中级嵌入式(专业英语)

1.A real-time operating system.(RTOS) is an operating system intended to serve (real-time) application process data as it comes in, typically without buffering delays.A key (characteristic) of a RTOS is the level of its consistency concerning the amount of time it takes to accept and complete an application’s task; the variability is jitter.A hard real-time operating system has (less) jitter than a soft real-time operating system.The chief design goal is not high throughput, but rather a guarantee of a soft or hard performance category.A RTOS has an advanced algorithm for scheduling.(.An embedded system) flexibility enables a wider, computer-system orchestration of process priorities, but a real-time OS is more frequently dedicated to a narrow set of applications.Key factors in a real-time OS are minimal (interrupt) latency and minimal thread switching latency.

2.Although the bulk of industry resources and energies have focused on developing the fastestmicroprocessor)or slickest(operating systems), more and more mindshare is turning to the evolution of the computer interface.Advancements in the areas of input devices,(voice)processing and vitual reality could lead to fundamental changes in the way human and computer interact.The technological battlefield of the future will be adding layers between the user and the raw machine to make the (interface)as invisible as possible.(vitual reality)crepresents the next evolutionary step for the interface.

3.An operating system also has to be able to service peripheral (hardware), such as timers,motors, sensors, communicationdevices, disks, etc.All of those can request the attention of the OS asynchronously) , i.e.at the time that they want to use the OS, theOS has to make sure it's ready to service the requests.Such a request for attention is called an interrupt.There are twokinds of interrupts: Hardware interrupts and Software interrupts.The result of an inteiTup: is also a triggering of theprocessor, so that it jumps to a (pre-specified) address.Examples of cases where software interrupts appear are perhaps a divide by zero, a memory segmentation fault, etc.So this kind of interrupt is not caused by a hardware event but by a specificmachine language operation code.Many systems have more than one hardware interrupt line, and the hardwaremanufacturer typically assembles all these interrupt lines in an interrupt (vector) .An Interrupt (Controller) is a piece of hardware that shields the OS from the electronic details of the interrupt lines, so that interrupts can be queued and none of themgets lost.

4.Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent)Web sites without their knowledge or consent.   Pharming has been called "phishing without a lure."In phishing, the perpetrator sends out legitimate- (looking)E-mails, appearing to come from some of the Web's most popular sites, in ah effort to obtain personal and financial information from individual recipients.But in pharming, larger numbers of computer users can be(victimized)because it is not necessary to target individuals one by one and no conscious action is required on the part of the victim.In one form of pharming attack, code sent in an E-mail modifies local host files on a personal computer.The host files convert URLs into the number strings that the computer uses to access Web sites.A computer with a compromised host file will go to the fake Web site even if a user types in the correct Internet address or clicks on an affected(bookmark)entry.Some spyware removal programs can correct the corruption, but it frequently recurs unless the user changes browsing(habits signature).

5. Hardware interrupts are triggered by peripheral devices outside the microcontroller.

6. The architecture of an embedded system is an abstraction of the embedded device, meaning that it is a generalization of the system that typically doesn't show detailed implementation information such as software source code or hardware circuit design.

7..In computing, a device driver (commonly referred to as simply a driver) is acomputer program that operates or controls a particular type of device that is attached to a computer.A driver provides a software interface to hardware devices, enabling operating systems and other computer programs to access hardware functions without needing to know precise details of the hardware being used

8. The TCP/IP stack is a complete set of networking protocols.The OSI Model was meant to be a standardized way of connecting devices together, and most protocols have some direct correlation to the OSI Model.The OSI Model has 7 layers, the fourth layer is called transport layer.

9. An embedded device is a computer system that has been devised to perform some certain functions.It is dedicated to execute a particular task that might require processors that are powerful.

10. Embedded C is a set of language extensions for the C Programming language by the C Standards committee to address commonality issues that exist between C extensions for different embedded systems.

11. An embedded system is an applied computer system, as distinguished from other types of computer systems such as personal computers (PCs) or supercomputers.

12. Digital Signal Processing (DSP), has emerged as an important technology for modem electronic systems.It is a form of embedded design that is one of the newest and hottest fields, and is considered to be the workhorse of choice for many computational-intensive applications.

13.Deadlock occurs when a series of synchronization objects are held in a preemptive system in such a way that no process can move forward

  • 19
    点赞
  • 38
    收藏
    觉得还不错? 一键收藏
  • 1
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值