Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1:

a) If the data bus width of a processor is 16 bits what would you state about its complexity and capability?

b) If the address bus of a processor is 16-bits wide, then what is its address space?

c) If the system uses a 5 MHz clock what is its clock period? How does the system clock frequency affect the speed of processing?

problem 2:

a) Why is 8085 called an accumulator based processor.

b) prepare brief notes on the register set of 8085.

problem 3: prepare an ALP for the given: (By using the instruction set of 8085)

a) Bring data from the location 4567h, add 56h to it and store the sum in location 0567h.use immediate and direct addressing modes for the same.

b) ADD an immediate data 05h to data in memory addresses 0987h.store the sum in next address in memory.

c) Two bytes are stored in the consecutive memory locations beginning from 2000h.add these numbers and if their sum is greater than 255, send a value ‘0’ to the output port with an address 78h and ‘1’ or else.

d) Compare the data stored in location 4566h and 4567h .Send the least of them to an output port numbered 67h.

problem 3:

a) prepare a short note on the importance of the segmented memory.

b) Describe the functions of EU and BIU.

c) Why does a Pipeline speedup program execution? Are data bytes placed in pipeline through the BIU?

problem 4: How does a logical address distinct from a physical address and how does an offset address distinct from a logical address?

problem 5: List out the flags and the situation that exists if a flag is ‘0’ or ‘1’. How many address lines to 8086 have and what is the address space does this number permit the 8086 to access directly. At any given time what is the number of segments 8086 is permitted to work with and what is the size of each. 

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M93380

Have any Question? 


Related Questions in Computer Engineering

Conduct an internet search on jonsonjohnson vision and

Conduct an Internet search on jonson@johnson vision and mission statements and evaluate the statements do these statements contain the key component? Does the firm apparent strategy reflect their mission and. Vision How ...

A show an sql statement to drop the column c1 from table

a. Show an SQL statement to drop the column C1 from table T2. b. Describe the process for dropping primary key C1 and making the new primary key C2. c. Which data type changes are the least risky? d. Which data type chan ...

Laboratory exercises ii symmetric and asymmetric

Laboratory Exercises II: Symmetric and Asymmetric Cryptography Introduction In this set of exercises we will study the basics of symmetric (secret key) and asymmetric (public key) cryptography. For this purpose, we will ...

What is the relationship between living abroad and

What is the relationship between living abroad and creativity? How can organizations best apply lessons from this relationship to create the organizational components and to foster the management styles that will facilit ...

Describe the requirements engineering process depicted in

Describe the requirements engineering process depicted in figure 9.1 in a state transition diagram. Discuss the advantages and limitations of the resulting process description.

Module risk assessment reportin order to determine the

Module Risk Assessment Report In order to determine the assets and resources that most need protecting with available funding, a risk assessment must be completed. In order to successfully complete this assignment: 1. In ...

Quantitative association rules may disclose exceptional

Quantitative association rules may disclose exceptional behaviors within a data set, where "exceptional" can be defined based on statistical theory. For example, Section 7.2.3 shows the association rule which suggests an ...

A give an example of two tables that are not relationsb

a. Give an example of two tables that are not relations. b. Suppose that two columns in two different tables have the same column name. What convention is used to give each a unique name? c. Must all the values in the sa ...

Review the five criteria for effective oo modularity

Review the five criteria for effective OO modularity discussed in Section 22.1.2. Using the design approach described later in the chapter, demonstrate how these five criteria are achieved.

Multifeature cubes allow us to construct interesting data

Multifeature cubes allow us to construct interesting data cubes based on rather sophisticated query conditions. Can you construct the following multi feature cube by translating the following user requests into queries u ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate