answersLogoWhite

0

📱

Intel 8085

Introduced by Intel in 1977, the Intel 8085 is an 8-bit microprocessor that is binary-compatible with Intel 8080. It only requires a +5-volt power supply and has been used as a microcontroller.

1,493 Questions

What is the full form of LDAX?

The full form of LDAX is load accumulator from memory pointed by extended register denoted as "rp". It occupies only one byte in memory and the target address is contained in either the BC or DE register pair.

What is the basic construction of microprocessor?

1)address lines to refer to the address of a block

2)data lines for data transfer

3)IC chips 4 processing data

Where could one register for Skyauction?

SkyAuction is an online site where you can bid on different travel options such as hotels, flights, cruises etc. One has to register at the site in order to use it.

What is the function of an accumulator?

An accumulator is a register that is a part of a processor. It has more/faster instructions than other registers. Examples:

/360: no accumulator

8080: A

6800: A and B

8086: AX

80386: EAX

x86-64: RAX
The accumulator in an automatic transmission softens the shift between gears.

How do you represent 300 in 8 bits?

The binary of 300 is 100101100 which are 9 bits therefore the first 8 bits from LSB goes to the register and the carry is generated and carry flag is set to 1.

What is a challenge to keeping a check register?

Discipline, and remembering to do it, that would be hard, but than it comes in handy in the future! Hope this helps!! And remember to smile ;)

Why you call programmcounter stack pointer as special purpose resistors?

The Program Counter and Stack Pointer registers are called special purpose registers because they can not be used arbitrarily; they are, well, special. You cannot, for instance, load a new value into the Program Counter and blithely continue, that action would cause an unconditional jump. Also, the Program Counter is automatically incremented by the size of the instruction, so you can not just put something in it and expect its value to persist. Similarly, you cannot load a new value into the Stack Pointer without losing the entire stack context that you are in.

What are the steps to properly and completely execute an instruction?

1 Fetch Instruction from Memory 2 Decode Instruction and Fetch Operands 3 Perform ALU Operations 4 Memory Access (for load/store)5 Store ALU result to register file 6Update PC

How can you determine the duration of one T-state?

The duration of one T-state is one divided by the clock frequency, or two divided by the crystal frequency. This is for the 8085.

What is masking in 8085?

Masking in the 8085 is when certain interrupts are disabled, or masked, by instruction execution. TRAP is not maskable. INTR, RST7.5, RST6.5, and RST5.5 are maskable as a group with the EI and DI instructions. RST7.5, RST6.5, and RST5.5 are selectively maskable, even after the EI instruction, by using the RIM and SIM instructions.

How do you address 1GB memory with 8085 or 8086?

You cannot address 1GB memory with the 8085 or the 8086/8088 without some kind of external demultiplexor that is software controlled. The address bus on the 8085 is 16 bits, giving addressibility of 64KB; while the address bus on the 8086/8088 is 20 bits, giving addressibility of 1MB.

To address 1GB, you need a 30 bit address bus.

What is The resolution of 8 bit optical encoder?

28 = 256, so an 8 bit encoder would have a resolution of one part in 256, or 0.39%.

What happens when a PUSH instruction is executed?

The value being pushed (push [value]) is placed on the top of the stack (esp) and the size of the value is added to esp.

What is the necessity to use opcode fetch cycle for every instruction?

The microprocessor uses an opcode fetch cycle for every instruction because it has to know the opcode in order to execute it, and that is located in memory.

What is an explanation of the file modes briefly?

Two file modes are "text" and "binary". Text is used for human readable data, such as a C source file, or a notepad text file. Binary is used for computer readable data, such as an executable object file.

Two other file modes are "sequential" and "random". Sequential is used when the file is accessed serially, from the beginning to the end, and can be used for both text and binary files. Random is used when the file is accessed non-serially, often jumping around from place to place. An example of random is a database file.

Is INTR is a non vectored interrupt?

Yes and no. INTR response requires an opcode fetch sequence from the interrupting hardware device, often a CALL instruction, so there is no vector table in memory for it, because you can CALL any location. On the other hand, some implementations provide an RST instruction as the opcode, making it a vectored interrupt.

What is the purpose of wearing a helmet?

The primary purpose of wearing a helmet is to protect the head from injuries during activities such as cycling, skateboarding, or sports. Helmets are designed to absorb impact energy, reducing the risk of traumatic brain injuries in case of falls or collisions. Additionally, they often provide visibility and can enhance safety by signaling to others that the wearer is taking precautions. Overall, wearing a helmet promotes safety and reduces the likelihood of severe head injuries.

What is parity interrupt?

There is no parity interrupt on the 8085 or 8086/8088.

If you mean a memory parity interrupt, that is a function of system design, not a function of the particular microprocessor involved. Generally, a memory parity error is fatal, so one would typically place it on a non-maskable interrupt, such as TRAP on the 8085, or INT 2 (NMI) on the 8086/8088. This assumes, of course, that the memory parity error does not just crash the processor.