+1-415-315-9853

info@mywordsolution.com

Engineering

 Civil Engineering Chemical Engineering Electrical & Electronics Mechanical Engineering Computer Engineering Engineering Mathematics MATLAB Other Engineering Digital Electronics Biochemical & Biotechnology

problem 1: If the code segment for an 8086 program begins at address 70400h, then what will be the content of cs register?

Supposing the same code base from what physical addresses will a code byte be fetched from if the instruction pointer contains 539Ch?

problem 2: What physical address is represented by:

a) 4370:561Eh
b) 7A32:0028h

problem 3: If the stack segment register comprises of 3000h and stack pointer comprises of 8434h, then what is the physical address of the top of the stack.

problem 4: prepare the assembly language statement by using the instruction set of 8086 which will perform the given operations:

a) Load number 7986h into BP register.
b) Copy the BP register content into SP register.
d) Load the number F5H into AL register.

problem 5: describe the function of each assembler directive and instruction statement in the short program illustrated below:

DATA_HERE SEGMENT
NUM1 DB 01H
SUM DB ?
DATA_HERE ENDS
CODE_ HERE
ASSUME DS:DATA_HERE,CS:CODE_HERE
START : MOV AX,DATA_HERE  MOV DS,AX
MOV AX,NUM1
MOV SUM,AX
INT 21H
CODE_HERE ENDS
END

problem 6: prepare the ALP for the given:

a) Count the number of bits in double word which starts at memory location:

DS: 1234h that are 1. Place a count in the register AL.

b) Count the number of bytes between locations 60000h and 60100h which are an even number place the count in register BH.

c) Move every data byte from memory location 60000h to 600FFh to locations 60200h to 602FFH in reverse order. As the data is moved, count the number of bytes which are greater in magnitude than 7FH.let the register DX be used to hold the count.

d) Enter a string of characters via the keyboard. Save it in memory as an array and then reverse the string.

e) Display the factorial of three numbers. Solve the problem by using both macros and procedures.

Computer Engineering, Engineering

• Category:- Computer Engineering
• Reference No.:- M93387

Have any Question?

Related Questions in Computer Engineering

Select a java program that contains an exception error the

Select a Java program that contains an exception error. The exception error can be one that you have encountered yourself or one you located using the Internet. Describe your chosen exception error and explain potential ...

1 what are the ongoing responsibilities security managers

1. What are the ongoing responsibilities security managers have in securing the SDLC? 2. What is vulnerability assessment? 3. What is penetration testing? 4. What is the difference between configuration management and ch ...

1 what is the purpose of including the ip header and the

1. What is the purpose of including the IP header and the first 8 bytes of datagram data in the error-reporting ICMP messages? 2. If you are assigned an IPv6 address by your ISP for your personal computer at home, what s ...

1 list and describe the four classes of fire described in

1. List and describe the four classes of fire described in the text. Does the class of a fire dictate how to control the fire? 2. What is Halon, and why is its use restricted?

1 in extension 1 of the fire simple model there are two

1. In extension 1 of the Fire Simple model, there are two parameters governed by sliders, DENSITY and PROBABILITY-OF-SPREAD. How do these two interact with regard to a critical spread of the fire? 2. The original Fire Si ...

1 the difference between computer forensics and traditional

1. The difference between computer forensics and traditional forensics 2. Discuss the issues you deem important in computer forensics. 3. What is the main purpose of preserving digital evidence? and how is this accomplis ...

The cost to become a member of a fitness center is as

The cost to become a member of a fitness center is as follows: The senior citizens discount is 30% If the membership is bought and paid for 12 or more months, the discount is 15% If more than five personal training sessi ...

Implement a combination lock class a combination lock has a

Implement a combination lock class. A combination lock has a dial with 26 positions labeled A . . . Z. The dial needs to be set three times. If it is set to the correct combination, the lock can be opened. When the lock ...

Define a class whose instances represent request and reply

Define a class whose instances represent request and reply messages as illustrated in Figure 4.13. The class should provide a pair of constructors, one for request messages and the other for reply messages, showing how t ...

1 do you foresee a fusion between lan man and wan

1. Do you foresee a fusion between LAN, MAN, and WAN technologies in the future? Support your response. 2. Network technology is in transition. Discuss the direction of network technology

• 13,132 Experts

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro