Top 20 Embedded Systems Interview Questions & Answers 2022

35,270 total views, 3 views today

The following Embedded Systems questions will help you prepare for interviews and online selection tests conducted during campus placement for freshers and job interviews for professionals. After going through these Embedded Systems questions, you can easily attempt the objective type and multiple choice type questions on this topic.

  1. What Is Pass by Value and Pass by Reference? How Are Structure Passed As Arguments?

The parameter to a function can be a copy of a value that is represented by variable or can be a reference to a memory space that stores value of variable. The former is referred to as pass by value and the latter is referred to as pass by reference. The difference is that when parameters are passed by value the changes made to the variable value within the function is not reflected in the caller function, but when passed as reference changes are reflected outside the called function. The structures are always passed by reference.

  1. What Is Difference Between Using A Macro And Inline Function?

The macro are just symbolic representations and cannot contain data type differentiations within the parameters that we give. The inline functions can have the data types too defined as a part of them. The disadvantage in using both is that the inclusion of condition checks may lead to increase in code space if the function is called many times.

  1. What Is The Volatile Keyword Used For?

The volatile keyword is used to represent variables that point to memory in other mapped devices. In such a case the value of the variable can be changed outside of a program. The compiler does not do additional optimizations to the code if there is volatile keyword.

  1. What Are Hard and Soft Real Time Systems?

The hard real time Embedded Systems are the one that depend on the output very strictly on time. Any late response or delay cannot be tolerated and will always be considered a failure. The soft real time systems on the other are not very rigid as the hard real time systems. The performance of the system degrades with the lateness of response, but it is bearable and can be optimized to a certain level for reuse of the result.

  1. What Is A Semaphore? What Are The Different Types Of Semaphore?

The semaphore is an abstract data store that is used to control resource accesses across the various threads of execution or across different processes. There are two types of semaphores:

  • The binary semaphore which can take only 0, 1 values. (used when there is contention for a single resource entity).
  • The counting semaphore which can take incremental values to certain limit (used when number of resources is limited)
  1. What Are Recursive Functions? Can We Make Them Inline?

The recursive functions refer to the functions which make calls to it before giving out the final result. These can be declared as in-line functions and the compiler will allocate the memory space intended for the first call of the function.

  1. What Is The Size Of The Int, Char And Float Data Types?

The size of the char and int are always dependent on the underlying operating system or firmware. This is limited to the number of address lines in the address bus. The int usually takes up a value of 2 bytes or 4 bytes. The char can take up a space of 1 or 2 bytes. The float data type takes up a value of 4 bytes.

  1. What Does Malloc Do? What Will Happen If We Have A Statement Like Malloc(sizeof(0));

Malloc is the function that is used for dynamically allocating memory to the different variables. The malloc returns a memory pointer of void type (void *). The statement malloc(sizeof(0)) returns a valid integer pointer because sizeof(0) represents the size of memory taken up by the integer value of 0. The memory allocated by memory is not automatically cleaned up by the compiler after execution of the functions and should be cleaned up by the programmer using the free () function.

  1. What Is Meant By A Forward Reference In C?

The forward reference refers to the case when we point an address space of a smaller data type with a pointer of a bigger data type. This can be pictured as allocating memory in single bytes and accessing it with integer pointer as chunks of 4.

  1. What Is The Order Of Calling For The Constructors And Destructors In Case Of Objects Of Inherited Classes?

The constructors are called with base class first order and the destructors are called in the child first order. That is, the if we have 2 levels of inheritance A (base)-> B (inherit 1)-> C (inherit 2) then the constructor A is called first followed by B and C. The C destructor is called first followed by B and A.

  1. Explain The Properties Of A Object Oriented Programming Language.
  • Encapsulation: The data that are related to the specific object are contained inside the object structure and hidden from the other entities of the environment.
  • Polymorphism: The mechanism by which the same pointer can refer to different types of objects, which are basically linked by some generic commonality.
  • Abstraction: Hiding the data and implementation details from the real objects. The framework of reference is still present to be used by the other objects.
  • Inheritance: The way to take out the common features and have them as separate object entities only to be reused by the other objects in a modular fashion.
  1. What Do You Mean By Interrupt Latency?

Interrupt latency refers to the time taken for the system to start the handler for the specific interrupt. The time from the time of arrival of interrupt to the time it is being handled.

  1. What Typecast Is Applied When We Have A Signed And An Unsigned Int In An Expression?

The unsigned int is typecast into the signed value.

  1. How Are Variables Mapped Across To The Various Memories By The C Compiler?

The compiler maintains the symbol table which has the related information of all the variable names along with the length of the allocated space, the access unit length for the pointer (type of pointer) and the starting address of the memory space.

  1. What Is A Memory Leak? What Is A Segmentation Fault?

The memory leak refers to the uncleared memory may builds up across lifetime of the process. When it comes to a huge value system stalls its execution due to unavailability of the memory. The segmentation fault on the other hand refers to condition when our program tries to access a memory space that has already been freed up.

  1. What Are Little Endian And Big Endian Types Of Storage? How Can You Identify Which Type Of Allocation A System Follows?

The little endian memory representation allocates the least address to the least significant bit and the big endian is where the highest significant bit takes up the least addressed memory space. We can identify the system’s usage by defining an integer value and accessing it as a character.

int p=0x2;

if(* (char *) &p == 0x2) printf (“little endiann”);

else printf (“big endiann”);

  1. What Is The Scope Of A Function That Is Declared As Static?

The static function when declared within a specific module is scoped only in that module and can only be accessed from it.

  1. What Is The Use Of Having The Const Qualifier?

The const qualifier identifies a specific parameter or variable as read-only attribute to the function or to the entire program. This can come in handy when we are dealing with static data inside function and in a program.

  1. Can A Pointer Be Volatile?

Yes, although this is not very common. An example is when an interrupt service routine modifies a pointer to a buffer.

  1. What Is Loop Unrolling?

Small loops can be unrolled for higher performance, with the disadvantage of increased code size. When a loop is unrolled, a loop counter needs to be updated less often and fewer branches are executed. If the loop iterates only a few times, it can be fully unrolled, so that the loop overhead completely disappears.

Read More.

Add a Comment

Your email address will not be published. Required fields are marked *