Interview Questions Answers.ORG
Interviewer And Interviewee Guide
Interviews
Quizzes
Home
Quizzes
Interviews Best Engineering Interviews:Aeronautical EngineeringAgricultural EngineeringApplied EngineeringAssociate EngineeringAutomobile EngineeringBio EngineeringBiomedical EngineerBiomedical EngineeringBuilding Services EngineeringCAD/CAE EngineerChemical EngineeringCivil EngineeringDAE Knitting EngineersDeputy Chief Financial OfficerDesktop EngineerDiesel MechanicElectrical EngineeringElectronics CommunicationsElectronics EngineeringEmbedded Software EngineerEnergy EngineeringEnergy Oil GasEngineeringGalvanizing EngineerIndustrial EngineeringInstrumentation EngineeringLaptop RepairerMachine Learning EngineerMachine OperatorMarine EngineeringMechanical EngineeringMechatronics EngineeringNetwork EngineerNuclear EngineeringPetroleum EngineeringPlant Reliability EngineerPlumberPre EngineeringProduction EngineerRF EngineerSystem EngineeringTextile Engineer
Copyright © 2018. All Rights Reserved
Embedded Software Engineer Interview Question:
Tell me what is the need for DMAC in ES?
Submitted by: MuhammadDirect memory access is mainly used to overcome the disadvantages of interrupt and program controlled I/O.
DMA modules usually take the control over from the processor and perform the memory operations and this is mainly because to counteract the mismatch in the processing speeds of I/O units and the processor. This is comparatively faster.
It is an important part of any embedded systems,and the reason for their use is that they can be used for bursty data transfers instead of single byte approaches.
It has to wait for the systems resources such as the system bus in case it is already in control of it.
Submitted by: Muhammad
DMA modules usually take the control over from the processor and perform the memory operations and this is mainly because to counteract the mismatch in the processing speeds of I/O units and the processor. This is comparatively faster.
It is an important part of any embedded systems,and the reason for their use is that they can be used for bursty data transfers instead of single byte approaches.
It has to wait for the systems resources such as the system bus in case it is already in control of it.
Submitted by: Muhammad
Copyright 2007-2025 by Interview Questions Answers .ORG All Rights Reserved.
https://InterviewQuestionsAnswers.ORG.
https://InterviewQuestionsAnswers.ORG.