Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1:

a) If the data bus width of a processor is 16 bits what would you state about its complexity and capability?

b) If the address bus of a processor is 16-bits wide, then what is its address space?

c) If the system uses a 5 MHz clock what is its clock period? How does the system clock frequency affect the speed of processing?

problem 2:

a) Why is 8085 called an accumulator based processor.

b) prepare brief notes on the register set of 8085.

problem 3: prepare an ALP for the given: (By using the instruction set of 8085)

a) Bring data from the location 4567h, add 56h to it and store the sum in location 0567h.use immediate and direct addressing modes for the same.

b) ADD an immediate data 05h to data in memory addresses 0987h.store the sum in next address in memory.

c) Two bytes are stored in the consecutive memory locations beginning from 2000h.add these numbers and if their sum is greater than 255, send a value ‘0’ to the output port with an address 78h and ‘1’ or else.

d) Compare the data stored in location 4566h and 4567h .Send the least of them to an output port numbered 67h.

problem 3:

a) prepare a short note on the importance of the segmented memory.

b) Describe the functions of EU and BIU.

c) Why does a Pipeline speedup program execution? Are data bytes placed in pipeline through the BIU?

problem 4: How does a logical address distinct from a physical address and how does an offset address distinct from a logical address?

problem 5: List out the flags and the situation that exists if a flag is ‘0’ or ‘1’. How many address lines to 8086 have and what is the address space does this number permit the 8086 to access directly. At any given time what is the number of segments 8086 is permitted to work with and what is the size of each. 

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M93380

Have any Question? 


Related Questions in Computer Engineering

Alice has a video clip that bob is interested in getting

Alice has a video clip that Bob is interested in getting; Bob has another video clip that Alice is interested in getting. Bob creates a web page and runs an HTTP server. How can Alice get Bob's clip? How can Bob get Alic ...

The truck-assembly division of a large company produces two

The truck-assembly division of a large company produces two different models: the Aztec and the Bronco. Their basic operation consists of separate assembly departments: drive-train, coachwork, Aztec final, and Bronco fin ...

1 how many invalid unused code sequences can we have in

1. How many invalid (unused) code sequences can we have in 5B/6B encoding? How many in 3B/4B encoding? 2. What is the result of scrambling the sequence 11100000000000 using each of the following scrambling techniques? As ...

Why are system safety principles not used by all safety

Why are system safety principles not used by all safety professionals? Suggest some ways to overcome the obstacles to wider adoption of system safety. Your response must be at least 75 words in length

Color images can also be stored using three separate color

Color images can also be stored using three separate color channels in which the values of each color component is stored in a separate data structure. Implement a new version of the Color Image ADT using three 1-D array ...

1 how does multicast routing differ from unicast routing2

1. How does multicast routing differ from unicast routing? 2. This chapter mentions serialization delay (also sometimes called transmission delay). What other types of delay are there? List and describe three other types ...

1 the ieee 80211 task group i tgi is developing new wlan

1. The IEEE 802.11 Task Group i (TGi) is developing new WLAN security protocols named TKIP and CCMP. CCMP is envisioned to supersede WEP and TKIP. Research and study these efforts and comment on the progress. 2. It has b ...

1 what is a hash function and what can it be used for2 why

1. What is a hash function, and what can it be used for? 2. Why is it important to exchange keys out of band in symmetric encryption? 3. What is the fundamental difference between symmetric and asymmetric encryption?

Given a binary search tree having lesser values at the left

Given a binary search tree having lesser values at the left subtree and larger values at the right subtree. Devise an algorithm to convert this binary search tree such a way that lesser values at the right subtree and la ...

1 how is an application layer firewall different from a

1. How is an application layer firewall different from a packet-filtering firewall? Why is an application layer firewall sometimes called a proxy server? 2. How is static filtering different from dynamic filtering of pac ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen