Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1:

a) If the data bus width of a processor is 16 bits what would you state about its complexity and capability?

b) If the address bus of a processor is 16-bits wide, then what is its address space?

c) If the system uses a 5 MHz clock what is its clock period? How does the system clock frequency affect the speed of processing?

problem 2:

a) Why is 8085 called an accumulator based processor.

b) prepare brief notes on the register set of 8085.

problem 3: prepare an ALP for the given: (By using the instruction set of 8085)

a) Bring data from the location 4567h, add 56h to it and store the sum in location 0567h.use immediate and direct addressing modes for the same.

b) ADD an immediate data 05h to data in memory addresses 0987h.store the sum in next address in memory.

c) Two bytes are stored in the consecutive memory locations beginning from 2000h.add these numbers and if their sum is greater than 255, send a value ‘0’ to the output port with an address 78h and ‘1’ or else.

d) Compare the data stored in location 4566h and 4567h .Send the least of them to an output port numbered 67h.

problem 3:

a) prepare a short note on the importance of the segmented memory.

b) Describe the functions of EU and BIU.

c) Why does a Pipeline speedup program execution? Are data bytes placed in pipeline through the BIU?

problem 4: How does a logical address distinct from a physical address and how does an offset address distinct from a logical address?

problem 5: List out the flags and the situation that exists if a flag is ‘0’ or ‘1’. How many address lines to 8086 have and what is the address space does this number permit the 8086 to access directly. At any given time what is the number of segments 8086 is permitted to work with and what is the size of each. 

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M93380

Have any Question? 


Related Questions in Computer Engineering

To make the initial sequence number a random number most

To make the initial sequence number a random number, most systems start the counter at 1 during bootstrap and increment the counter by 64,000 every half second. How long does it take for the counter to wrap around?

1 what is the clock cycle time with and without this

1. What is the clock cycle time with and without this improvement? 2. What is the speedup achieved by adding this improvement? 3. Compare the cost/performance ratio with and without this improvement. 4. Problems in this ...

Dta interpretation research reportyour task write a

Data Interpretation Research Report Your task: Write a report on the statistical relationship that you find between the stock price of the company that you have been assigned and the following three variables: the FTSE, ...

1 in chapter 1 we mentioned that the tcpip suite unlike the

1. In Chapter 1, we mentioned that the TCP/IP suite, unlike the OSI model, has no session layer. But an application-layer protocol can include some of the features defined in this layer if needed. Does SMTP or POP3 have ...

Building one model from another related to exploration 15

Building one model from another Related to exploration 15, more generally, another way to build a model of a phenomenon you wish to model is to take a model that you already have that uses a similar mechanism to the mode ...

Virtualisation is becoming increasingly important as

Virtualisation is becoming increasingly important as organisations are analysing ever larger amounts of data, and more employees wish to access their work files through cloud storage. Research virtualisation architecture ...

Write a method randomshape that randomly generates objects

Write a method randomShape that randomly generates objects implementing the Shape interface: some mixture of rectangles, ellipses, and lines, with random positions. Call it 10 times and draw all of them.

Describe an example system that uses des but is insecure

Describe an example system that uses DES but is insecure because of the DES complementation property. Specifically, describe the system, and then present an attack against that system; the attack should utilize the DES c ...

Write a program that compares all four advanced sorting

Write a program that compares all four advanced sorting algorithms discussed in this chapter. To perform the tests, create a randomly generated array of 1,000 elements. What is the ranking of the algorithms? What happens ...

1 using the discussion of circuit-switching in chapter 8

1. Using the discussion of circuit-switching in Chapter 8, explain why this type of switching was chosen for telephone networks. 2. In Chapter 8, we discussed the three communication phases involved in a circuit-switched ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro