Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

1) Describe the function of buses that are used in the microprocessor.

2) prepare comparisons between microprocessor and microcontroller.

3) describe some of the characteristics of the microprocessor 8085.

4) describe the pin diagram of the microprocessor 8085 with the help of diagram.

5) describe the block diagram of microprocessor 8085 and also draw the block diagram.

6) describe the Flag Register of microprocessor 8085. Develop the PSW format. Specify the status of several flags after execution of the 9BH +E5H.

7) Specify the registers of 8 bit and 16 bit registers.

8) describe the following term:

a) Hardware and Software.

b) Assembly language and Machine language.

9) Specify the functions of following pins of microprocessor 8085:

a) HLDA

b) ALE

c) SID

d) RESET OUT

10) Describe the functions of following blocks of microprocessor 8085:

a) Program Counter

b) Stack Pointer

c) Instruction decoding and machine cycle encoding

d) ALU

11) describe the basic organization of microprocessor based system and draw its block diagram.

12) describe the functions of following given pins of microprocessor 8085:

a) CLK OUT

b) INTR

c) S1

d) X1 and X2

13) describe several types of addressing modes of microprocessor 8085 with the help of suitable ex.

14) prepare down function of the following instructions of microprocessor 8085.

a) DCX H

b) LDAX B

c) SHLD 2000H

d) DAD D

15) prepare comparisons of the following instruction of microprocessor 8085:

a) INX H and INR H.

b) STA 2000H and STAX B.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M911908

Have any Question? 


Related Questions in Computer Engineering

Search the web for steganographic tools what do you find

Search the Web for steganographic tools. What do you find? Download and install a trial version of one of the tools. Embed a text file within an image. In a side-by-side comparison of the two images, can you tell the dif ...

1 discuss the limitations of a kdc system in modern

1. Discuss the limitations of a KDC system in modern communication. 2. Discuss the future of PKI. 3. Discuss the differences between digital certificates and digital signatures in authentication. 4. Discuss the role and ...

Write a c program that fills random squares of 3 by 3 with

Write a C++ program that fills random squares of 3 by 3, with unique numbers from 1 to 9, and tests if the generated matrix forms a Magic Squares. Your program should loop until  three magic squares  are generated and  p ...

1 there are evaluated computer products on the market find

1. There are evaluated computer products on the market. Find out how one finds out whether a computer product has a security evaluation. 2. If you have a computer product, how do you get it evaluated? Does the evaluation ...

1 what is an infinite loop on your computer how can you

1. What is an infinite loop? On your computer, how can you terminate a program that executes an infinite loop? 2. Give three strategies for implementing the following "loop and a half": Use a Boolean variable, a break st ...

What does describe the overall impact of utilizing

What does "Describe the overall impact of utilizing information technologies in combatting digital crime and digital terrorism mean?

1 can the readfile method in section 118 throw a

1. Can the readFile method in Section 11.8 throw a NullPointerException? If so, how? 2. Write a program that asks a user for a file name and prints the number of characters, words, and lines in that file. 3. Write a prog ...

Now we want to extend the affine cipher from sect 144 such

Now, we want to extend the affine cipher from Sect. 1.4.4 such that we can encrypt and decrypt messages written with the full German alphabet. The German alphabet consists of the English one together with the three umlau ...

1 you can read the value instance variable of the counter

1. You can read the value instance variable of the Counter class with the getValue accessor method. Should there be a setValue mutator method to change it? Explain why or why not. 2. a. Show that the BankAccount(double i ...

1 what is the difference between the serversocket class and

1. What is the difference between the ServerSocket class and the Socket class in Java? 2. We say that in network programming a socket should be at least bound to a local socket address. The first constructor of the Datag ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen