Ask Question, Ask an Expert


Ask Computer Engineering Expert

problem 1: If the code segment for an 8086 program begins at address 70400h, then what will be the content of cs register?

Supposing the same code base from what physical addresses will a code byte be fetched from if the instruction pointer contains 539Ch?

problem 2: What physical address is represented by:

a) 4370:561Eh
b) 7A32:0028h

problem 3: If the stack segment register comprises of 3000h and stack pointer comprises of 8434h, then what is the physical address of the top of the stack.

problem 4: prepare the assembly language statement by using the instruction set of 8086 which will perform the given operations:

a) Load number 7986h into BP register.
b) Copy the BP register content into SP register.
c) Load DS register with address 534Ch
d) Load the number F5H into AL register.

problem 5: describe the function of each assembler directive and instruction statement in the short program illustrated below:

 INT 21H

problem 6: prepare the ALP for the given:

a) Count the number of bits in double word which starts at memory location:

DS: 1234h that are 1. Place a count in the register AL.

b) Count the number of bytes between locations 60000h and 60100h which are an even number place the count in register BH.

c) Move every data byte from memory location 60000h to 600FFh to locations 60200h to 602FFH in reverse order. As the data is moved, count the number of bytes which are greater in magnitude than 7FH.let the register DX be used to hold the count.

d) Enter a string of characters via the keyboard. Save it in memory as an array and then reverse the string.

e) Display the factorial of three numbers. Solve the problem by using both macros and procedures.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M93387

Have any Question? 

Related Questions in Computer Engineering

1 we said that tcp provides a connection-oriented service

1. We said that TCP provides a connection-oriented service between the two application programs. A connection in this case needs a connection identifier that distinguishes one connection from another. What do you think t ...

1 list and define the factors that are likely to shift in

1. List and define the factors that are likely to shift in an organization's information security environment. 2. Who decides if the information security program can adapt to change adequately? 3. List and briefly descri ...

In computer science when we encounter an algorithm we often

In computer science, when we encounter an algorithm, we often need to ask about the complexity of that algorithm (how many computations we need to do). To find the complexity of Dijkstra's algorithm, find the number of s ...

Identifying purposes and characteristics of

Identifying Purposes and Characteristics of Processors Identifying Purposes and Characteristics of Memory How to Disassembling and Reassembling Laptops. How to Installing and Configuring Expansion Cards What are the diff ...

1 a network consists of n hosts assuming that cryptographic

1. A network consists of n hosts. Assuming that cryptographic keys are distributed on a per-hostpair basis, compute how many different keys are required. 2. One cryptographic checksum is computed by applying the DES in C ...

Write a 3 page paper discuss why hci human computer

Write a 3 page paper discuss why HCI (Human computer Interaction) is important and has evolved to ensure that the needs of different kinds of users are taken into account in computer systems. Discuss the application of s ...

When people describe client-server architecture they are

When people describe client-server architecture, they are usually referring to a system in which a large server is serving a client on a PC. With X Window, the reverse is frequently the case. Explain.

Assignment questions -question 1 read the scenario in

Assignment Questions - Question 1: Read the scenario in Appendix 1 (Pickerings Properties). (a) List the functions of the system, as perceived by an external user. (b) List the external entities. Note that because we are ...

1 add a function to the binarysearchtree class that counts

1. Add a function to the BinarySearchTree class that counts the number of edges in a tree. 2. Rewrite Exercise 1 so that it stores the words from a text file. Display all the words in the file and the number of times the ...

Diagram a process for planning and cooking a family dinner

Diagram a process for planning and cooking a family dinner. Does your process resemble the generic product development process? Is cooking dinner analogous to a market-pull, technology-push, platform, process-intensive, ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen