Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1:

a) If the data bus width of a processor is 16 bits what would you state about its complexity and capability?

b) If the address bus of a processor is 16-bits wide, then what is its address space?

c) If the system uses a 5 MHz clock what is its clock period? How does the system clock frequency affect the speed of processing?

problem 2:

a) Why is 8085 called an accumulator based processor.

b) prepare brief notes on the register set of 8085.

problem 3: prepare an ALP for the given: (By using the instruction set of 8085)

a) Bring data from the location 4567h, add 56h to it and store the sum in location 0567h.use immediate and direct addressing modes for the same.

b) ADD an immediate data 05h to data in memory addresses 0987h.store the sum in next address in memory.

c) Two bytes are stored in the consecutive memory locations beginning from 2000h.add these numbers and if their sum is greater than 255, send a value ‘0’ to the output port with an address 78h and ‘1’ or else.

d) Compare the data stored in location 4566h and 4567h .Send the least of them to an output port numbered 67h.

problem 3:

a) prepare a short note on the importance of the segmented memory.

b) Describe the functions of EU and BIU.

c) Why does a Pipeline speedup program execution? Are data bytes placed in pipeline through the BIU?

problem 4: How does a logical address distinct from a physical address and how does an offset address distinct from a logical address?

problem 5: List out the flags and the situation that exists if a flag is ‘0’ or ‘1’. How many address lines to 8086 have and what is the address space does this number permit the 8086 to access directly. At any given time what is the number of segments 8086 is permitted to work with and what is the size of each. 

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M93380

Have any Question? 


Related Questions in Computer Engineering

Implement a tree search algorithm that employs a sentinel

Implement a tree search algorithm that employs a sentinel as described in note 5. Assume that the tree has been set up so that the sentinel node exists but has not been set.

1 consider the map adt from section 32a provide a new

1. Consider the Map ADT from Section 3.2: (a) Provide a new implementation that uses a sorted doubly linked list and includes a probe reference for the search operations. (b) Modify your Map class to include an iterator ...

Circle intersection write a program that computes the

Circle Intersection. Write a program that computes the intersection of a circle with a horizontal line and displays the information textually and graphically. Input: Radius of the circle and the y-intercept of the line O ...

What is the relationship between hvac and physical security

What is the relationship between HVAC and physical security? What four physical characteristics of the indoor environment are controlled by a properly designed HVAC system? What are the optimal temperature and humidity r ...

1 list three types of autonomous systems ass described in

1. List three types of autonomous systems (ASs) described in the text, and make a comparison between them. 2. Explain the concept of hop count in RIP. Can you explain why no hop is counted between N1 and R1 in Figure 20. ...

We consider certificate generation with ca-generated keys

We consider certificate generation with CA-generated keys. Assume the second transmission of (CertA, kpr,A) takes place over an authenticated but insecure channel, i.e., Oscar can read this message. 1. Show how he can de ...

Define the required wattage for a ups for the following

Define the required wattage for a UPS for the following systems: a. Monitor: 2 amps; CPU: 3 amps; printer: 3 amps b. Monitor: 3 amps; CPU: 4 amps; printer: 3 amps c. Monitor: 3 amps; CPU: 4 amps; printer: 4 amps Search t ...

1 why is pki so vital in modern communications2 discuss the

1. Why is PKI so vital in modern communications? 2. Discuss the role of digital signatures in modern communication. 3. Some say that with the development of systems such as IPSec, the role the CAs play in modern communic ...

1 what type of security was dominant in the early years of

1. What type of security was dominant in the early years of computing? 2. What are the three components of the C.I.A. triangle? What are they used for? 3. If the C.I.A. triangle is incomplete, why is it so commonly used ...

Create a data file consisting of at least 100 string values

Create a data file consisting of at least 100 string values. You can create the list yourself, or perhaps copy the values from a text file of some type, or you can even create the file by generating random strings. Sort ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen