Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1: If the code segment for an 8086 program begins at address 70400h, then what will be the content of cs register?

Supposing the same code base from what physical addresses will a code byte be fetched from if the instruction pointer contains 539Ch?

problem 2: What physical address is represented by:

a) 4370:561Eh
b) 7A32:0028h

problem 3: If the stack segment register comprises of 3000h and stack pointer comprises of 8434h, then what is the physical address of the top of the stack.

problem 4: prepare the assembly language statement by using the instruction set of 8086 which will perform the given operations:

a) Load number 7986h into BP register.
b) Copy the BP register content into SP register.
c) Load DS register with address 534Ch
d) Load the number F5H into AL register.

problem 5: describe the function of each assembler directive and instruction statement in the short program illustrated below:

DATA_HERE SEGMENT
NUM1 DB 01H
SUM DB ?
DATA_HERE ENDS
CODE_ HERE
ASSUME DS:DATA_HERE,CS:CODE_HERE
START : MOV AX,DATA_HERE  MOV DS,AX
 MOV AX,NUM1
 ADD AX,AX
 MOV SUM,AX
 INT 21H
CODE_HERE ENDS
 END

problem 6: prepare the ALP for the given:

a) Count the number of bits in double word which starts at memory location:

DS: 1234h that are 1. Place a count in the register AL.

b) Count the number of bytes between locations 60000h and 60100h which are an even number place the count in register BH.

c) Move every data byte from memory location 60000h to 600FFh to locations 60200h to 602FFH in reverse order. As the data is moved, count the number of bytes which are greater in magnitude than 7FH.let the register DX be used to hold the count.

d) Enter a string of characters via the keyboard. Save it in memory as an array and then reverse the string.

e) Display the factorial of three numbers. Solve the problem by using both macros and procedures.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M93387

Have any Question? 


Related Questions in Computer Engineering

Implement a class cloud that contains an array list of

Implement a class Cloud that contains an array list of Point2D.Double objects. Support methods Draw each point as a tiny circle. Write a graphical application that draws a cloud of 100 random points.

Mean time between failures mtbf mean time to replacement

Mean Time Between Failures (MTBF), Mean Time To Replacement (MTTR), and Mean Time To Failure (MTTF) are useful metrics for evaluating the reliability and availability of a storage resource. Explore these concepts by answ ...

1 explain the difference between an object and an object

1. Explain the difference between an object and an object reference. 2. Explain the difference between an object and an object variable. 3. Explain the difference between an object and a class. 4. Give the Java code for ...

1 how does multicast routing differ from unicast routing2

1. How does multicast routing differ from unicast routing? 2. This chapter mentions serialization delay (also sometimes called transmission delay). What other types of delay are there? List and describe three other types ...

Consider a hash table of size 501 that contains 85 keysa

Consider a hash table of size 501 that contains 85 keys. (a) What is the load factor? (b) What is the average number of comparisons required to determine if the collection contains the key 73, if: i. linear probing is us ...

Application jurisdictional aspects of cybercrimeyou are

Application: Jurisdictional Aspects of Cybercrime You are using your wireless device to locate a restaurant. Suddenly, a large flashing skull-and-crossbones appears on your screen and a menacing laugh plays. Seconds late ...

How can us companies protect their digital assets

How Can U.S. Companies Protect their Digital Assets Overseas? Prepare a 3 to 5 paragraph briefing statement that can be used to answer the above question. Your audience will be attendees at a conference for small busines ...

1 in chapter 8 we learned that a circuit-switched network

1. In Chapter 8, we learned that a circuit-switched network needs end-to-end addressing during the setup and teardown phases. Define end-to-end addressing in a telephone network when two parties communicate. 2. When we h ...

Perform a hierarchical clustering of the one-dimensional

Perform a hierarchical clustering of the one-dimensional set of points 1, 4, 9, 16, 25, 36, 49, 64, 81, assuming clusters are represented by their centroid (average), and at each step the clusters wit

1 there is a small bug in the heroes and cowards model can

1. There is a small bug in the Heroes and Cowards model. Can you find and fix it? 2. Another model that uses similar rules to Heroes and Cowards is the Follower model in the Art section of the NetLogo models library. How ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro