Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

1) Describe the function of buses that are used in the microprocessor.

2) prepare comparisons between microprocessor and microcontroller.

3) describe some of the characteristics of the microprocessor 8085.

4) describe the pin diagram of the microprocessor 8085 with the help of diagram.

5) describe the block diagram of microprocessor 8085 and also draw the block diagram.

6) describe the Flag Register of microprocessor 8085. Develop the PSW format. Specify the status of several flags after execution of the 9BH +E5H.

7) Specify the registers of 8 bit and 16 bit registers.

8) describe the following term:

a) Hardware and Software.

b) Assembly language and Machine language.

9) Specify the functions of following pins of microprocessor 8085:

a) HLDA

b) ALE

c) SID

d) RESET OUT

10) Describe the functions of following blocks of microprocessor 8085:

a) Program Counter

b) Stack Pointer

c) Instruction decoding and machine cycle encoding

d) ALU

11) describe the basic organization of microprocessor based system and draw its block diagram.

12) describe the functions of following given pins of microprocessor 8085:

a) CLK OUT

b) INTR

c) S1

d) X1 and X2

13) describe several types of addressing modes of microprocessor 8085 with the help of suitable ex.

14) prepare down function of the following instructions of microprocessor 8085.

a) DCX H

b) LDAX B

c) SHLD 2000H

d) DAD D

15) prepare comparisons of the following instruction of microprocessor 8085:

a) INX H and INR H.

b) STA 2000H and STAX B.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M911908

Have any Question? 


Related Questions in Computer Engineering

Daisyworld model some abms are used not as models of

Daisyworld model Some ABMs are used not as models of real-world events, but rather as thought experiments. Run the Daisyworld model (found in the Biology section of the NetLogo models library). This model defines a world ...

The fibonacci sequence starts 1 1 2 3 5 8 each number in

The Fibonacci sequence starts 1, 1, 2, 3, 5, 8, . . .. Each number in the sequence (after the first two) is the sum of the previous two. Write a program that computes and outputs the nth Fibonacci number, where n is a va ...

1 what are cryptography and cryptanalysis2 what were some

1. What are cryptography and cryptanalysis? 2. What were some of the first uses of cryptography? 3. What is a key, and what is it used for? 4. What are the three basic operations in cryptography?

Explain how microsoft project enables you to track

Explain how Microsoft Project enables you to track dependencies across multiple projects and establish resource pools. Critique what might be some downsides to one program manager tracking several projects. What if one o ...

1 ftp uses the services of tcp for exchanging control

1. FTP uses the services of TCP for exchanging control information and data transfer. Could FTP have used the services of UDP for either of these two connections? Explain. 2. In FTP, which entity (client or server) start ...

1 what is the difference between a threat agent and a

1. What is the difference between a threat agent and a threat? 2. What is the difference between vulnerability and exposure? 3. How is infrastructure protection (assuring the security of utility services) related to info ...

In the game of life a blinker is a period 2 oscillator can

In the Game of Life, a blinker is a period 2 oscillator. Can you find another period 2 oscillator? How about a period 3 oscillator? A period 15 oscillator? Save your configurations as buttons in the Life model in the Net ...

Consider the following many to many relationshipan aircraft

Consider the following many to many relationship: An aircraft can be owned by many people. A person can own many aircraft. What would be the most appropriate way to handle the foreign keys to maintain this relationship? ...

After the dhke alice and bob possess a mutual secret point

After the DHKE, Alice and Bob possess a mutual secret point R = (x,y). The modulus of the used elliptic curve is a 64-bit prime. Now, we want to derive a session key for a 128-bit block cipher. The session key is calcula ...

1 determine what the words genotype and phenotype mean in

1. Determine what the words genotype and phenotype mean in (biological) evolutionary theory How might these words be used to describe GP? 2. How might the GP crossover process be changed to allow GP to relax the requirem ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen