data
C. stop data
D. wait for the state

Answer: B

The stale data arises when the copy is held both in the cache memory and in the main memory. If either copy is modified, the other data become stale and the system coherency can be destroyed.

 

123. In which writing scheme does all the data writes go through to the main memory and update the system and cache?

A. write-through
B. write-back
C. write buffering
D. no caching of writing cycle

Answer: A

There are different writing schemes in the cache memory which increases the cache efficiency and one such is the write-through in which all the data go to the main memory and can update the system as well as the cache.

 

124. In which writing scheme does the cache is updated but the main memory is not updated?

A. write-through
B. write-back
C. no caching of writing cycle
D. write buffering

Answer: B

The cache write-back mechanism needs a bus snooping system for the coherency. In this write-back scheme, the cache is updated first and the main memory is not updated.

 

125. In which writing scheme does the cache is not updated?

A. write-through
B. write-back
C. write buffering
D. no caching of writing cycle

Answer: D

The no caching write cycle does not update the cache but the data is written to the cache. If the previous data had cached, that entry is invalid and will not use. This makes the processor fetch data directly from the main memory.

 

126. Which writing mechanism forms the backbone of the bus snooping mechanism?

A. write-back
B. write-through
C. no caching of write cycles
D. write buffer

Answer: C

The no caching of the write cycle seems to be wasteful because it does not update the cache, and if any previous data is cached, that entry might be an error and is not used. So the processor access data from the main memory but this writing scheme forms the backbone of the bus snooping system for the coherency issue.

 

127. What is the main idea of the writing scheme in the cache memory?

A. debugging
B. accessing data
C. bus snooping
D. write-allocate

Answer: C

There is four main writing scheme in the cache memory which is, write-through, write-back, no caching of the write cycle, and write buffer. All these writing schemes are designed for bus snooping which can reduce the coherency.

 

128. In which scheme does the data write via a buffer to the main memory?

A. write buffer
B. write-back
C. write-through
D. no caching of the write cycle

Answer: A

The write buffer is slightly similar to the write-through mechanism in which data is written to the main memory but in the write buffer mechanism, data writes to the main memory via a buffer.

 

129. Which of the following can allocate entries in the cache for any data that is written out?

A. write-allocate cache
B. read-allocate cache
C. memory-allocate cache
D. write cache

Answer: A

A write-allocate cache allocates the entries in the cache for any data that is written out. If the data is transferred to the external memory so that, when it is accessed again, the data is already waiting in the cache. It works efficiently if the size of the cache is large and it does not overwrite even though it is advantageous.

 

130. Which of the following uses a bus snooping mechanism?

A. MC88100
B. 8086
C. 8051
D. 80286

Answer: A

The bus snooping mechanism uses a combination of cache tag status, write policies, and bus monitoring to ensure coherency. MC88100 or MC88200 uses a bus snooping mechanism.

 

131. What leads to the development of MESI and MEI protocol?

A. cache size
B. cache coherency
C. bus snooping
D. number of caches

Answer: B

The problem of cache coherency lead to the formation of two standard mechanisms called MESI and MEI protocol. MC88100 has a MESI protocol and MC68040 uses an MEI protocol.

 

132. Which of the following is also known as Illinois protocol?

A. MESI protocol
B. MEI protocol
C. Bus snooping
D. Modified exclusive invalid

Answer: A

The MESI protocol is also known as the Illinois protocol because of its formation at the University of Illinois.

 

133. What does MESI stand for?

A. modified exclusive stale invalid
B. modified exclusively shared invalid
C. modified exclusive system input
D. modifies embedded shared invalid

Answer: B

The MESI protocol supports a shared state which is a formal mechanism for controlling the cache coherency by using the bus snooping techniques. MESI refers to the states that cached data can access. In the MESI protocol, multiple processors can cache shared data.

 

134. What does MEI stand for?

A. modified embedded invalid
B. modified embedded input
C. modified exclusive invalid
D. modified exclusive input

Answer: C

MEI protocol is less complex and easy to implement. It does not allow a shared state for the cache.

 

135. Which protocol does MPC601 use?

A. MESI protocol
B. MEI protocol
C. MOSI protocol
D. MESIF protocol

Answer: A

MPC601 uses a MESI protocol, that is they have a shared state for data accessing in the cache. It can reduce the cache coherency but the cache coherency is processor-specific. So different processors have different cache coherency implementations.

 

136. Which of the following include special address generation and data latches?

A. burst interface
B. peripheral interface
C. DMA
D. input-output interfacing

Answer: A

The burst interfacing has special memory interfaces which include special address generation and data latches that help in the high performance of the processors. It takes the advantages of both the nibble mode memories and paging.

 

137. Which of the following makes use of the burst fill technique?

A. burst interfaces
B. DMA
C. peripheral interfaces
D. input-output interfaces

Answer: A

The burst interfaces use the burst fill technique in which the processor will access four words in succession, which fetches the complete cache line or written out to the memory.

 

138. How did burst interfaces access faster memory?

A. segmentation
B. DMA
C. static column memory
D. memory

Answer: C

The speed of the memory can be improved by the page mode or the static column memory which offers faster access in a single cycle.

 

139. Which of the following memory access can reduce the clock cycles?

A. bus interfacing
B. burst interfacing
C. DMA
D. dram

Answer: B

The burst interfaces reduce the clock cycles. For fetching four words with a three-clock memory, it will take 12 clock cycles but in the burst interface, it will only take five clocks to access the data.

 

140. How many clocks are required for the first access to the burst interface?

A. 1
B. 2
C. 3
D. 4

Answer: B

In the burst interface, the first access of the memory address requires two clock cycles and a single cycle for the remaining memory address.

 

141. In which of the following access, the address is supplied?

A. the first access
B. the second access
C. third access
D. fourth access

Answer: A

In the burst interface, the address is supplied only for the first access and not for the remaining accesses. External logic is required for the additional addresses for the memory interface.

Scroll to Top