SUBMISSION DATE: 10-04-2024 (Wednesday)
Answer the questions in Data Sheets; In case any USN is missing let me know about the same
Explain List file generated on cross compilation
1MS20EC037
Explain the SPI protocol used in the design of embedded systems with the different types of master-slave connections.
Explain Map file generated on cross compilation
1MS21EC091
Elaborate on the various cores that can be used in embedded systems.
Explain Hex file and Obj file generated on cross compilation
1MS21EC092
Differentiate (i) RISC and CISC architecture (ii) Harvard and Von Neumann Architecture
Briefly explain the computational models in embedded systems
1MS21EC093
Explain in detail the use of Real Time Clock and Watch Dog Timer in embedded system design.
What are device drivers? Write a C program to read from stdin and write to stdout using system calls, and also explain
1MS21EC094 the functions of the system calls used.
Differentiate (i) RISC and CISC architecture (ii) Harvard and Von Neumann Architecture
1MS21EC095 Illustrate some of the fundamental issues in hardware software Co-design in embedded system development.
Discuss the different types of memories used for program storage in embedded system design.
1MS21EC096 Explain the I2C protocol used in the design of embedded systems .
Explain disassembler, decompiler, simulators and emulators
Explain List file generated on cross compilation
1MS21EC097
Explain the SPI protocol used in the design of embedded systems with the different types of master-slave connections.
Write an embedded C program to
(i) read from keyboard and write echo the same on the monitor
1MS21EC098 (ii)create a new file hello.txt and print “Hello World” into the file.
Differentiate (i) RISC and CISC architecture (ii) Harvard and Von Neumann Architecture
Explain Map file generated on cross compilation
1MS21EC099
Elaborate on the various cores that can be used in embedded systems.
Explain Hex file and Obj file generated on cross compilation
1MS21EC100
Elaborate on the various cores that can be used in embedded systems.
1MS21EC101 Define the following : (i) Distributed (ii) Throughput (iii) Security (iv) Maintainability
Explain disassembler, decompiler, simulators and emulators
Discuss the different types of memories used for program storage in embedded system design.
1MS21EC102
Explain Hex file and Obj file generated on cross compilation
Write an embedded C program to
(i) read from keyboard and write echo the same on the monitor
1MS21EC103 (ii)create a new file hello.txt and print “Hello World” into the file.
Elaborate on the various cores that can be used in embedded systems.
Discuss the different types of memories used for program storage in embedded system design.
1MS21EC104
1) Illustrate with a diagram, the implementation of a Data Flow graph (DFG) for the following
requirement:
P= 𝑎 𝑏; Q= 𝑃 𝑐 ; R= P + Q;
What are device drivers? Write a C program to read from stdin and write to stdout using system calls, and also explain
1MS21EC105 the functions of the system calls used.
Explain the I2C protocol used in the design of embedded systems .
1MS21EC106 Explain disassembler, decompiler, simulators and emulators
Explain the SPI protocol used in the design of embedded systems with the different types of master-slave connections.
1MS21EC107 Explain the I2C protocol used in the design of embedded systems .
1) Illustrate with a diagram, the implementation of a Control Data Flow graph (CDFG) for the
following requirement:
If Flag = 00, w=a+b;
Else if Flag = 01, x=a-b;
Else if Flag = 10, y= a*b;
Else z = a/b;
1) Illustrate with a diagram, the implementation of a Control Data Flow graph (CDFG) for the
following requirement:
If Flag = 00, w=a+b;
Else if Flag = 01, x=a-b;
Else if Flag = 10, y= a*b;
Else z = a/b;
Discuss the different types of memories used for program storage in embedded system design.
1MS21EC108
1) Design a simple Automated Teller Machine (ATM) based on FSM Model for the following
requirements:
The ATM machine is activated by the user, by entering a 4-digit password, if the password is
invalid, the operation is terminated, else there are only two options, the user can select
withdrawal of cash or cancel the operation. If withdrawal option is selected, the user has to enter
the amount to be withdrawn, & the money is dispersed from the machine, and the operation is
terminated.
(Note: Other options like printing the receipt; or checking the availability of sufficient cash in
the account are not considered for this design)
1MS21EC109 Illustrate some of the fundamental issues in hardware software Co-design in embedded system development.
Elaborate on the various cores that can be used in embedded systems.
1) Design a simple Automated Teller Machine (ATM) based on FSM Model for the following
requirements:
The ATM machine is activated by the user, by entering a 4-digit password, if the password is
invalid, the operation is terminated, else there are only two options, the user can select
withdrawal of cash or cancel the operation. If withdrawal option is selected, the user has to enter
the amount to be withdrawn, & the money is dispersed from the machine, and the operation is
terminated.
(Note: Other options like printing the receipt; or checking the availability of sufficient cash in
1MS21EC110 the account are not considered for this design)
Explain the I2C protocol used in the design of embedded systems .
What are device drivers? Write a C program to read from stdin and write to stdout using system calls, and also explain
1MS21EC111 the functions of the system calls used.
Explain the SPI protocol used in the design of embedded systems with the different types of master-slave connections.
1MS21EC112 Explain disassembler, decompiler, simulators and emulators
Explain the I2C protocol used in the design of embedded systems .
1) Design a simple Automated Teller Machine (ATM) based on FSM Model for the following
requirements:
The ATM machine is activated by the user, by entering a 4-digit password, if the password is
invalid, the operation is terminated, else there are only two options, the user can select
withdrawal of cash or cancel the operation. If withdrawal option is selected, the user has to enter
the amount to be withdrawn, & the money is dispersed from the machine, and the operation is
terminated.
(Note: Other options like printing the receipt; or checking the availability of sufficient cash in
1MS21EC113 the account are not considered for this design)
Explain the I2C protocol used in the design of embedded systems .
1MS21EC114 Elaborate on the various cores that can be used in embedded systems.
1) Illustrate with a diagram, the implementation of a Data Flow graph (DFG) for the following
requirement:
P= 𝑎 𝑏; Q= 𝑃 𝑐 ; R= P + Q;
1MS21EC115 Define the following : (i) Distributed (ii) Throughput (iii) Security (iv) Maintainability
1) Design a simple Automated Teller Machine (ATM) based on FSM Model for the following
requirements:
The ATM machine is activated by the user, by entering a 4-digit password, if the password is
invalid, the operation is terminated, else there are only two options, the user can select
withdrawal of cash or cancel the operation. If withdrawal option is selected, the user has to enter
the amount to be withdrawn, & the money is dispersed from the machine, and the operation is
terminated.
(Note: Other options like printing the receipt; or checking the availability of sufficient cash in
the account are not considered for this design)
1MS21EC116 Illustrate some of the fundamental issues in hardware software Co-design in embedded system development.
Explain the operational quality attributes of embedded systems
1MS21EC117 List the features, advantages and disadvantages of simulator-based debugging.
Explain the I2C protocol used in the design of embedded system programming .
Briefly explain the computational models in embedded systems
1MS21EC118
Elaborate on the various cores that can be used in embedded systems.
1MS21EC119 Illustrate some of the fundamental issues in hardware software Co-design in embedded system development.
Explain the operational quality attributes of embedded systems
What are device drivers? Write a C program to read from stdin and write to stdout using system calls, and also explain
1MS21EC120 the functions of the system calls used.
1) Design a simple Automated Teller Machine (ATM) based on FSM Model for the following
requirements:
The ATM machine is activated by the user, by entering a 4-digit password, if the password is
invalid, the operation is terminated, else there are only two options, the user can select
withdrawal of cash or cancel the operation. If withdrawal option is selected, the user has to enter
the amount to be withdrawn, & the money is dispersed from the machine, and the operation is
terminated.
(Note: Other options like printing the receipt; or checking the availability of sufficient cash in
the account are not considered for this design)
1MS21EC121 Explain the I2C protocol used in the design of embedded system programming .
Explain memory management and time management in embedded systems.
Differentiate (i) RISC and CISC architecture (ii) Harvard and Von Neumann Architecture
1MS21EC122
Write an embedded C program to
(i) read from keyboard and write echo the same on the monitor
(ii)create a new file hello.txt and print “Hello World” into the file.
Briefly explain the computational models in embedded systems
1MS21EC123
Explain the non-operational quality attributes of embedded systems
1MS21EC124 Explain the I2C protocol used in the design of embedded system programming .
1) Illustrate with a diagram, the implementation of a Data Flow graph (DFG) for the following
requirement:
P= 𝑎 𝑏; Q= 𝑃 𝑐 ; R= P + Q;
Differentiate (i) RISC and CISC architecture (ii) Harvard and Von Neumann Architecture
1MS21EC125
Explain disassembler, decompiler, simulators and emulators
1MS21EC126 Explain in detail the use of Real Time Clock and Watch Dog Timer in embedded system design.
1) Illustrate with a diagram, the implementation of a Control Data Flow graph (CDFG) for the
following requirement:
If Flag = 00, w=a+b;
Else if Flag = 01, x=a-b;
Else if Flag = 10, y= a*b;
Else z = a/b;
What are HEX files? Explain the Format of Intel Hex File and the different fields of a record structure. Find the
1MS21EC127 checksum byte for the Intel Hex file Format, with the following record structure : 0300300002337A
Explain the characteristics of embedded systems
Briefly explain the computational models in embedded systems
1MS21EC128
Discuss the different types of memories used for program storage in embedded system design.
1MS21EC129 Explain disassembler, decompiler, simulators and emulators
Explain the characteristics of embedded systems
What are HEX files? Explain the Format of Intel Hex File and the different fields of a record structure. Find the
1MS21EC130 checksum byte for the Intel Hex file Format, with the following record structure : 0300300002337A
Explain the non-operational quality attributes of embedded systems
1MS21EC131 Illustrate some of the fundamental issues in hardware software Co-design in embedded system development.
1) Design a simple Automated Teller Machine (ATM) based on FSM Model for the following
requirements:
The ATM machine is activated by the user, by entering a 4-digit password, if the password is
invalid, the operation is terminated, else there are only two options, the user can select
withdrawal of cash or cancel the operation. If withdrawal option is selected, the user has to enter
the amount to be withdrawn, & the money is dispersed from the machine, and the operation is
terminated.
(Note: Other options like printing the receipt; or checking the availability of sufficient cash in
the account are not considered for this design)
1MS21EC132 Define the following : (i) Distributed (ii) Throughput (iii) Security (iv) Maintainability
Write C programs to demonstrate time() and clock() functions and explain the functions
1MS21EC133 List the features, advantages and disadvantages of simulator-based debugging.
Explain the SPI protocol used in the design of embedded systems with the different types of master-slave connections.
Define the following : (i) Distributed (ii) Throughput (iii) Security (iv) Maintainability
1MS22EC410
1) Illustrate with a diagram, the implementation of a Control Data Flow graph (CDFG) for the
following requirement:
If Flag = 00, w=a+b;
Else if Flag = 01, x=a-b;
Else if Flag = 10, y= a*b;
Else z = a/b;
1MS22EC411 Explain disassembler, decompiler, simulators and emulators
Explain in detail the use of Real Time Clock and Watch Dog Timer in embedded system design.