Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1:

a) If the data bus width of a processor is 16 bits what would you state about its complexity and capability?

b) If the address bus of a processor is 16-bits wide, then what is its address space?

c) If the system uses a 5 MHz clock what is its clock period? How does the system clock frequency affect the speed of processing?

problem 2:

a) Why is 8085 called an accumulator based processor.

b) prepare brief notes on the register set of 8085.

problem 3: prepare an ALP for the given: (By using the instruction set of 8085)

a) Bring data from the location 4567h, add 56h to it and store the sum in location 0567h.use immediate and direct addressing modes for the same.

b) ADD an immediate data 05h to data in memory addresses 0987h.store the sum in next address in memory.

c) Two bytes are stored in the consecutive memory locations beginning from 2000h.add these numbers and if their sum is greater than 255, send a value ‘0’ to the output port with an address 78h and ‘1’ or else.

d) Compare the data stored in location 4566h and 4567h .Send the least of them to an output port numbered 67h.

problem 3:

a) prepare a short note on the importance of the segmented memory.

b) Describe the functions of EU and BIU.

c) Why does a Pipeline speedup program execution? Are data bytes placed in pipeline through the BIU?

problem 4: How does a logical address distinct from a physical address and how does an offset address distinct from a logical address?

problem 5: List out the flags and the situation that exists if a flag is ‘0’ or ‘1’. How many address lines to 8086 have and what is the address space does this number permit the 8086 to access directly. At any given time what is the number of segments 8086 is permitted to work with and what is the size of each. 

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M93380

Have any Question? 


Related Questions in Computer Engineering

Identifying purposes and characteristics of

Identifying Purposes and Characteristics of Processors Identifying Purposes and Characteristics of Memory How to Disassembling and Reassembling Laptops. How to Installing and Configuring Expansion Cards What are the diff ...

Assignment 1software system and applicationdirections -

Assignment 1 Software: System and Application Directions - Complete parts A, B, and C on one document and submit as an attachment to your instructor for grading. Part A Matching: Complete the Key Term Matching exercises ...

Design an algorithm that makes the following exchangethe

Design an algorithm that makes the following exchange: The arrows indicate that b is to assume the value of α, c the value of b, and so on.

Below is a single node of an idef0 diagram decompose node

Below is a single node of an IDEF0 diagram. Decompose node A33 into three functions of Calculate Sales Tax, and Calculate Shipping, and Calculate Order Total. Make sure the ICOM objects remain consistent in the decomposi ...

1 what is a vulnerability scanner how is it used to improve

1. What is a vulnerability scanner? How is it used to improve security? 2. What is the difference between active and passive vulnerability scanners? 3. What kind of data and information can be found using a packet sniffe ...

Design a serial 2s complementer with a shift register and a

Design a serial 2s complementer with a shift register and a flip-flop

1 distinguish between multicasting and multiple unicasting2

1. Distinguish between multicasting and multiple unicasting. 2. When we send an e-mail to multiple recipients, are we are using multicasting or multiple unicasting? Give the reason for your answer. 3. Define which of the ...

1 not all security experts agree about the value of

1. Not all security experts agree about the value of biometrics. What are the advantages and disadvantages of biometrics? 2. What concerns to privacy advocates have about biometrics? Do you agree or disagree with the con ...

1 complete the implementation of the multiarray class by

1. Complete the implementation of the MultiArray class by implementing the helper method computeFactors(). 2. 1 In this chapter, we implemented the Set ADT using a list. Implement the Set ADT using a bag created from the ...

1 given a binary tree of size 76 what is the minimum number

1. Given a binary tree of size 76, what is the minimum number of levels it can contain? What is the maximum number of levels? 2. Draw all possible binary trees that contain 12 nodes.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro