Ask Question, Ask an Expert


Ask Computer Engineering Expert

problem 1: If the code segment for an 8086 program begins at address 70400h, then what will be the content of cs register?

Supposing the same code base from what physical addresses will a code byte be fetched from if the instruction pointer contains 539Ch?

problem 2: What physical address is represented by:

a) 4370:561Eh
b) 7A32:0028h

problem 3: If the stack segment register comprises of 3000h and stack pointer comprises of 8434h, then what is the physical address of the top of the stack.

problem 4: prepare the assembly language statement by using the instruction set of 8086 which will perform the given operations:

a) Load number 7986h into BP register.
b) Copy the BP register content into SP register.
c) Load DS register with address 534Ch
d) Load the number F5H into AL register.

problem 5: describe the function of each assembler directive and instruction statement in the short program illustrated below:

 INT 21H

problem 6: prepare the ALP for the given:

a) Count the number of bits in double word which starts at memory location:

DS: 1234h that are 1. Place a count in the register AL.

b) Count the number of bytes between locations 60000h and 60100h which are an even number place the count in register BH.

c) Move every data byte from memory location 60000h to 600FFh to locations 60200h to 602FFH in reverse order. As the data is moved, count the number of bytes which are greater in magnitude than 7FH.let the register DX be used to hold the count.

d) Enter a string of characters via the keyboard. Save it in memory as an array and then reverse the string.

e) Display the factorial of three numbers. Solve the problem by using both macros and procedures.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M93387

Have any Question? 

Related Questions in Computer Engineering

1 define computer security2 what are the fundamental

1. Define computer security. 2. What are the fundamental requirements addressed by computer security? 3. What is the difference between passive and active security threats? 4. List and briefly define three classes of int ...

Risk assesmentcreate a risk assessment on sangrafix a video

Risk assesment Create a Risk Assessment on SanGrafix, a video game design company. Risk Assessment can be as simple as noting an unlocked door or a password written on a note, or it can be a complex process requiring sev ...

Recently your manager has heard about ipv6 and has asked

Recently, your manager has heard about IPv6 and has asked you to present a recommendation for either staying with IPv4 or moving to IPv6. What would you recommend and why? Consider issues such as manageability, cost, and ...

Research project relational programming and transactions a

(Research project) Relational programming and transactions. A transaction can do an abort, which cancels the current calculation (see section 8.5). A relational program can do a fail, which says that the current calculat ...

Data structures and algorithmsobjectivesdesign and

Data Structures and Algorithms Objectives Design and implement a program based on a greedy algorithm to solve the Minimal Spanning Tree (MST) problem; Choose and implement appropriate data structures for the algorithm; A ...

The data shown in the table were obtained from a tensile

The data shown in the table were obtained from a tensile test of a metal specimen with a diameter of 0.500 inch and a gage length (the length over which the elongation is measured) of 2.00 inches. The specimen was not lo ...

Answer the following questions briefly1 explain how media

Answer the following questions briefly: 1. Explain how media recovery is handled in ARIES. 2. What are the pros and cons of using fuzzy dumps for media recovery? 3. What are the similarities and differences between check ...

Why are project data useful what care should be taken

Why are project data useful? What care should be taken before archiving project data? What tasks are done before closing a project? What strategies are taken to ensure that lessons are learned? Why is resource release im ...

You are given two sides of a triangle a 45 and b6 the

You are given two sides of a triangle, a = 4.5 and b=6. The angle between them is 35 degrees. Write a script to find the length of the third side and the area of the triangle.

Using a document at your own school for example a class

Using a document at your own school (for example, a class schedule), determine the attributes present in the document. Using your knowledge of the policies at your school, determine the functional dependencies present in ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate